Skip to main content

Intrusion Detection System Performance Comparison Using Dimensionality Reduction Techniques

  • Conference paper
  • First Online:
Internet of Things and Its Applications

Abstract

Ineffective and huge network data traffic hampers the efficiency of the intrusion detection system (IDS). Removing the irrelevant features from the high-dimensional dataset is very challenging due to its intrinsic dimension. So, we have implemented two feature reduction techniques, i.e., principal component analysis (PCA), linear discriminant analysis (LDA). Feature reduction techniques are also called dimensionality reduction techniques where dimensions of input features are reduced. Dimensionality reduction techniques increase the accuracy and speed of machine learning classifiers. We have compared the performance of PCA and LDA concerning accuracy, training time, and testing time by using Naïve Bayes and support vector machine (SVM) classifiers. LDA outperforms PCA for binary, multi-class classification of intrusion detection system for both the classifiers individually. SVM provides better classification accuracy than Naïve Bayes for PCA and LDA both.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aburomman AA, Reaz MBI (2016) Ensemble of binary SVM classifiers based on PCA and LDA feature extraction for intrusion detection. In: IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference

    Google Scholar 

  2. Neethu B (2012) Classification of intrusion detection dataset using machine learning approaches. Int J Electron Comput Sci Eng ISSN. 2277–1956

    Google Scholar 

  3. Singh S, Silakari S, Patel R (2011) An efficient feature reduction technique for intrusion detection system. In: International conference on machine learning and computing, Vol.3

    Google Scholar 

  4. Datti R, Lakhina S (2012) Performance comparison of features reduction techniques for intrusion detection system. In: Int J Comput Sci Technol 3(1), ISSN. 2229-4333

    Google Scholar 

  5. Murugesan U, Padmavathi G (2013) An accurate method for detection of cyber attacks. Aust J Basic Appl Sci 940–944, ISSN- 1991–8178

    Google Scholar 

  6. Ikram ST, Cherukuri AK (2016) Improving accuracy of intrusion detection model using PCA and optimized SVM. J Comput Inform Technol 24(2):133–148

    Google Scholar 

  7. Shen Z, Zhang Y, Chen W (2019) A Bayesian classification intrusion detection method based on the fusion of PCA and LDA. Secur Commun Networks

    Google Scholar 

  8. Ammar A (2015) Comparison of feature reduction techniques for the binominal classification of network traffic. J Data Anal Inform Process 11–19

    Google Scholar 

  9. http://www.takakura.com/Kyotodata

  10. KDD Cup (1999) http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  11. Jabbar MA, Aluvalu R, Reddy S, Satyanarayana S (2017) RFAODE: A novel ensemble intrusion detection system. In: 7th International Conference on Advances in Computing & Communications, pp 226–234

    Google Scholar 

  12. Smith LI (2002) A tutorial on principal components analysis. In: Computer Science Technical Report

    Google Scholar 

  13. Noel GE, Gustafson SC, Gunsch GH (2001) Network-based anomaly detection using discriminant analysis. J Inform Warfare 1(2):12–22

    Google Scholar 

  14. Hyvärinen A, Oja E (2000) Independent component analysis: algorithms and applications. In: Neural Networks Research Centre, Helsinki University of Technology, Neural Networks, pp 411–430

    Google Scholar 

  15. Murphy KP (2012) Machine learning: a probabilistic perspective. The MIT Press

    Google Scholar 

  16. Saranyaa T, Sridevib S, Deisyc C, Chungd TD, Khane MA (2020) Performance analysis of machine learning algorithms in intrusion detection system: a review. In: Third international conference in computing and network communications, procedia computer science, pp 1251–1260

    Google Scholar 

  17. Boser EB, Guyon MI, Vapnik NV (1992) A training algorithm for optimal margin classiers. In: Proceedings of the 5th annual ACM workshop on computational, pp 144–152

    Google Scholar 

  18. Mehmood T, Rais HBM (2016) Machine learning algorithms in context of intrusion detection. In: IEEE third international conference on computer and information sciences, pp 369–373

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chakraborty, A., Joardar, S. (2022). Intrusion Detection System Performance Comparison Using Dimensionality Reduction Techniques. In: Dahal, K., Giri, D., Neogy, S., Dutta, S., Kumar, S. (eds) Internet of Things and Its Applications. Lecture Notes in Electrical Engineering, vol 825. Springer, Singapore. https://doi.org/10.1007/978-981-16-7637-6_35

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-7637-6_35

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-7636-9

  • Online ISBN: 978-981-16-7637-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics