Abstract
Because they’re facilitating life, using computers and other intelligent devices associated with internet has become vital in those days. Banking transactions, education, trade marketing, texting … are all daily and important operations that relies on such technology. Information systems that handle those operations must be kept secure from any intrusive activity. To help ensure that, we must take into consideration several subjects such as access control by managing confidentiality, integrity and availability, as well as deploying detection and prevention tools and mechanisms that help preparing for and dealing with attacks. In this perspective, we propose a network intrusion detection model based on multiclass logistic regression (MLR) and Correlation-based feature selection (CFS). Results will be discussed with respect to NSL-KDD Dataset, and compared to other techniques based on various classification methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Quinlan, J.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Francisco (1993)
John, G., Langley, P.: Estimating continuous distributions in Bayesian classifiers. In: Proceedings of the 11th Conference on Uncertainty in Artificial Intelligence, pp. 338–345 (1995)
Chang, C., Lin, C.: LIBSVM: a Library for Support Vector Machines (2001). http://www.csie.ntu.edu.tw/~cjlin/libsvm
NSL-KDD (2009). http://www.unb.ca/research/iscx/dataset/iscx-NSL-KDD-dataset.html
KDD CUP (1999). http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln Laboratory. ACM Trans. Inf. Syst. Secur. 3(4), 262–294 (2000)
Rasmussen, C.E.: fmincg minimization function. http://learning.eng.cam.ac.uk/carl/code/minimize/
Waikato environment for Knowledge analysis (Weka) and Using Weka in Matlab. http://www.mathworks.com/matlabcentral/fileexchange/50120-using-weka-in-matlab
Hall, M.A., Smith, L.A.: Feature subset selection: a correlation based filter approach. University of Waikato (1997)
Denning, D.E., Edwards, D.L., Jagannathan, R., Lunt, T.F., Neumann, P.G.: A prototype IDES: a real-time intrusion detection expert system. Technical report, Computer Science Laboratory, SRI International, Menlo Park
Roesch, M.: Snort — lightweight intrusion detection for networks. In: Proceedings of the 13th Systems Administration Conference, pp. 229–238. Usenix Association, Seattle (1999)
Jagannathan, R., Lunt, T.F., Anderson, D., Dodd, C., Gilham, F., Jalali, C., Javitz, H.S., Neumann, P.G., Tamaru, A., Valdes, A.: System design document: next-generation intrusion-detection expert system (NIDES). Technical report, Computer Science Laboratory, SRI International, Menlo Park (1993)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Ait tchakoucht, T., Ezziyyani, M. (2018). Detecting Network Intrusions Using Multi-class Logistic Regression and Correlation-Based Feature Selection. In: Ezziyyani, M., Bahaj, M., Khoukhi, F. (eds) Advanced Information Technology, Services and Systems. AIT2S 2017. Lecture Notes in Networks and Systems, vol 25. Springer, Cham. https://doi.org/10.1007/978-3-319-69137-4_37
Download citation
DOI: https://doi.org/10.1007/978-3-319-69137-4_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69136-7
Online ISBN: 978-3-319-69137-4
eBook Packages: EngineeringEngineering (R0)