4.6 Article

Intrusion detection using Highest Wins feature selection algorithm

期刊

NEURAL COMPUTING & APPLICATIONS
卷 33, 期 16, 页码 9805-9816

出版社

SPRINGER LONDON LTD
DOI: 10.1007/s00521-021-05745-w

关键词

Intrusion detection; Naï ve Bayes; Data mining; Feature selection

向作者/读者索取更多资源

The article introduces a novel feature selection algorithm called Highest Wins (HW), which can improve the performance of classification models while reducing the number of selected features in datasets. Through comparisons with known strategies such as chi-square and information gain, it is confirmed that the algorithm is competitive in terms of generalization ability, recall, precision, and other evaluation metrics.
The rapid advancement of Internet stimulates building intelligent data mining systems for detecting intrusion attacks. The performance of such systems might be negatively affected due to the big datasets employed in the learning phase. Determining the appropriate group of features within training datasets is an essential phase when building data mining classification models. Nevertheless, the resulted minimized set of features should maintain or even improve the performance of the classification models. Throughout this article, an innovative feature selection algorithm is proposed and is called the Highest Wins (HW). To evaluate the generalization ability of HW, it has been applied for creating classification models using naive Bayes technique from 10 benchmark datasets. The obtained results were compared against two well-known strategies, namely chi-square and information gain. The experimental results confirmed the competitiveness ability of the suggested strategy in terms of various evaluation measurements such as recall, precision, and error rate while significantly decreasing the number of selected features in datasets. Further, the HW is used for building a naive Bayes and decision tree intrusion detection classifiers using the well-known dataset from Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD). The results were promising not just in terms of overall performance, but also in terms of the time needed to build the classification model.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

Hybrid intelligent water Drops algorithm for examination timetabling problem

Bashar A. Aldeeb, Mohammed Azmi Al-Betar, Norita Md Norwawi, Khalid A. Alissa, Mutasem K. Alsmadi, Ayman A. Hazaymeh, Malek Alzaqebah

Summary: This study investigates the application of the Intelligent Water Drops (IWD) metaheuristic algorithm to the university examination timetabling problem. A hybrid approach based on IWD and local search algorithm is proposed to improve the exploitation of IWD algorithm. Experimental results demonstrate that the proposed algorithm achieved the best results compared to other approaches in multiple datasets.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2022)

Article Computer Science, Information Systems

An Enhanced Multiclass Support Vector Machine Model and its Application to Classifying File Systems Affected by a Digital Crime

Rami Mustafa A. Mohammad

Summary: The digital revolution has led to a revolution in cybercrime, making digital forensic a pressing topic. This article proposes an Enhanced Multiclass Support Vector Machine (EMSVM) model to improve classification performance and support multi-class classification. The applicability of the model in analyzing incriminating digital evidence is investigated, showing promising results.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2022)

Article Computer Science, Information Systems

A survey on fish classification techniques

Mutasem K. Alsmadi, Ibrahim Almarashdeh

Summary: Fish classification is a widely studied problem in the fields of image segmentation, pattern recognition, and information retrieval. This study compares and evaluates various preprocessing methods, feature extraction techniques, and classifiers, and reviews the use of relevant databases. By collecting recent research works, it provides guidance for future research directions.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2022)

Article Computer Science, Artificial Intelligence

Classifying the Mortality of People with Underlying Health Conditions Affected by COVID-19 Using Machine Learning Techniques

RamiMustafa A. Mohammad, Malak Aljabri, Menna Aboulnour, Samiha Mirza, Ahmad Alshobaiki

Summary: The study aims to classify the mortality rate of COVID-19 patients with underlying health conditions using machine learning models. The findings provide assistance to researchers and physicians in early identification of at-risk patients and making appropriate intensive care decisions.

APPLIED COMPUTATIONAL INTELLIGENCE AND SOFT COMPUTING (2022)

Article Computer Science, Information Systems

Classification of Firewall Log Data Using Multiclass Machine Learning Models

Malak Aljabri, Amal A. Alahmadi, Rami Mustafa A. Mohammad, Menna Aboulnour, Dorieh M. Alomari, Sultan H. Almotiri

Summary: Network security is becoming increasingly important due to unprecedented challenges. Analyzing firewall logs is difficult, but AI and ML can help. This study builds multiclass models using ML and DL to analyze firewall logs and classify actions in response to cyberattacks. Experimental results show that the proposed models significantly improve firewall classification rate.

