Wrapper-Based Feature Selection to Improve The Accuracy of Intrusion Detection System (IDS)
An Intrusion Detection System (IDS) is a system that can detect attacks on a network. IDS systems can be built using machine learning approaches. However, significant network traffic and many features cause machine learning algorithms to work slowly. Not all available features are essential for use...
Saved in:
Published in | International Conference on Wireless and Telematics (Online) pp. 1 - 5 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
04.07.2024
|
Subjects | |
Online Access | Get full text |
ISSN | 2769-8289 |
DOI | 10.1109/ICWT62080.2024.10674687 |
Cover
Abstract | An Intrusion Detection System (IDS) is a system that can detect attacks on a network. IDS systems can be built using machine learning approaches. However, significant network traffic and many features cause machine learning algorithms to work slowly. Not all available features are essential for use as a reference in an intrusion detection system. Feature selection is important because it can reduce the dataset and speed up computing time in building models and detection systems. In this paper, feature selection using the wrapper method is proposed. Its performance is compared with filter-based feature selection, such as chi-square, information gain, gain ratio, and correlation-based feature selection (CFS). Based on the exploration, the results showed that the feature selection algorithm using the wrapper method was superior to other algorithms. The number of critical features discovered and the detection system's precision serve as proof of the wrapper approach. With only three features as a reference, the detection system produces an accuracy of 96.22%. It increases 5.84% from 90.38% to 96.22%. Computation time also increases because the number of features used is tiny compared to other algorithms and uses all features. |
---|---|
AbstractList | An Intrusion Detection System (IDS) is a system that can detect attacks on a network. IDS systems can be built using machine learning approaches. However, significant network traffic and many features cause machine learning algorithms to work slowly. Not all available features are essential for use as a reference in an intrusion detection system. Feature selection is important because it can reduce the dataset and speed up computing time in building models and detection systems. In this paper, feature selection using the wrapper method is proposed. Its performance is compared with filter-based feature selection, such as chi-square, information gain, gain ratio, and correlation-based feature selection (CFS). Based on the exploration, the results showed that the feature selection algorithm using the wrapper method was superior to other algorithms. The number of critical features discovered and the detection system's precision serve as proof of the wrapper approach. With only three features as a reference, the detection system produces an accuracy of 96.22%. It increases 5.84% from 90.38% to 96.22%. Computation time also increases because the number of features used is tiny compared to other algorithms and uses all features. |
Author | Negara, Ridha Muldina Hamidi, Eki Ahmad Zaki Jupriyadi Budiman, Arief Ahdan, Syaiful |
Author_xml | – sequence: 1 surname: Jupriyadi fullname: Jupriyadi email: jupriyadi@teknokrat.ac.id organization: Institut Teknologi Bandung,School of Electrical Engineering and Informatics,Bandung,Indonesia – sequence: 2 givenname: Arief surname: Budiman fullname: Budiman, Arief email: arief.budiman10@teknokrat.ac.id organization: Universitas Gadjah Mada,Department Computer Science and Electronics,Yogyakarta,Indonesia – sequence: 3 givenname: Eki Ahmad Zaki surname: Hamidi fullname: Hamidi, Eki Ahmad Zaki email: ekiahmadzaki@uinsgd.ac.id organization: Institut Teknologi Bandung,School of Electrical Engineering and Informatics,Bandung,Indonesia – sequence: 4 givenname: Syaiful surname: Ahdan fullname: Ahdan, Syaiful email: syaifulahdan@teknokrat.ac.id organization: Institut Teknologi Bandung,School of Electrical Engineering and Informatics,Bandung,Indonesia – sequence: 5 givenname: Ridha Muldina surname: Negara fullname: Negara, Ridha Muldina email: ridhanegara@telkomuniversity.ac.id organization: Institut Teknologi Bandung,School of Electrical Engineering and Informatics,Bandung,Indonesia |
