Feature Extraction Methods for Intrusion Detection Systems

Feature Extraction Methods for Intrusion Detection Systems

Hai Thanh Nguyen, Katrin Franke, Slobodan Petrovic
ISBN13: 9781466639942|ISBN10: 1466639946|EISBN13: 9781466639959
DOI: 10.4018/978-1-4666-3994-2.ch054
Cite Chapter Cite Chapter

MLA

Nguyen, Hai Thanh, et al. "Feature Extraction Methods for Intrusion Detection Systems." Image Processing: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2013, pp. 1064-1092. https://doi.org/10.4018/978-1-4666-3994-2.ch054

APA

Nguyen, H. T., Franke, K., & Petrovic, S. (2013). Feature Extraction Methods for Intrusion Detection Systems. In I. Management Association (Ed.), Image Processing: Concepts, Methodologies, Tools, and Applications (pp. 1064-1092). IGI Global. https://doi.org/10.4018/978-1-4666-3994-2.ch054

Chicago

Nguyen, Hai Thanh, Katrin Franke, and Slobodan Petrovic. "Feature Extraction Methods for Intrusion Detection Systems." In Image Processing: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1064-1092. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-3994-2.ch054

Export Reference

Mendeley
Favorite

Abstract

Intrusion Detection Systems (IDSs) have become an important security tool for managing risk and an indispensable part of overall security architecture. An IDS is considered as a pattern recognition system, in which feature extraction is an important pre-processing step. The feature extraction process consists of feature construction and feature selection . The quality of the feature construction and feature selection algorithms is one of the most important factors that affects the effectiveness of an IDS. Achieving reduction of the number of relevant traffic features without negative effect on classification accuracy is a goal that largely improves the overall effectiveness of the IDS. Most of the feature construction as well as feature selection works in intrusion detection practice is still carried through manually by utilizing domain knowledge. For automatic feature construction and feature selection, the filter, wrapper, and embedded methods from machine learning are frequently applied. This chapter provides an overview of various existing feature construction and feature selection methods for intrusion detection systems. A comparison between those feature selection methods is performed in the experimental part.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.