Research Article

Comparison of Performance of Classification Algorithms Using Standard Deviation-based Feature Selection in Cyber Attack Datasets

Volume: 9 Number: 1 June 30, 2023
TR EN

Comparison of Performance of Classification Algorithms Using Standard Deviation-based Feature Selection in Cyber Attack Datasets

Abstract

Supervised machine learning techniques are commonly used in many areas like finance, education, healthcare, engineering, etc. because of their ability to learn from past data. However, such techniques can be very slow if the dataset is high-dimensional, and also irrelevant features may reduce classification success. Therefore, feature selection or feature reduction techniques are commonly used to overcome the mentioned issues. On the other hand, information security for both people and networks is crucial, and it must be secured without wasting the time. Hence, feature selection approaches that can make the algorithms faster without reducing the classification success are needed. In this study, we compare both the classification success and run-time performance of state-of-the-art classification algorithms using standard deviation-based feature selection in the aspect of security datasets. For this purpose, we applied standard deviation-based feature selection to KDD Cup 99 and Phishing Legitimate datasets for selecting the most relevant features, and then we run the selected classification algorithms on the datasets to compare the results. According to the obtained results, while the classification success of all algorithms is satisfying Decision Tree (DT) was the best one among others. On the other hand, while Decision Tree, k Nearest Neighbors, and Naïve Bayes (BN) were sufficiently fast, Support Vector Machine (SVM) and Artificial Neural Networks (ANN or NN) were too slow.

Keywords

References

  1. Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L. F. and Abdulkadir, S. J. J. E. (2022). Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review. 11(2), 198.
  2. Ali, N., Neagu, D. and Trundle, P. J. S. A. S. (2019). Evaluation of k-nearest neighbour classifier performance for heterogeneous data sets. 1, 1-15.
  3. Aljabri, M. and Mirza, S. (2022). Phishing Attacks Detection using Machine Learning and Deep Learning Models, 7th International Conference on Data Science and Machine Learning Applications (CDMA), Riyadh, Saudi Arabia, 2022, pp. 175-180, doi: 10.1109/CDMA54072.2022.00034.
  4. Almaiah, M. A., Al-Zahrani, A., Almomani, O. and Alhwaitat, A. K. (2021). Classification of cyber security threats on mobile devices and applications. In Artificial Intelligence and Blockchain for Future Cybersecurity Applications (pp. 107-123): Springer.
  5. Ansari, M. F., Sharma, P. K. and Dash, B. J. P. (2022). Prevention of phishing attacks using AI-based Cybersecurity Awareness Training.
  6. Bahaa, A., Abdelaziz, A., Sayed, A., Elfangary, L. and Fahmy, H. J. I. (2021). Monitoring real time security attacks for IoT systems using DevSecOps: a systematic literature review. 12(4), 154.
  7. Breiman, L. (2001). Random Forests. Machine Learning, 45(1), 5-32. doi:10.1023/A:1010933404324
  8. Çetin, V. and Yıldız, O. (2022). A comprehensive review on data preprocessing techniques in data analysis. Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi, 28(2), 299-312.

Details

Primary Language

English

Subjects

Engineering

Journal Section

Research Article

Early Pub Date

June 23, 2023

Publication Date

June 30, 2023

Submission Date

April 7, 2023

Acceptance Date

June 14, 2023

Published in Issue

Year 2023 Volume: 9 Number: 1

APA
Şenol, A. (2023). Comparison of Performance of Classification Algorithms Using Standard Deviation-based Feature Selection in Cyber Attack Datasets. International Journal of Pure and Applied Sciences, 9(1), 209-222. https://doi.org/10.29132/ijpas.1278880
AMA
1.Şenol A. Comparison of Performance of Classification Algorithms Using Standard Deviation-based Feature Selection in Cyber Attack Datasets. International Journal of Pure and Applied Sciences. 2023;9(1):209-222. doi:10.29132/ijpas.1278880
Chicago
Şenol, Ali. 2023. “Comparison of Performance of Classification Algorithms Using Standard Deviation-Based Feature Selection in Cyber Attack Datasets”. International Journal of Pure and Applied Sciences 9 (1): 209-22. https://doi.org/10.29132/ijpas.1278880.
EndNote
Şenol A (June 1, 2023) Comparison of Performance of Classification Algorithms Using Standard Deviation-based Feature Selection in Cyber Attack Datasets. International Journal of Pure and Applied Sciences 9 1 209–222.
IEEE
[1]A. Şenol, “Comparison of Performance of Classification Algorithms Using Standard Deviation-based Feature Selection in Cyber Attack Datasets”, International Journal of Pure and Applied Sciences, vol. 9, no. 1, pp. 209–222, June 2023, doi: 10.29132/ijpas.1278880.
ISNAD
Şenol, Ali. “Comparison of Performance of Classification Algorithms Using Standard Deviation-Based Feature Selection in Cyber Attack Datasets”. International Journal of Pure and Applied Sciences 9/1 (June 1, 2023): 209-222. https://doi.org/10.29132/ijpas.1278880.
JAMA
1.Şenol A. Comparison of Performance of Classification Algorithms Using Standard Deviation-based Feature Selection in Cyber Attack Datasets. International Journal of Pure and Applied Sciences. 2023;9:209–222.
MLA
Şenol, Ali. “Comparison of Performance of Classification Algorithms Using Standard Deviation-Based Feature Selection in Cyber Attack Datasets”. International Journal of Pure and Applied Sciences, vol. 9, no. 1, June 2023, pp. 209-22, doi:10.29132/ijpas.1278880.
Vancouver
1.Ali Şenol. Comparison of Performance of Classification Algorithms Using Standard Deviation-based Feature Selection in Cyber Attack Datasets. International Journal of Pure and Applied Sciences. 2023 Jun. 1;9(1):209-22. doi:10.29132/ijpas.1278880

Cited By

download?token=eyJ1aWQiOjExNDQyMSwiYXV0aF9yb2xlcyI6WyJST0xFX1VTRVIiXSwiZW5kcG9pbnQiOiJqb3VybmFsIiwib3JpZ2luYWxuYW1lIjoiVFJEaXppbmxvZ29fbGl2ZS1lMTU4Njc2Mzk1Nzc0Ni5wbmciLCJwYXRoIjoiZmQ0MS83M2Q5LzM2NDkvNjlhMDA3ODA1YTlmMTcuOTY1MTM2NDYucG5nIiwiZXhwIjoxNzcyMDk4OTYwLCJub25jZSI6IjZiYTZlMjJkZWUxOWZkZmQ0Y2Y5ZGU2ZDM5ZGYxYWIwIn0.cBh4PLOiOk2HZxiMIuHbYkE-VqlAI6yS9_1ogzjRrlY

154501544915448154471544615445