BookMark | eNo1kEFLwzAYQKMoOGf_gWCOeuj8krT9kuPcnBYGHlbYwcMI6ResbG1JM6H_fojz9C6Pd3i37KrtWmLsQcBMCDDP5WJbFRI0zCTIbCagwKzQeMESg0arHBQi5HjJJhILk2qpzQ1LhuEbAJRARI0T9rkNtu8ppC92oJqvyMZjIL6hPbnYdC2PHS8Pfeh-iFdfxOfOHYN1I-88L9sYjsOvtKR41jfjEOnAH8vl5umOXXu7Hyg5c8qq1Wu1eE_XH2_lYr5OGyNiSsrkSqOsjZQWvVCZsGDAQW4yXXshROa8qUGqwqOqUVlv0NXe2dwr77yasvu_bENEuz40BxvG3f8OdQI1r1Ys |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICWT62080.2024.10674687 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9798350377057 |
EISSN | 2769-8289 |
EndPage | 5 |
ExternalDocumentID | 10674687 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL |
ID | FETCH-LOGICAL-i91t-e3953872d922a7f1341a090c05948df1114cf9d0236f73d73af97cdfca5f3fcf3 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 01:58:10 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i91t-e3953872d922a7f1341a090c05948df1114cf9d0236f73d73af97cdfca5f3fcf3 |
PageCount | 5 |
ParticipantIDs | ieee_primary_10674687 |
PublicationCentury | 2000 |
PublicationDate | 2024-July-4 |
PublicationDateYYYYMMDD | 2024-07-04 |
PublicationDate_xml | – month: 07 year: 2024 text: 2024-July-4 day: 04 |
PublicationDecade | 2020 |
PublicationTitle | International Conference on Wireless and Telematics (Online) |
PublicationTitleAbbrev | ICWT |
PublicationYear | 2024 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0003177787 |
Score | 2.2644882 |
Snippet | An Intrusion Detection System (IDS) is a system that can detect attacks on a network. IDS systems can be built using machine learning approaches. However,... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Accuracy Buildings Computational modeling feature selection IDS Intrusion detection intrusion detection system machine learning Machine learning algorithms NSL-KDD Telecommunication traffic Wireless communication |
Title | Wrapper-Based Feature Selection to Improve The Accuracy of Intrusion Detection System (IDS) |
URI | https://ieeexplore.ieee.org/document/10674687 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5uJ08qTvxNDh700K5r0sV31M2xCQ5hkw08jDQ_QIR2lPagf70vaTdRELyUUlJI89J8eS_v-x4hVynYnmD4AwqNvioiBA8ADATSUX6s0bFOHcH5adofv_DHZbJsyOqeC2OM8clnJnS3_ixf56pyobKukzvj_VvRIi0hoCZrbQMqCIQCZ1-Tw9WLoDsZLOb9GLdE6AbGPNy8_aOOioeR0R6ZbjpQZ4-8h1WZhurzlzbjv3u4TzrfjD36vMWiA7JjskPyuijkem2K4B6hSlO326sKQ2e-9A3ag5Y5rYMKhuJ0oXdKVYVUHzS3dJI5NoZrNDRl07xWN6fXk-HspkPmo4f5YBw0xRSCN-iVgWGAS5uINcSxFNbJuMkIIuXlWrTFFY8rC9rpyVvBtGDSglDaKplYZpVlR6Sd5Zk5JjRiKWgmudSJ5ELgRdmEO8dD2CiRcEI6bmBW61ouY7UZk9M_np-RXWcfnwPLz0kbP89cINKX6aW38BfjYKf8 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA46D3pSceJvc_Cgh3Zdky7mqJtj1W0Iq2zgYaT5ASKso7QH_et9SbuJguCllJJCmpfmy3t53_cQukq5aTMCPyBT4KsCQlCPc809YSk_RqtQpZbgPBp3Bi_0cRbNarK648JorV3ymfbtrTvLV5ksbaisZeXOaOeWbaKtCNwKVtG11iEVgEIG86_O4moHvBV3p0knhE0ROIIh9Vfv_6ik4oCkv4vGqy5U-SPvflmkvvz8pc747z7uoeY3Zw8_r9FoH23oxQF6neZiudS5dw9gpbDd75W5xhNX_AYsgosMV2EFjWHC4Dspy1zID5wZHC8sH8M26umibl7pm-PruDe5aaKk_5B0B15dTsF74-3C04TD4sZCxcNQMGOF3ETAA-kEW5SBNY9Kw5VVlDeMKEaE4UwqI0VkiJGGHKLGIlvoI4QDknJFBBUqEpQxuEgTUet6MBNEgh-jph2Y-bISzJivxuTkj-eXaHuQjIbzYTx-OkU71lYuI5aeoQZ8qj4H3C_SC2ftL-hZq00 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Wireless+and+Telematics+%28Online%29&rft.atitle=Wrapper-Based+Feature+Selection+to+Improve+The+Accuracy+of+Intrusion+Detection+System+%28IDS%29&rft.au=Jupriyadi&rft.au=Budiman%2C+Arief&rft.au=Hamidi%2C+Eki+Ahmad+Zaki&rft.au=Ahdan%2C+Syaiful&rft.date=2024-07-04&rft.pub=IEEE&rft.eissn=2769-8289&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FICWT62080.2024.10674687&rft.externalDocID=10674687 |