{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T04:14:46Z","timestamp":1768536886643,"version":"3.49.0"},"reference-count":48,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"abstract":"<jats:p>The duplicate and insignificant features present in the data set to cause a long-term problem in the classification of network or web traffic. The insignificant features not only decrease the classification performance but also prevent a classifier from making accurate decisions, exclusively when substantial volumes of data are managed. In this article, the author introduced an ensemble feature selection (EFS) technique, where multiple homogeneous feature selection (FS) methods are combined to choose the optimal subset of relevant and non-redundant features. An intrusion detection system, named support vector machine-based IDS (SVM-IDS), is prompted using the feature selected by the proposed method. The SVM-IDS performance is evaluated using two benchmark datasets of intrusion detection, including KDD Cup 99 and NSL-KDD. Our proposed method provided more significant features for SVM-IDS and compared with the other state-of-the-art methods. The experimental results demonstrate that proposed method achieves a maximum accuracy as 98.95% in KDD Cup 99 data set and 98.12% in the NSL-KDD data set.<\/jats:p>","DOI":"10.4018\/ijisp.201907010102","type":"journal-article","created":{"date-parts":[[2019,6,26]],"date-time":"2019-06-26T14:50:10Z","timestamp":1561560610000},"page":"31-47","source":"Crossref","is-referenced-by-count":23,"title":["Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection"],"prefix":"10.4018","volume":"13","author":[{"given":"Alok Kumar","family":"Shukla","sequence":"first","affiliation":[{"name":"NIT Raipur, Raipur, India"}]},{"given":"Pradeep","family":"Singh","sequence":"additional","affiliation":[{"name":"NIT Raipur, Raipur, India"}]}],"member":"2432","reference":[{"key":"IJISP.201907010102-0","first-page":"5","article-title":"Discriminative Multinomial Na\u00efve Bayes for Network Intrusion Detection","author":"A.Abraham","year":"2010","journal-title":"2010 Sixth International Conference on Information Assurance and Security"},{"key":"IJISP.201907010102-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.06.001"},{"key":"IJISP.201907010102-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.07.005"},{"key":"IJISP.201907010102-3","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2519914"},{"key":"IJISP.201907010102-4","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.387"},{"key":"IJISP.201907010102-5","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2015.2478454"},{"key":"IJISP.201907010102-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.06.016"},{"key":"IJISP.201907010102-7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.007"},{"key":"IJISP.201907010102-8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6154-8"},{"key":"IJISP.201907010102-9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6154-8_49"},{"key":"IJISP.201907010102-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.09.008"},{"key":"IJISP.201907010102-11","author":"T.Cover","year":"2006","journal-title":"Elements of Information Theory"},{"key":"IJISP.201907010102-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2017.01.004"},{"key":"IJISP.201907010102-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.08.013"},{"key":"IJISP.201907010102-14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40846-5_11"},{"key":"IJISP.201907010102-15","doi-asserted-by":"publisher","DOI":"10.1142\/S0219720005001004"},{"key":"IJISP.201907010102-16","doi-asserted-by":"publisher","DOI":"10.1145\/3067695.3082471"},{"key":"IJISP.201907010102-17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2012.05.019"},{"key":"IJISP.201907010102-18","doi-asserted-by":"publisher","DOI":"10.1007\/s10182-011-0155-4"},{"key":"IJISP.201907010102-19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32129-0_34"},{"key":"IJISP.201907010102-20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32129-0_34"},{"key":"IJISP.201907010102-21","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.10.028"},{"key":"IJISP.201907010102-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.04.019"},{"key":"IJISP.201907010102-23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.06.005"},{"key":"IJISP.201907010102-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.066"},{"key":"IJISP.201907010102-25","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846201"},{"key":"IJISP.201907010102-26","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.07.032"},{"key":"IJISP.201907010102-27","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2017.03.018"},{"key":"IJISP.201907010102-28","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.12.010"},{"key":"IJISP.201907010102-29","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2008.923858"},{"issue":"10","key":"IJISP.201907010102-30","first-page":"259","article-title":"Feature Deduction and Ensemble Design of Parallel Neural Networks for Intrusion Detection System.","volume":"10","author":"S.Muhammad","year":"2010","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"IJISP.201907010102-31","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.05.017"},{"key":"IJISP.201907010102-32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2004.01.003"},{"key":"IJISP.201907010102-33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2013.10.003"},{"key":"IJISP.201907010102-34","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0623-3"},{"key":"IJISP.201907010102-35","doi-asserted-by":"crossref","unstructured":"Pervez, M. S., & Farid, D. (2014). Feature Selection and Intrusion classification in NSL-KDD Cup 99 Dataset Employing SVMs. In 2014 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA) (pp. 1\u20136). IEEE.","DOI":"10.1109\/SKIMA.2014.7083539"},{"key":"IJISP.201907010102-36","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846200"},{"key":"IJISP.201907010102-37","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.105"},{"key":"IJISP.201907010102-38","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2016.12.004"},{"issue":"7","key":"IJISP.201907010102-39","doi-asserted-by":"crossref","first-page":"1768","DOI":"10.1109\/TBME.2015.2403616","article-title":"A comparison of SVM and GMM-based classifier configurations for diagnostic classification of pulmonary sounds.","volume":"62","author":"I.Sen","year":"2015","journal-title":"IEEE Transactions on Biomedical Engineering"},{"key":"IJISP.201907010102-40","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1978672.1978676","article-title":"Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation.","author":"J.Song","year":"2011","journal-title":"Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security"},{"issue":"3","key":"IJISP.201907010102-41","first-page":"488","article-title":"Gender classification based on fusion of different spatial scale features selected by mutual information from histogram of LBP","volume":"8","author":"J. E.Tapia","year":"2013","journal-title":"Intensity, and Shape"},{"key":"IJISP.201907010102-42","first-page":"1","article-title":"A detailed analysis of the KDD CUP 99 data set.","author":"M.Tavallaee","year":"2009","journal-title":"IEEE Symposium on Computational Intelligence for Security and Defense Applications CISDA 2009"},{"key":"IJISP.201907010102-43","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.05.002"},{"key":"IJISP.201907010102-44","first-page":"428","article-title":"A hybrid intelligent intrusion detection system to recognize novel attacks.","author":"D. R.Tsai","year":"2003","journal-title":"Proceedings IEEE 37th Annual 2003 International Carnahan Conference on Security Technology"},{"key":"IJISP.201907010102-45","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.12.009"},{"key":"IJISP.201907010102-46","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2016.12.002"},{"key":"IJISP.201907010102-47","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2375218"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=232667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T19:58:33Z","timestamp":1651780713000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.201907010102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":48,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.4018\/ijisp.201907010102","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7]]}}}