By Topic

Feature selection for intrusion detection: an evolutionary wrapper approach

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Hofmann, A. ; Passau Univ., Germany ; Horeis, T. ; Sick, B.

With the ongoing growth of the Internet, intrusion detection systems (IDS) play an increasing role in securing communication networks. Particularly, where sensitive and confidential information is stored or transmitted, there is a vital importance of security. In the past few years, soft-computing techniques (especially neural networks) found their way more and more into the research area of intrusion detection and are now an inherent part of it. Although, feature selection is an important task for almost all neural network applications, only very few investigations dealing with any type of automated feature selection are known in the area of intrusion detection. This article sets out an evolutionary algorithm (EA) that performs the tasks of feature selection and architecture optimization for radial basis function (RBF) networks automatically. With the feature selection process proposed, it is possible to reduce the number of input features significantly, which is very important due to the fact that the neural networks can effectively be prevented from overfitting. Furthermore, reducing the number of input features also reduces the time needed for feature extraction as well as the execution time for the trained RBF networks and allows the extraction of well interpretable rules. The results (depending on the attack type, about 2 up to 5 features are needed for attack detection on an average) are demonstrated for seven attack types using the DARPA 1998 intrusion detection evaluation data.

Published in:

Neural Networks, 2004. Proceedings. 2004 IEEE International Joint Conference on  (Volume:2 )

Date of Conference:

25-29 July 2004