Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 16 , Issue 1 , PP: 15-24, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

Critical Feature Selection Technique for Improving Performance Classification Model in Adaptive Intrusion Detection System

Anggit Ferdita Nugraha 1 * , Yoga Pristyanto 2 , Beti Wulansari 3 , Dian Prasetya 4

  • 1 Faculty of Computer Science, Universitas Amikom Yogyakarta, Indonesia - (anggitferdita@amikom.ac.id)
  • 2 Faculty of Computer Science, Universitas Amikom Yogyakarta, Indonesia - (yoga.pristyanto@amikom.ac.id)
  • 3 Faculty of Computer Science, Universitas Amikom Yogyakarta, Indonesia - (bety@amikom.ac.id)
  • 4 Faculty of Computer Science, Universitas Amikom Yogyakarta, Indonesia - (dianprasetya772@students.amikom.ac.id)
  • Doi: https://doi.org/10.54216/JCIM.160102

    Received: October 23, 2024 Revised: January 11, 2025 Accepted: February 09, 2025
    Abstract

    A firewall is one of the devices that supports network security, especially at the organizational level. A Firewall's effectiveness in supporting network security is highly dependent on the capabilities and abilities of the Network Administrator. Unfortunately, the high complexity of creating rules and the process of configuring Firewall rules carried out statically by the Network Administrator weakens the effectiveness of the Firewall, and it cannot adapt to increasingly dynamic network pattern changes. Machine Learning is one of the potentials that can be used so that the Firewall can work adaptively. Adaptive Firewall configuration in recognizing various attacks in the network will undoubtedly increase the effectiveness of the Firewall in ensuring network security. The success of the machine learning model performance cannot be separated from the dataset used during the learning process. The dataset used in learning often has a large dimension, but various noises and attributes are irrelevant in representing one class of data. Therefore, it is necessary to support the feature selection technique, which will show the presence of relevant characteristics in the dataset and maximize the machine learning model's performance. This study will be conducted on adding feature selection techniques to develop machine learning models on the Benchmark dataset related to network security. Various popular feature selection techniques will be evaluated, and their performance will be compared based on scenarios between feature selection techniques or scenarios that only use a single classification.

    Keywords :

    Network Security , Firewall , Machine Learning , Feature Selection , Classification

    References

    [1]      H. Liu and B. Lang, “Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey,” Applied Sciences, vol. 9, no. 20, 2019.

    [2]      A. Pinto, L. C. Herrera, Y. Donoso, and J. A. Gutierrez, “Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure,” Sensors, vol. 23, no. 5, pp. 1–18, 2023.

    [3]      B. B. Gupta, K. Yadav, I. Razzak, K. Psannis, A. Castiglione, and X. Chang, “A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment,” Computer Communications, vol. 175, no. April, pp. 47–57, 2021.

    [4]      Z. Azam, M. M. Islam, and M. N. Huda, “Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis through Decision Tree,” IEEE Access, vol. 11, no. August, pp. 80348–80391, 2023.

    [5]      A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, “Survey of intrusion detection systems: techniques, datasets and challenges,” Cybersecurity, vol. 2, no. 1, 2019.

    [6]      Q. A. Al-Haija and A. Ishtaiwi, “Machine Learning Based Model to Identify Firewall Decisions to Improve Cyber-Defense,” International Journal of Advanced Science, Engineering and Information Technology, vol. 11, no. 4, pp. 1688–1695, 2021.

    [7]      F. Abdou Vadhil, M. Lemine Salihi, and M. Farouk Nanne, “Machine learning-based intrusion detection system for detecting web attacks,” IAES International Journal of Artificial Intelligence, vol. 13, no. 1, p. 711, 2024.

    [8]      A. Khraisat and A. Alazab, “A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges,” Cybersecurity, vol. 4, no. 1, 2021.

    [9]      H. Zainel and C. Koçak, “LAN Intrusion Detection Using Convolutional Neural Networks,” Applied Sciences, vol. 12, no. 13, 2022.

    [10]   H. Ahmetoglu and R. Das, “A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions,” Internet of Things (Netherlands), vol. 20, no. May 2022.

    [11]   S. S. Issa, S. Q. Salih, Y. D. Salman, and F. H. Taha, “An Efficient Hybrid Filter-Wrapper Feature Selection Approach for Network Intrusion Detection System,” International Journal of Intelligent Engineering Systems, vol. 16, no. 6, pp. 261–273, 2023.

    [12]   J. Lu, L. Tan, and H. Jiang, “Review on convolutional neural network (CNN) applied to plant leaf disease classification,” Agriculture, vol. 11, no. 8, pp. 1–18, 2021.

