Abstract
An Intrusion Detection System (IDS) seeks to identify unauthorized access to computer systems’ resources and data. The spreading of a data set size, in number of records as well as of attributes, as trigger the development of a number of big data platforms as well as parallel data analysis algorithms. This paper proposed a state-of-the-art technique to reduce the number of input features in dataset by using the Sequential Forward Selection (SFS) with k-Fold Cross Validation Model. Before reaching the feature reduction stage, the pre-processing analysis for detecting unusual observations that do not seem to belong to the pattern of variability produced by the other observations. The pre-processing analysis consists of outlier’s detection and Transformation. Outliers are best detected visually whenever this is possible. This paper explains the steps for detecting outliers’ data and describes the transformation method that transforms them to normality. The transformation obtained by maximizing Lamda functions usually improves the approximation to normality.
Similar content being viewed by others
References
Forrest, S., Hafmeyr, S.A., Somayaji, A., LongStaff, T.A.: A sense of self for UNIX processes. IEEE Trans. Softw. Eng. 13(2), 222–232 (1996). Proceedings of the IEEE Symposium on Computer Security and Privacy
Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. J. Comput. Secur. 6, 151–180 (1998)
Lee, W., Stolfo, S.J., Chan, P.K.: Learning patterns from UNIX process execution traces for intrusion detection. In: AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, pp 50–56. AAAI Press (1997)
Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium (1998)
Chebrolu, S., Abraham, A., Thomas, J.P.: Feature deduction and ensemble design of intrusion detection system. J. Comput. Secur. 24, 295–307 (2005). Elsevier Publisher
Kayacik, H.G., Heywood, A.N.Z., Heywood, M.I.: Selecting features for intrusion detection: a feature relevance analysis on KDD 99. In: Proceedings of the 3rd Annual Conference on Privacy, Security and Trust (PST), New Brunswick, Canada (2005)
Das, S.: Filter, wrappers and boosting-based hybrid for feature selection. In: Proceedings of the 18th International Conference on Machine Learning (ICML 2001), San Fransisco, CA, USA, pp. pp. 74–81. Morgan Kaufmann Publisher Inc. (2001)
Guyon, I., Elisseeff, A.: An introduction of variable feature selection. J. Mach. Learn. Res. 3, 1157–1182 (2003)
Acknowledgments
The authors would like to thank the Riau University Indonesia for supporting this work. The work of Tutut Herawan is supported by Excellent Research Grant Scheme no vote O7/UTY-R/SK/0/X/2013 from Universitas Teknologi Yogyakarta, Indonesia.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Dahliyusmanto, Herawan, T., Yulina, S., Abdullah, A.H. (2017). A Feature Selection Algorithm for Anomaly Detection in Grid Environment Using k-fold Cross Validation Technique. In: Herawan, T., Ghazali, R., Nawi, N.M., Deris, M.M. (eds) Recent Advances on Soft Computing and Data Mining. SCDM 2016. Advances in Intelligent Systems and Computing, vol 549. Springer, Cham. https://doi.org/10.1007/978-3-319-51281-5_62
Download citation
DOI: https://doi.org/10.1007/978-3-319-51281-5_62
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51279-2
Online ISBN: 978-3-319-51281-5
eBook Packages: EngineeringEngineering (R0)