Intrusion detection using decision tree classifier with feature reduction technique

  • Syed Atir Raza Shirazi School of Information Technology, Minhaj University Lahore Pakistan
  • Sania Shamim School of Systems and Technology, University of Management and Technology Lahore Pakistan
  • Abdul Hannan Khan School of Information Technology, Minhaj University Lahore Pakistan
  • Aqsa Anwar School of Software Engineering, Minhaj University Lahore Pakistan

Abstract

The number of internet users and network services is increasing rapidly in the recent decade gradually. A Large volume of data is produced and transmitted over the network. Number of security threats to the network has also been increased. Although there are many machine learning approaches and methods are used in intrusion detection systems to detect the attacks, but generally they are not efficient for large datasets and real time detection. Machine learning classifiers using all features of datasets minimized the accuracy of detection for classifier. A reduced feature selection technique that selects the most relevant features to detect the attack with ML approach has been used to obtain higher accuracy. In this paper, we used recursive feature elimination technique and selected more relevant features with machine learning approaches for big data to meet the challenge of detecting the attack. We applied this technique and classifier to NSL KDD dataset. Results showed that selecting all features for detection can maximize the complexity in the context of large data and performance of classifier can be increased by feature selection best in terms of efficiency and accuracy.

Published
Mar 28, 2023
How to Cite
SHIRAZI, Syed Atir Raza et al. Intrusion detection using decision tree classifier with feature reduction technique. Mehran University Research Journal of Engineering and Technology, [S.l.], v. 42, n. 2, p. 30-37, mar. 2023. ISSN 2413-7219. Available at: <https://publications.muet.edu.pk/index.php/muetrj/article/view/2420>. Date accessed: 25 nov. 2024. doi: http://dx.doi.org/10.22581/muet1982.2302.04.
Section
Articles
This is an open Access Article published by Mehran University of Engineering and Technolgy, Jamshoro under CCBY 4.0 International License