Abstract
The purpose of this paper is to determine the key characteristics required for intrusion detection model construction to achieve the greatest accuracy in detection. In this paper, Two-Class Neural Network, Two-Class Locally-Deep Support Vector Machine, and Two-Class Averaged Perceptron are selected. To test the accuracy of intrusion detection. This paper uses the NSL-KDD data set to discuss the accuracy of binary classification in classification, uses permutation feature importance to rank features, and according to the analysis, results show that (“Service”,“dst_host_rerror_rate”,“Flag”,) features are the most important.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Peng, Y., Jiang, C., Xie, F., et al.: Research progress of industrial control system information security . J. Tsinghua Univ. (Nat. Sci. Edn.) 52(4), 1396–1408 (2012)
Osareh, A., Shadgar, B.: Intrusion detection in computer networks based on machine learning algorithms. Int. J. Comput. Sci. Netw. Secur. 11(8), 15–23 (2008)
Zhang, L., Ge, W.: Research on intrusion detection based on decision tree classification algorithm. Electron. Des. Eng. 22, 46–48 (2013)
Liu, C., Zhai, G.: Research and improvement of ID3 algorithm in intrusion detection system. Comput. Secur. 05, 41–44 (2010)
Goldenberg, N.,Wool, A.: Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. Int. J. Crit. Infrastruct. Prot. 6(2), 63–75 (2013)
Yaofeng, L.: Research and design of intrusion detection methods for industrial control systems. Zhejiang University (2013)
Tan, A., Chen, H., Boqiao, W.: SVM-based integrated learning algorithm for network intrusion detection. Comput. Sci. 02, 197–2000 (2014)
Premnath, A.P., Jo, J., Kim, Y.: Application of ntru cryptographic algorithm for scada security. In: 2014 11th International Conference on Information Technology: New Generations (ITNG), pp. 341–346. IEEE (2014)
Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49–51 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Li, J., Zheng, W., Chang, K.C., Wang, S., Luo, Y. (2021). Critical Features Selection of Training Model for Intrusion Detection System. In: Hassanien, AE., Chang, KC., Mincong, T. (eds) Advanced Machine Learning Technologies and Applications. AMLTA 2021. Advances in Intelligent Systems and Computing, vol 1339. Springer, Cham. https://doi.org/10.1007/978-3-030-69717-4_34
Download citation
DOI: https://doi.org/10.1007/978-3-030-69717-4_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-69716-7
Online ISBN: 978-3-030-69717-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)