    [13]   A. H. A and K. Sundarakantham, “Machine Learning Based Intrusion,” in 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), 2019, pp. 916–920.

    [14]   Z. K. Maseer, R. Yusof, N. Bahaman, S. A. Mostafa, and C. F. M. Foozy, “Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset,” IEEE Access, vol. 9, pp. 22351–22370, 2021.

    [15]   B. A. Tama and S. Lim, “Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation,” Computer Science Review, vol. 39, p. 100357, 2021.

    [16]   W. L. Al-Yaseen, A. K. Idrees, and F. H. Almasoudy, “Wrapper feature selection method based on differential evolution and extreme learning machine for intrusion detection system,” Pattern Recognition, vol. 132, p. 108912, 2022.

    [17]   H. Y. Alshaeaa and Z. M. Ghadhban, “Developing a hybrid feature selection method to detect botnet attacks in IoT devices,” Kuwait Journal of Science, vol. 51, no. 3, p. 100222, 2024.

    [18]   X. Gao, C. Shan, C. Hu, Z. Niu, and Z. Liu, “An Adaptive Ensemble Machine Learning Model for Intrusion Detection,” IEEE Access, vol. 7, pp. 82512–82521, 2019.

    [19]   A. A. Alsulami, Q. Abu Al-Haija, A. Tayeb, and A. Alqahtani, “An Intrusion Detection and Classification System for IoT Traffic with Improved Data Engineering,” Applied Sciences, vol. 12, no. 23, 2022.

    [20]   K. C. Khor, C. Y. Ting, and S. P. Amnuaisuk, “A feature selection approach for network intrusion detection,” in Proceedings of the 2009 International Conference on Information Management and Engineering (ICIME), 2009, pp. 133–137.

    [21]   T. Saranya, S. Sridevi, C. Deisy, T. D. Chung, and M. K. A. A. Khan, “Performance Analysis of Machine Learning Algorithms in Intrusion Detection System: A Review,” Procedia Computer Science, vol. 171, no. 2019, pp. 1251–1260, 2020.

    [22]   C. Kalimuthan and J. Arokia Renjit, “Review on intrusion detection using feature selection with machine learning techniques,” Materials Today: Proceedings, vol. 33, pp. 3794–3802, 2020.

    [23]   A. K. Dey, G. P. Gupta, and S. P. Sahu, “Hybrid Meta-Heuristic based Feature Selection Mechanism for Cyber-Attack Detection in IoT-enabled Networks,” Procedia Computer Science, vol. 218, pp. 318–327, 2022.

    Cite This Article As :
    Ferdita, Anggit. , Pristyanto, Yoga. , Wulansari, Beti. , Prasetya, Dian. Critical Feature Selection Technique for Improving Performance Classification Model in Adaptive Intrusion Detection System. Journal of Cybersecurity and Information Management, vol. , no. , 2025, pp. 15-24. DOI: https://doi.org/10.54216/JCIM.160102
    Ferdita, A. Pristyanto, Y. Wulansari, B. Prasetya, D. (2025). Critical Feature Selection Technique for Improving Performance Classification Model in Adaptive Intrusion Detection System. Journal of Cybersecurity and Information Management, (), 15-24. DOI: https://doi.org/10.54216/JCIM.160102
    Ferdita, Anggit. Pristyanto, Yoga. Wulansari, Beti. Prasetya, Dian. Critical Feature Selection Technique for Improving Performance Classification Model in Adaptive Intrusion Detection System. Journal of Cybersecurity and Information Management , no. (2025): 15-24. DOI: https://doi.org/10.54216/JCIM.160102
    Ferdita, A. , Pristyanto, Y. , Wulansari, B. , Prasetya, D. (2025) . Critical Feature Selection Technique for Improving Performance Classification Model in Adaptive Intrusion Detection System. Journal of Cybersecurity and Information Management , () , 15-24 . DOI: https://doi.org/10.54216/JCIM.160102
    Ferdita A. , Pristyanto Y. , Wulansari B. , Prasetya D. [2025]. Critical Feature Selection Technique for Improving Performance Classification Model in Adaptive Intrusion Detection System. Journal of Cybersecurity and Information Management. (): 15-24. DOI: https://doi.org/10.54216/JCIM.160102
    Ferdita, A. Pristyanto, Y. Wulansari, B. Prasetya, D. "Critical Feature Selection Technique for Improving Performance Classification Model in Adaptive Intrusion Detection System," Journal of Cybersecurity and Information Management, vol. , no. , pp. 15-24, 2025. DOI: https://doi.org/10.54216/JCIM.160102