Machine Learning techniques for Behavioral Feature Selection in Network Intrusion Detection Systems

Fecha

2021

Profesor Guía

Formato del documento

Articulo

ORCID Autor

Título de la revista

ISSN de la revista

Título del volumen

Editor

IEEE

Ubicación

ISBN

ISSN

item.page.issne

item.page.doiurl

Facultad

Facultad de Ciencias

Departamento o Escuela

Instituto de Estadistica

Determinador

Recolector

Especie

Nota general

No disponible para descarga

Resumen

Information systems are prone to receiving multiple types of attacks over the network. Therefore, Network Intrusion Detection Systems (NIDSs) analyze the behavior of the network traffic to detect anomalies and eventual cyberattacks. The NIDS must be able to detect these cyberattacks in an efficient and effective manner based on a set of features where it is expected that the performance depends on both the selected features and the machine learning technique used. The main goal of this work is to identify the most relevant characteristics required to detect, with a high sensitivity and precision, between normal traffic and a network intrusion, together with the most relevant features associated to the identification of a specific type of attack. In this work, a comparative study of different decision tree-based machine learning techniques combined with several feature selection techniques in order to accomplish the goal. Random Forest and the XGBoost achieved a performance that reaches up to 98.5% in the F-measure when the complete set of features were used. Results show the performance was just slightly reduced to 98% when the 10 most relevant features were used. Moreover, results also show that the model using only the 10 most relevant features was able to separately identify the type of attack with a performance of at least 90% in the F-measure. We conclude that it is possible to obtain and rank a subset of the most relevant features that characterize the intrusion pattern in the network traffic in order to support the decision of how many features to include during runtime under a real network environment.

Descripción

Lugar de Publicación

Auspiciador

Palabras clave

COMPUTER NETWORK SECURITY, DECISION TREES, FEATURE SELECTION, LEARNING (ARTIFICIAL INTELLIGENCE)

Licencia

URL Licencia