Enhanced Intrusion Detection Systems via Feature Selection and Dimensionality Reduction Techniques

International Journal of Electronics and Communication Engineering
© 2025 by SSRG - IJECE Journal
Volume 12 Issue 2
Year of Publication : 2025
Authors : Ranjeeth Kumar Sundararajan, R. Rajakumar, N. Kurinjivendhan, Banumathi Subramanian
pdf
How to Cite?

Ranjeeth Kumar Sundararajan, R. Rajakumar, N. Kurinjivendhan, Banumathi Subramanian, "Enhanced Intrusion Detection Systems via Feature Selection and Dimensionality Reduction Techniques," SSRG International Journal of Electronics and Communication Engineering, vol. 12,  no. 2, pp. 12-26, 2025. Crossref, https://doi.org/10.14445/23488549/IJECE-V12I2P102

Abstract:

Due to the rapid development of modern networks, nowadays Intrusion Detection Systems (IDS) play a significant role in network security by detecting malicious activities or anomalies. However, the large dimensionality of network traffic data can undermine IDS efficacy, increasing processing complexity and perhaps reducing accuracy. This study explores these challenges by proposing a hybrid approach integrating Feature Selection (FS) and Dimensionality Reduction (DR) techniques. On the benchmark datasets NSL-KDD and KDDcup99, we compare various FS methods, such as filter-based, embedded-based, and wrapper-based, by selecting subsets of features to optimize IDS performance. Additionally, we explore Dimensionality Reduction techniques (DR) such as Principal Component Analysis (PCA) and Singular Values Decomposition (SVD), reducing the number of the features while maintaining accuracies of 88.91% and 70.61% on the KDDcup99 and NSL KDD test datasets and also with minimal runtime of 0.0513 and 0.0127 seconds respectively. Our findings show that hybrid FS and DR techniques improve IDS accuracy while drastically reducing computational overhead and increasing the efficiency and reliability of intrusion detection systems in real-world applications.

Keywords:

Intrusion Detection Systems (IDS), Anomaly detection, Machine Learning, Feature Selection, Dimensionality Reduction.

References:

[1] S. Al-Helli, and A. Akbas, “Guided Feature Selection and Dimensionality Reduction Method for IDS Improvement in DDoS Attacks,” International Conference on Engineering Technologies, Konya, Turkey, pp. 75-80, 2020.
[Google Scholar] [Publisher Link]
[2] Ankit Thakkar, and Ritika Lohiya, “Attack Classification Using Feature Selection Techniques: A Comparative Study,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 1249-1266, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Arshid Ali et al., “Network Intrusion Detection Leveraging Machine Learning and Feature Selection,” IEEE 17th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET), Charlotte, NC, USA, pp. 49-53, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Raghava Satya SaiKrishna Dittakavi, “Dimensionality Reduction Based Intrusion Detection System in Cloud Computing Environment Using Machine Learning,” International Journal of Information and Cybersecurity, vol. 6, no. 1, pp. 62-81, 2022.
[Google Scholar] [Publisher Link]
[5] Fadi Salo, Ali Bou Nassif, and Aleksander Essex, “Dimensionality Reduction with IG-PCA and Ensemble Classifier for Network Intrusion Detection,” Computer Networks, vol. 148, pp. 164-175, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[6] M. Di Mauro et al., “Supervised Feature Selection Techniques in Network Intrusion Detection: A Critical Review,” Engineering Applications of Artificial Intelligence, vol. 101, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Ghanshyam Prasad Dubey, and Rakesh Kumar Bhujade, “Optimal Feature Selection for Machine Learning Based Intrusion Detection System by Exploiting Attribute Dependence,” Materials Today: Proceedings, vol. 47, no. 17, pp. 6325-6331, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Gulab Sah, and Subhasish Banerjee, “Feature Reduction and Classifications Techniques for Intrusion Detection System,” International Conference on Communication and Signal Processing, India, pp. 1543-1547, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Majdi Maabreh et al., “Towards Data-Driven Network Intrusion Detection Systems: Features Dimensionality Reduction and Machine Learning,” International Journal of Interactive Mobile Technologies, vol. 16, no. 14, pp. 1-13, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Majid Torabi et al., “A Review on Feature Selection and Ensemble Techniques for Intrusion Detection System,” International Journal of Advanced Computer Science and Applications, vol. 12, no. 5, pp. 1-16, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Muhammad Naveed et al., “A Deep Learning-Based Framework for Feature Extraction and Classification of Intrusion Detection in Networks,” Wireless Communication and Mobile Computing, vol. 2022, no. 1, pp. 1-11, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Razan Abdulhammed et al., “Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection,” Electronics, vol. 8, no. 3, pp. 1-27, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Razan Abdulhammed et al., “Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection,” Electronics, vol. 8, no. 3, pp. 1-27, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Rami Ahmad et al., “Feature-Selection and Mutual-Clustering Approaches to Improve DoS Detection and Maintain WSNs’ Lifetime,” Sensors, vol. 21, no. 14, pp. 1-25, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Surendra Yadav et al., “Mitigation of Attacks via Improved Network Security in IOT Network Environment Using RNN,” Measurement: Sensors, vol. 32, pp. 1-8, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Thi-Thu-Huong Le, Yongsu Kim, and Howon Kim, “Network Intrusion Detection Based on Novel Feature Selection Model and Various Recurrent Neural Networks,” Applied Sciences, vol. 9, no. 7, pp. 1-29, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[17] B. Venkatesh, and J. Anuradha, “A Review of Feature Selection and Its Methods,” Cybernetics and Information Technologies, vol. 19, no. 1, pp. 1-24, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Qingfeng Li et al., “An Intrusion Detection Model Based on Feature Selection and Improved One-Dimensional Convolutional Neural Network,” International Journal of Distributed Sensor Network, vol. 2023, no. 1, pp. 1-12, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Yuyang Zhou et al., “Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier,” Computer Networks, vol. 174, 2020.
[CrossRef] [Google Scholar] [Publisher Link]