JOURNAL ARTICLE

Detection of Intrusion using Hybrid Feature Selection and Flexible Rule Based Machine Learning

B. SudhakarV. B. NarsimhaG. Narsimaha

Year: 2019 Journal:   International Journal of Engineering and Advanced Technology Vol: 8 (6)Pages: 2852-2861

Abstract

With the rapid growth in the data processing and data sharing, the application owners and the consumers of the applications are more influenced to use the remote storage on cloud-based data centre and the application generated data is also growing ups and bounds. Nevertheless, the adaptation of the data sharing, and data processing applications were not easy for the consumers. The application owners and the service providers have struggled with the sensitive data of the consumers and the consumers were also faced trust issues with the complete framework. The standard legacy applications were designed for the traditional centralized scenarios, where the intrusion detection can be performed only using the network status analysis and the application characteristics analysis. Moreover, most of the parallel calculations initially enhance the hybrid likelihood and change likelihood of GA as indicated by the populace advancement variable-based math and wellness esteem. Nevertheless, the population of data and the attacks on the data is high and the correct population size is highly difficult to determine. Regardless to mention, that the use of fitness functions will restrict the attack detection to certain types and these algorithms are bound to fail in case of a newer attack. However, with the migration of application to the data processing framework, the consumers have started demanding more security against the intrusions. A good number of research attempts were made to map the traditional security algorithms into the data processing space, nonetheless, the attempts were highly criticized due to the lack of proper analysis of security attacks on data processing applications. Hence, this work proposes a novel framework to detect the intrusions on data processing framework with justifying attack characteristics. This work proposes a novel algorithm to reduce the features of attack characteristics to justify the gaps on data processing frameworks with significant reduction in time for processing and further, proposes an algorithm to derive a strong rule engine to analyse the attack characteristics for detecting newer attacks. The complete proposed framework demonstrates nearly 93% and higher accuracy, which is much higher than the existing parallel research outcomes with least time complexity.

Keywords:
Computer science Feature selection Intrusion detection system Population Data sharing Machine learning Data mining Adaptation (eye) Data security Data processing Computer security Data science Database Encryption

Metrics

2
Cited By
0.19
FWCI (Field Weighted Citation Impact)
0
Refs
0.60
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

BOOK-CHAPTER

Machine Learning-Based Hybrid Feature Selection for Improvised Network Intrusion Detection

Pritimayee SatapathyPrafulla Kumar Behera

Communications in computer and information science Year: 2022 Pages: 333-347
JOURNAL ARTICLE

Intrusion Detection using Machine Learning and Feature Selection

Heena MalhotraPrabha Sharma

Journal:   International Journal of Computer Network and Information Security Year: 2019 Vol: 11 (4)Pages: 43-52
JOURNAL ARTICLE

Performance Analysis of Machine Learning-Based Intrusion Detection with Hybrid Feature Selection

Mohammad Al-OmariQasem Abu Al‐Haija

Journal:   Computer Systems Science and Engineering Year: 2024 Vol: 48 (6)Pages: 1537-1555
© 2026 ScienceGate Book Chapters — All rights reserved.