DOI QR코드

DOI QR Code

Hybrid Feature Selection Method Based on a Naïve Bayes Algorithm that Enhances the Learning Speed while Maintaining a Similar Error Rate in Cyber ISR

  • Shin, GyeongIl (Department of Computer Engineering, Se-jong University) ;
  • Yooun, Hosang (Agency for Defense Development) ;
  • Shin, DongIl (Department of Computer Engineering, Se-jong University) ;
  • Shin, DongKyoo (Department of Computer Engineering, Se-jong University)
  • Received : 2018.02.27
  • Accepted : 2018.08.27
  • Published : 2018.12.31

Abstract

Cyber intelligence, surveillance, and reconnaissance (ISR) has become more important than traditional military ISR. An agent used in cyber ISR resides in an enemy's networks and continually collects valuable information. Thus, this agent should be able to determine what is, and is not, useful in a short amount of time. Moreover, the agent should maintain a classification rate that is high enough to select useful data from the enemy's network. Traditional feature selection algorithms cannot comply with these requirements. Consequently, in this paper, we propose an effective hybrid feature selection method derived from the filter and wrapper methods. We illustrate the design of the proposed model and the experimental results of the performance comparison between the proposed model and the existing model.

Keywords

References

  1. Gyeong-Il Shin, Hosang Yooun, DongIl Shin, DongKyoo Shin, "Incremental learning method for cyber intelligence, surveillance, and reconnaissance in closed military network using converged IT techniques," Soft Computing, Vol 22, No. 20, pp.6835-6844, August, 2018. https://doi.org/10.1007/s00500-018-3433-1
  2. Hurley, Matthew M. "For and from cyberspace: Conceptualizing cyber intelligence, surveillance, and reconnaissance," Air & Space Power Journal, Vol. 26, No.6, pp.12-33, December, 2012.
  3. JH. Eom, NU. Kim and SH Kim, "Cyber military strategy for cyberspace superiority in cyber warfare," in Proc. of IEEE Conf. Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) International Conference, pp.295-299, July, 2012.
  4. Sung Soo Choi, Tae Myeong Jeong and Jung ho Eom, "An Introduction of Cyber Warfare Attack and Security Techniques," 1th Edition, HongRung Publishing Company, 2012.
  5. Karri Wihersaari, "Intelligence acquisition methods in cyber domain: examining the circumstantial applicability of cyber intelligence acquisition methods using a hierarchical mode," National Defense University Course Library, pp.1-63, April, 2015.
  6. Song Qinbao, Jingjie Ni, and Guangtao Wang, "A fast clustering-based feature subset selection algorithm for high-dimensional data," IEEE transactions on knowledge and data engineering, Vol 25, No. 1, pp.1-14, August, 2011. https://doi.org/10.1109/TKDE.2011.181
  7. Chandrashekar, Girish, and Ferat Sahin, "A survey on feature selection methods," Computers & Electrical Engineering, Vol 40, No. 1, pp.16-28, January, 2014. https://doi.org/10.1016/j.compeleceng.2013.11.024
  8. Hasan, Md Al Mehedi, et al., "Feature selection for intrusion detection using random forest," Journal of Information Security, Vol 7, No. 3, pp.129-140, July, 2016. https://doi.org/10.4236/jis.2016.73009
  9. Chandolikar, N. S., and V. D. Nandavadekar, "Selection of relevant feature for intrusion attack classification by analyzing KDD Cup 99," MIT International Journal of Computer Science & Information Technology, Vol 2, No. 2, pp.85-90, August, 2012.
  10. Lefakis Leonidas, and François Fleuret, "Jointly informative feature selection made tractable by Gaussian modeling," Journal of Machine Learning Research, Vol 17, No. 182, pp.1-39, 2016.
  11. Leordeanu Marius, Alexandra Radu, and Rahul Sukthankar, "Features in concert: Discriminative feature selection meets unsupervised clustering," arXiv preprint arXiv:1411.7714, November, 2014.
  12. Wen Xuezhi, et al., "Efficient feature selection and classification for vehicle detection," IEEE Transactions on Circuits and Systems for Video Technology, Vol 25, No. 3, pp.508-517, September, 2015. https://doi.org/10.1109/TCSVT.2014.2358031
  13. Hyunjung Ji, Donghwa Kim, Dongil Shin, Dongkyoo Shin, "A Study on comparison of KDD CUP 99 and NSL-KDD using artificial neural network," Lecture Notes in Electrical Engineering, Vol. 474, pp.452-457, December, 2017.
  14. Ian H. Witten, Eibe Frank, Mark A. Hall and Christopher J. Pal, Data Mining, 4th Edition, Morgan Kaufmann, 2017.
  15. Ron Kohavi and George H. John, "Wrappers for feature subset selection," Artificial Intelligence, Vol. 97, pp.273-324, December, 1997. https://doi.org/10.1016/S0004-3702(97)00043-X
  16. Anil Jain and Douglas Zongker, "Feature selection: evaluation, application, and small sample performance," IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 19, No. 2, pp. 153-158, February 1997. https://doi.org/10.1109/34.574797
  17. Huan Liu and Lei Yu, "Toward integrating feature selection algorithms for classification and clustering," IEEE Transactions on Knowledge and Data Engineering, Vol. 17, No. 4, pp. 491-502, March, 2005. https://doi.org/10.1109/TKDE.2005.66
  18. Guyon, Isabelle. and Elisseeff, "An introduction to variable and feature selection," Journal of Machine Learning Research, Vol. 3, pp. 1157-1182, March, 2003.