What is it about?

Intrusion detection systems (IDS) are critical for IT security, relying on a classification module to analyze network traffic and identify threats. The choice of monitored features significantly impacts performance, making it essential to identify a minimal feature set that effectively distinguishes malicious from benign traffic. This study explores feature selection using the CSE-CIC-IDS2018 on AWS dataset, focusing on five attack types. Six feature selection methods were applied, and feature rankings were averaged to determine relevance. Optimal feature subsets were tested with five classification algorithms, evaluated using four key metrics.

Featured Image

Why is it important?

The importance of this research lies in improving the efficiency and accuracy of intrusion detection systems (IDS). By identifying a minimal and optimal set of features for detecting network threats, the computational burden on IDS can be reduced, leading to faster and more cost-effective threat detection. Additionally, focusing on the most relevant features helps enhance detection accuracy, minimizing false positives and negatives. This is crucial for maintaining robust cybersecurity in increasingly complex and high-traffic network environments.

Perspectives

This study emphasizes the importance of optimizing intrusion detection systems (IDS) by identifying a minimal set of features that enhance efficiency and accuracy. Reducing the number of monitored features lowers computational costs, speeds up processing, and ensures scalability for high-traffic or resource-constrained environments. Focusing on the most relevant features also improves detection accuracy, minimizing false alarms and missed threats. Additionally, the adaptable feature selection method can address new threats and datasets, making IDS more resilient. These findings provide practical guidance for deploying effective IDS solutions in real-world scenarios.

Dr László Göcs
John von Neumann University

Read the Original

This page is a summary of: Identifying relevant features of CSE-CIC-IDS2018 dataset for the development of an intrusion detection system, Intelligent Data Analysis, November 2024, IOS Press,
DOI: 10.3233/ida-230264.
You can read the full text:

Read

Resources

Contributors

The following have contributed to this page