Effects of feature transformation and selection on classification of network traffic activities

As new technologies are emerging day by day, network, regardless of the Internet or Intranet within a corporation often plays a crucial role in connecting people from all around the world. From military use to achieving business goals and household need, data security often get attention from comput...

Full description

Saved in:
Bibliographic Details
Main Author: Lim, Wen Ying
Format: Thesis
Language:English
Published: 2015
Online Access:https://eprints.ums.edu.my/id/eprint/12079/1/mt0000000677.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-ums-ep.12079
record_format uketd_dc
spelling my-ums-ep.120792017-11-07T07:31:19Z Effects of feature transformation and selection on classification of network traffic activities 2015 Lim, Wen Ying As new technologies are emerging day by day, network, regardless of the Internet or Intranet within a corporation often plays a crucial role in connecting people from all around the world. From military use to achieving business goals and household need, data security often get attention from computer scientists. Traditional security measures that include the installation of firewall and antivirus software are commonly utilised to prevent intrusion. However, such types of defence are merely sufficient to secure a network and data travelling across it. Thus, second lines of defence like Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) are introduced to overcome the inadequacy of traditional security measures. Generally, IDS uses two approaches, the Anomaly Detection (A-IDS) and the Misuse Detection in order to identify patterns of intrusion. A-IDS often perform comparison of the model of normal and anomalous model. Depending on the ability to measure similarity or distance between a target and a known type, comparison is made to determine whether to establish a new target anomalous or not. This research aims to investigate the effects of feature transformation on the classification of network activities; the focus is to represent the data into point series form to permit the application of Time Series Classification (TSC). The TSC technique used is k-Nearest Neighbour (KNN) coupled with Dynamic Time Warping. Effects of using different similarity measures, Euclidean Distance (ED) and Cosine similarity algorithm are also investigated. Experiments conducted involve conversion of the categorical data by three different conversion techniques to generate point series data – simple, probability and entropy conversion. Comparison between different classifiers is also conducted. The performance of the classifier is best using 1NN with Euclidean distance and entropy conversion for categorical data, where the recorded accuracy is 99.19%. 2015 Thesis https://eprints.ums.edu.my/id/eprint/12079/ https://eprints.ums.edu.my/id/eprint/12079/1/mt0000000677.pdf text en public masters Universiti Malaysia Sabah Faculty of Computing and Informatics
institution Universiti Malaysia Sabah
collection UMS Institutional Repository
language English
description As new technologies are emerging day by day, network, regardless of the Internet or Intranet within a corporation often plays a crucial role in connecting people from all around the world. From military use to achieving business goals and household need, data security often get attention from computer scientists. Traditional security measures that include the installation of firewall and antivirus software are commonly utilised to prevent intrusion. However, such types of defence are merely sufficient to secure a network and data travelling across it. Thus, second lines of defence like Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) are introduced to overcome the inadequacy of traditional security measures. Generally, IDS uses two approaches, the Anomaly Detection (A-IDS) and the Misuse Detection in order to identify patterns of intrusion. A-IDS often perform comparison of the model of normal and anomalous model. Depending on the ability to measure similarity or distance between a target and a known type, comparison is made to determine whether to establish a new target anomalous or not. This research aims to investigate the effects of feature transformation on the classification of network activities; the focus is to represent the data into point series form to permit the application of Time Series Classification (TSC). The TSC technique used is k-Nearest Neighbour (KNN) coupled with Dynamic Time Warping. Effects of using different similarity measures, Euclidean Distance (ED) and Cosine similarity algorithm are also investigated. Experiments conducted involve conversion of the categorical data by three different conversion techniques to generate point series data – simple, probability and entropy conversion. Comparison between different classifiers is also conducted. The performance of the classifier is best using 1NN with Euclidean distance and entropy conversion for categorical data, where the recorded accuracy is 99.19%.
format Thesis
qualification_level Master's degree
author Lim, Wen Ying
spellingShingle Lim, Wen Ying
Effects of feature transformation and selection on classification of network traffic activities
author_facet Lim, Wen Ying
author_sort Lim, Wen Ying
title Effects of feature transformation and selection on classification of network traffic activities
title_short Effects of feature transformation and selection on classification of network traffic activities
title_full Effects of feature transformation and selection on classification of network traffic activities
title_fullStr Effects of feature transformation and selection on classification of network traffic activities
title_full_unstemmed Effects of feature transformation and selection on classification of network traffic activities
title_sort effects of feature transformation and selection on classification of network traffic activities
granting_institution Universiti Malaysia Sabah
granting_department Faculty of Computing and Informatics
publishDate 2015
url https://eprints.ums.edu.my/id/eprint/12079/1/mt0000000677.pdf
_version_ 1747836439837540352