Abstract
Ineffective and huge network data traffic hampers the efficiency of the intrusion detection system (IDS). Removing the irrelevant features from the high-dimensional dataset is very challenging due to its intrinsic dimension. So, we have implemented two feature reduction techniques, i.e., principal component analysis (PCA), linear discriminant analysis (LDA). Feature reduction techniques are also called dimensionality reduction techniques where dimensions of input features are reduced. Dimensionality reduction techniques increase the accuracy and speed of machine learning classifiers. We have compared the performance of PCA and LDA concerning accuracy, training time, and testing time by using Naïve Bayes and support vector machine (SVM) classifiers. LDA outperforms PCA for binary, multi-class classification of intrusion detection system for both the classifiers individually. SVM provides better classification accuracy than Naïve Bayes for PCA and LDA both.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aburomman AA, Reaz MBI (2016) Ensemble of binary SVM classifiers based on PCA and LDA feature extraction for intrusion detection. In: IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference
Neethu B (2012) Classification of intrusion detection dataset using machine learning approaches. Int J Electron Comput Sci Eng ISSN. 2277–1956
Singh S, Silakari S, Patel R (2011) An efficient feature reduction technique for intrusion detection system. In: International conference on machine learning and computing, Vol.3
Datti R, Lakhina S (2012) Performance comparison of features reduction techniques for intrusion detection system. In: Int J Comput Sci Technol 3(1), ISSN. 2229-4333
Murugesan U, Padmavathi G (2013) An accurate method for detection of cyber attacks. Aust J Basic Appl Sci 940–944, ISSN- 1991–8178
Ikram ST, Cherukuri AK (2016) Improving accuracy of intrusion detection model using PCA and optimized SVM. J Comput Inform Technol 24(2):133–148
Shen Z, Zhang Y, Chen W (2019) A Bayesian classification intrusion detection method based on the fusion of PCA and LDA. Secur Commun Networks
Ammar A (2015) Comparison of feature reduction techniques for the binominal classification of network traffic. J Data Anal Inform Process 11–19
KDD Cup (1999) http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
Jabbar MA, Aluvalu R, Reddy S, Satyanarayana S (2017) RFAODE: A novel ensemble intrusion detection system. In: 7th International Conference on Advances in Computing & Communications, pp 226–234
Smith LI (2002) A tutorial on principal components analysis. In: Computer Science Technical Report
Noel GE, Gustafson SC, Gunsch GH (2001) Network-based anomaly detection using discriminant analysis. J Inform Warfare 1(2):12–22
Hyvärinen A, Oja E (2000) Independent component analysis: algorithms and applications. In: Neural Networks Research Centre, Helsinki University of Technology, Neural Networks, pp 411–430
Murphy KP (2012) Machine learning: a probabilistic perspective. The MIT Press
Saranyaa T, Sridevib S, Deisyc C, Chungd TD, Khane MA (2020) Performance analysis of machine learning algorithms in intrusion detection system: a review. In: Third international conference in computing and network communications, procedia computer science, pp 1251–1260
Boser EB, Guyon MI, Vapnik NV (1992) A training algorithm for optimal margin classiers. In: Proceedings of the 5th annual ACM workshop on computational, pp 144–152
Mehmood T, Rais HBM (2016) Machine learning algorithms in context of intrusion detection. In: IEEE third international conference on computer and information sciences, pp 369–373
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chakraborty, A., Joardar, S. (2022). Intrusion Detection System Performance Comparison Using Dimensionality Reduction Techniques. In: Dahal, K., Giri, D., Neogy, S., Dutta, S., Kumar, S. (eds) Internet of Things and Its Applications. Lecture Notes in Electrical Engineering, vol 825. Springer, Singapore. https://doi.org/10.1007/978-981-16-7637-6_35
Download citation
DOI: https://doi.org/10.1007/978-981-16-7637-6_35
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-7636-9
Online ISBN: 978-981-16-7637-6
eBook Packages: EngineeringEngineering (R0)