Nothing Special   »   [go: up one dir, main page]

Skip to main content

A Feature Selection Algorithm for Anomaly Detection in Grid Environment Using k-fold Cross Validation Technique

  • Conference paper
  • First Online:
Recent Advances on Soft Computing and Data Mining (SCDM 2016)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 549))

Included in the following conference series:

Abstract

An Intrusion Detection System (IDS) seeks to identify unauthorized access to computer systems’ resources and data. The spreading of a data set size, in number of records as well as of attributes, as trigger the development of a number of big data platforms as well as parallel data analysis algorithms. This paper proposed a state-of-the-art technique to reduce the number of input features in dataset by using the Sequential Forward Selection (SFS) with k-Fold Cross Validation Model. Before reaching the feature reduction stage, the pre-processing analysis for detecting unusual observations that do not seem to belong to the pattern of variability produced by the other observations. The pre-processing analysis consists of outlier’s detection and Transformation. Outliers are best detected visually whenever this is possible. This paper explains the steps for detecting outliers’ data and describes the transformation method that transforms them to normality. The transformation obtained by maximizing Lamda functions usually improves the approximation to normality.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. Forrest, S., Hafmeyr, S.A., Somayaji, A., LongStaff, T.A.: A sense of self for UNIX processes. IEEE Trans. Softw. Eng. 13(2), 222–232 (1996). Proceedings of the IEEE Symposium on Computer Security and Privacy

    Google Scholar 

  2. Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. J. Comput. Secur. 6, 151–180 (1998)

    Article  Google Scholar 

  3. Lee, W., Stolfo, S.J., Chan, P.K.: Learning patterns from UNIX process execution traces for intrusion detection. In: AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, pp 50–56. AAAI Press (1997)

    Google Scholar 

  4. Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium (1998)

    Google Scholar 

  5. Chebrolu, S., Abraham, A., Thomas, J.P.: Feature deduction and ensemble design of intrusion detection system. J. Comput. Secur. 24, 295–307 (2005). Elsevier Publisher

    Article  Google Scholar 

  6. Kayacik, H.G., Heywood, A.N.Z., Heywood, M.I.: Selecting features for intrusion detection: a feature relevance analysis on KDD 99. In: Proceedings of the 3rd Annual Conference on Privacy, Security and Trust (PST), New Brunswick, Canada (2005)

    Google Scholar 

  7. Das, S.: Filter, wrappers and boosting-based hybrid for feature selection. In: Proceedings of the 18th International Conference on Machine Learning (ICML 2001), San Fransisco, CA, USA, pp. pp. 74–81. Morgan Kaufmann Publisher Inc. (2001)

    Google Scholar 

  8. Guyon, I., Elisseeff, A.: An introduction of variable feature selection. J. Mach. Learn. Res. 3, 1157–1182 (2003)

    MATH  Google Scholar 

Download references

Acknowledgments

The authors would like to thank the Riau University Indonesia for supporting this work. The work of Tutut Herawan is supported by Excellent Research Grant Scheme no vote O7/UTY-R/SK/0/X/2013 from Universitas Teknologi Yogyakarta, Indonesia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dahliyusmanto .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Dahliyusmanto, Herawan, T., Yulina, S., Abdullah, A.H. (2017). A Feature Selection Algorithm for Anomaly Detection in Grid Environment Using k-fold Cross Validation Technique. In: Herawan, T., Ghazali, R., Nawi, N.M., Deris, M.M. (eds) Recent Advances on Soft Computing and Data Mining. SCDM 2016. Advances in Intelligent Systems and Computing, vol 549. Springer, Cham. https://doi.org/10.1007/978-3-319-51281-5_62

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51281-5_62

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51279-2

  • Online ISBN: 978-3-319-51281-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics