TY - JOUR
T1 - Analyzing ANOVA F-test and Sequential Feature Selection for Intrusion Detection Systems
AU - Siraj, Muhammad Jaya
AU - Ahmad, Tohari
AU - Ijtihadie, Royyana Muslim
N1 - Publisher Copyright:
© Al-Zaytoonah University of Jordan (ZUJ).
PY - 2022
Y1 - 2022
N2 - An Intrusion Detection System (IDS) helps the computer system notify an admin when an attack is coming to a network. However, some problems may delay this process, such as a long time caused by several features in the captured data to classify. One of the optimization approaches is to select those critical features. It is intended to increase performance and reduce computational time. This research evaluates feature selection methods using the ANOVA F-test and Sequential Feature Selection (SFS), whose performance is measured using some metrics: accuracy, specificity, and sensitivity over NSL-KDD, Kyoto2006, and UNSW_NB15 datasets. Using that approach, the performance increases, on average, by more than 10% for multiclass; and about 5% for binary class. It can be inferred that an optimal number of features can be obtained, where the best features are selected by SFS. Nevertheless, this method still needs to be improved before being implemented in a real system.
AB - An Intrusion Detection System (IDS) helps the computer system notify an admin when an attack is coming to a network. However, some problems may delay this process, such as a long time caused by several features in the captured data to classify. One of the optimization approaches is to select those critical features. It is intended to increase performance and reduce computational time. This research evaluates feature selection methods using the ANOVA F-test and Sequential Feature Selection (SFS), whose performance is measured using some metrics: accuracy, specificity, and sensitivity over NSL-KDD, Kyoto2006, and UNSW_NB15 datasets. Using that approach, the performance increases, on average, by more than 10% for multiclass; and about 5% for binary class. It can be inferred that an optimal number of features can be obtained, where the best features are selected by SFS. Nevertheless, this method still needs to be improved before being implemented in a real system.
KW - Data Security
KW - Information Security
KW - Intrusion Detection System
KW - Network infrastructure
KW - Network security
UR - http://www.scopus.com/inward/record.url?scp=85134702880&partnerID=8YFLogxK
U2 - 10.15849/IJASCA.220720.13
DO - 10.15849/IJASCA.220720.13
M3 - Article
AN - SCOPUS:85134702880
SN - 2074-8523
VL - 14
SP - 185
EP - 194
JO - International Journal of Advances in Soft Computing and its Applications
JF - International Journal of Advances in Soft Computing and its Applications
IS - 2
ER -