Optimizing Feature Selection for Machine Learning-Based Intrusion Detection Systems Against Modern Cybersecurity Threats
DOI:
https://doi.org/10.22399/ijcesen.1434Keywords:
Cybersecurity, Cyberattacks, IoT, Datasets, Anomaly Detection, Machine learningAbstract
Technologies like AI, cloud computing, and big data have come a long way and changed a lot for the better. But this rise of cyberattacks to ensure an effective intrusion detection system (IDS). The challenges include lower accuracy from redundant features, less ability to detect new attacks from a single machine learning classifier, high rates of false alarms (FAR), excessive building time of models, etc.This paper introduces a hybrid feature selection approach with an ensemble classifier to select relevant features and give consistent classification of attacks. As the most recent open-access IDS dataset, the CICIDS-2017 dataset has significant promise as a prospective benchmark for IDS of the future since it incorporates contemporary system configurations and threat profiles. Yet in research, especially feature selection, it is still yet to be fully utilized.
To overcome these issues, this study introduces a novel IDS framework deploying ensemble-based feature selection to derive a low-dimensional feature subset, and an ensemble-based IDS model for benchmarking on CICIDS-2017. The proposed scheme is a valuable contribution to the research community by integrating the most recent IDS dataset with ensemble methods for feature selection and detection, offering a strong solution for contemporary network security.Keywords: Cyber-Physical Systems (CPS), Intrusion Detection Systems (IDS), Ensemble-Based Methods, Feature Selection, Cybersecurity Threats
References
[1] Rayes, A., & Salam, S. (2016). Internet of Things (IoT) overview. In Internet of Things from hype to reality (pp. 1–34).
[2] Alshaibi, A. J., Al-Ani, M. M., & Kadum, J. (2023). The effect of integration and effectiveness of artificial neural networks on information security tasks. AIP Conference Proceedings, 2591(1), 030021. https://doi.org/10.1063/5.0121244
[3] Lee, E. (2015). The past, present and future of cyber-physical systems: A focus on models. Sensors, 15(3), 4837–4869.
[4] Golani, N., & Rajasekaran, R. (2017). IoT challenges: Security. In Internet of Things (IoT) (pp. 211–234).
[5] Gupta, Y., Shorey, R., Kulkarni, D., & Tew, J. (2018). The applicability of blockchain in the Internet of Things. In 2018 10th International Conference on Communication Systems & Networks (COMSNETS), 561–564.
[6] Kang, J., Yu, R., Huang, X., Maharjan, S., Zhang, Y., & Hossain, E. (2017). Enabling localized peer-to-peer electricity trading among plug-in hybrid electric vehicles using consortium blockchains. IEEE Transactions on Industrial Informatics, 13(6), 3154–3164.
[7] Rohr, J., & Wright, A. (2019). Blockchains, private ordering, and the future of governance. In Regulating Blockchain (43–57).
[8] Zhu, H., Liu, X., Lu, R., & Li, H. (2017). Efficient and privacy-preserving online medical prediagnosis framework using nonlinear SVM. IEEE Journal of Biomedical and Health Informatics, 21(3), 838–850.
[9] Cinque, M., Cotroneo, D., Di Martino, C., Russo, S., & Testa, A. (2009). AVR-Inject: A tool for injecting faults in wireless sensor nodes. In 2009 IEEE International Symposium on Parallel & Distributed Processing (pp. 1–8).
[10] Sedjelmaci, H., & Feham, M. (2011). Novel hybrid intrusion detection system for clustered wireless sensor network. International Journal of Network Security & Its Applications, 3(4), 1–14.
[11] Paul, T., & Rakshit, S. (2021). Big data analytics for marketing intelligence. In Big Data Analytics (pp. 215–230).
[12] Gupta, B. B., & Sahoo, S. R. (2021). Machine-learning and deep-learning-based security solutions for detecting various attacks on OSNs. In Online Social Networks Security (pp. 57–69).
[13] Thiyagarajan, P. (2020). A review on cyber security mechanisms using machine and deep learning algorithms. In Handbook of Research on Machine and Deep Learning Applications for Cyber Security (pp. 23–41).
[14] Gaurav, A., Gupta, B. B., Hsu, C.-H., Yamaguchi, S., & Chui, K. T. (2021). Fog layer-based DDoS attack detection approach for Internet-of-Things (IoTs) devices. In 2021 IEEE International Conference on Consumer Electronics (ICCE) (pp. 1–5).
[15] Promper, C., Engel, D., & Green, R. C. (2017). Anomaly detection in smart grids with imbalanced data methods. In 2017 IEEE Symposium Series on Computational Intelligence (SSCI).
[16] Shekarforoush, S. H., Green, R., & Dyer, R. (2017). Classifying commit messages: A case study in resampling techniques. In 2017 International Joint Conference on Neural Networks (IJCNN) (pp. 1273–1280).
[17] Ullah, I., & Mahmoud, Q. H. (2017). A hybrid model for anomaly-based intrusion detection in SCADA networks. In 2017 IEEE International Conference on Big Data (Big Data) (pp. 2160–2167).
[18] Beaver, J. M., Borges-Hink, R. C., & Buckner, M. A. (2013). An evaluation of machine learning methods to detect malicious SCADA communications. In 2013 12th International Conference on Machine Learning and Applications (pp. 54–59).
[19] Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016). Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Transactions on Computers, 65(10), 2986–2998.
[20] Aminanto, M. E., Choi, R., Tanuwidjaja, H. C., Yoo, P. D., & Kim, K. (2018). Deep abstraction and weighted feature selection for Wi-Fi impersonation detection. IEEE Transactions on Information Forensics and Security, 13(3), 621–636.
[21] Diro, A., & Chilamkurti, N. (2018). Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Communications Magazine, 56(9), 124–130.
[22] Kolias, C., Kambourakis, G., Stavrou, A., & Gritzalis, S. (2016). Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset. IEEE Communications Surveys & Tutorials, 18(1), 184–208.
[23] Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2014). A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Transactions on Parallel and Distributed Systems, 25(2), 447–456.
[24] Moustafa, N., Turnbull, B., & Choo, K.-K. R. (2019). An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of Internet of Things. IEEE Internet of Things Journal, 6(3), 4815–4830.
[25] Ambusaidi, M. A.; He, X.; Nanda, P.; Tan, Z. Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE Transactions on Computers 2016, 65, 2986–2998.
[26] Jia, Q., Guo, L., Jin, Z., & Fang, Y. (2018). Preserving model privacy for machine learning in distributed systems. IEEE Transactions on Parallel and Distributed Systems, 29(8), 1808–1822.
[27] Feng, P., Ma, J., Sun, C., Xu, X., & Ma, Y. (2018). A novel dynamic Android malware detection system with ensemble learning. IEEE Access, 6, 30996–31011.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.