ELECTRONICS (2022)

Article Computer Science, Information Systems

Hybrid Brain Storm Optimization algorithm and Late Acceptance Hill Climbing to solve the Flexible Job-Shop Scheduling Problem

Malek Alzaqebah, Sana Jawarneh, Maram Alwohaibi, Mutasem K. Alsmadi, Ibrahim Almarashdeh, Rami Mustafa A. Mohammad

Summary: The BSO algorithm is a novel swarm intelligence algorithm that simulates the brainstorming process of humans. By introducing a new updating strategy and integrating the LAHC algorithm, the BSO algorithm shows better performance in terms of search and convergence speed compared to other algorithms based on experimental results.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2022)

Article Mathematical & Computational Biology

An Assessment of Lexical, Network, and Content-Based Features for Detecting Malicious URLs Using Machine Learning and Deep Learning Models

Malak Aljabri, Fahd Alhaidari, Rami Mustafa A. Mohammad, Dina H. Alhamed, Hanan S. Altamimi, Sara Mhd. Bachar Chrouf

Summary: This study examined the use of machine learning and deep learning models to detect malicious websites, performed feature engineering and analysis on a dataset, with results showing Naive Bayes as the best model for this task.

COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE (2022)

Article Computer Science, Information Systems

Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors

Osama A. M. Khashan, Nour M. Khafajah, Waleed Alomoush, Mohammad Alshinwan, Sultan Samer Atawneh, Mutasem K. K. Alsmadi

Summary: Securing multimedia data on disk drives is a major concern due to their increasing volumes and security flaws. Existing cryptographic schemes have limitations in terms of computational costs and flexibility. Dynamic encryption file systems can mitigate these limitations by automating encryption operations with higher security. However, most current cryptographic file systems overlook the unique features of multimedia data and vulnerabilities in key management and multi-user sharing.

CRYPTOGRAPHY (2023)

Article Computer Science, Information Systems

1D Convolutional LSTM-based wind power prediction integrated with PkNN data imputation technique

Farah Shahid, Atif Mehmood, Rizwan Khan, Ahmad AL Smadi, Muhammad Yaqub, Mutasem K. Alsmadi, Zhonglong Zheng

Summary: This paper proposes two methods to address the issue of missing values in wind power forecasting and builds a hybrid wind energy forecasting system. The experimental results show that the use of PkNN algorithm integrated with regression-based Convolutional LSTM is more efficient in prediction compared to other deep neural network models.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2023)

Review Computer Science, Information Systems

Detecting Malicious URLs Using Machine Learning Techniques: Review and Research Directions

Malak Aljabri, Hanan S. Altamimi, Shahd A. Albelali, Maimunah Al-Harbi, Haya T. Alhuraib, Najd K. Alotaibi, Amal A. Alahmadi, Fahd Alhaidari, Rami Mustafa A. Mohammad, Khaled Salah

Summary: The digital world has made significant advancements in recent years, especially on the Internet, where most of our activities now take place. However, this progress has also led to a rising risk of cyberattacks, particularly through the use of malicious URLs. These URLs trick inexperienced users into giving away sensitive information, resulting in billions of dollars in losses each year. This paper provides an extensive literature review on the techniques used to detect malicious URLs using machine learning models, addressing the limitations, detection technologies, feature types, and datasets used. Additionally, the paper highlights the lack of studies on detecting malicious Arabic websites and suggests directions for future research. Finally, the paper presents challenges that can impact the quality of malicious URL detectors, along with potential solutions.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

An Enhanced Particle Swarm Optimization for ITC2021 Sports Timetabling

Mutasem K. Alsmadi, Ghaith M. Jaradat, Malek Alzaqebah, Ibrahim ALmarashdeh, Fahad A. Alghamdi, Rami Mustafa A. Mohammad, Nahier Aldhafferi, Abdullah Alqahtani

Summary: Timetabling problem is an important step in raising industrial productivity, and the Particle Swarm Optimization (PSO) algorithm has been proven effective in solving such problems. This research paper proposes an enhanced hybrid dynamic adaptive PSO algorithm for sports timetabling, which has shown a robust and consistent performance in generating feasible timetables within a reasonable computational time.

CMC-COMPUTERS MATERIALS & CONTINUA (2022)

Article Computer Science, Information Systems

Enhancing the blockchain voting process in IoT using a novel blockchain Weighted Majority Consensus Algorithm (WMCA)

Manal Mohamed Alhejazi, Rami Mustafa A. Mohammad

Summary: The Internet of Things (IoT) has the potential to significantly improve our lifestyle, but also comes with serious risks. To enhance IoT security, the focus has turned to blockchain as an innovative technique for securing IoT networks and data sharing. Blockchain's decentralization and tamperproof features have proven to be effective and promising for IoT security.

INFORMATION SECURITY JOURNAL (2022)

暂无数据