SELEKSI FITUR MENGGUNAKAN MUTUAL INFORMATION UNTUK DETEKSI INTRUSI

Authors

  • Riki Andri Yusda Universitas Royal http://orcid.org/0000-0002-6880-4369
  • Sahren Sahren Universitas Royal
  • Mustika Fitri Larasati Sibuea Universitas Royal
  • Nadira Meutia Arifin Universitas Royal
  • Bima Aditya Universitas Royal

DOI:

https://doi.org/10.54314/jssr.v8i3.3112

Abstract

Abstract: This study explores the use of Mutual Information (MI) for feature selection in intrusion detection, focusing on the CICIDS 2017 dataset. Given the complexity and large volume of data in intrusion detection systems, this research aims to identify the most informative features. The methodology includes data preprocessing, MI calculation, and feature selection based on the highest MI values. The analysis results indicate that using MI contributes to improving model accuracy and reducing the false positive rate. These findings underscore the importance of feature selection in enhancing the effectiveness of intrusion detection systems and provide significant contributions to developing more efficient cybersecurity strategies.

 

Keyword: IDS, Mutual Information, CICIDS2017, Feature selection

 

Abstrak: Penelitian ini mengeksplorasi penggunaan Mutual Information (MI) untuk seleksi fitur dalam deteksi intrusi, dengan fokus pada dataset CICIDS 2017. Mengingat kompleksitas dan volume data yang besar dalam sistem deteksi intrusi, penelitian ini bertujuan untuk mengidentifikasi fitur-fitur yang paling informatif. Metodologi yang diterapkan mencakup preprocessing data, perhitungan MI, dan seleksi fitur berdasarkan nilai MI tertinggi. Hasil analisis menunjukkan bahwa penggunaan MI berkontribusi pada peningkatan akurasi model serta pengurangan tingkat false positive. Temuan ini menegaskan pentingnya seleksi fitur dalam meningkatkan efektivitas sistem deteksi intrusi dan memberikan kontribusi signifikan dalam pengembangan strategi keamanan siber yang lebih efisien.

 

Kata kunci: IDS, Mutual Information, CICIDS2017, Seleksi fitur

Downloads

Download data is not yet available.

References

Afolabi, A. S., & Akinola, O. A. (2024). Network Intrusion Detection Using Knapsack Optimization, Mutual Information Gain, and Machine Learning. Journal of Electrical and Computer Engineering, 2024, 1–21. https://doi.org/10.1155/2024/7302909

Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1). https://doi.org/10.1002/ett.4150

Al-E’mari, S., Sanjalawe, Y., Alsmadi, D., Alduweib, E., & Alharbi, A. (2024). EMPLOYING MUTUAL INFORMATION FEATURE SELECTION AND LIGHTGBM FOR INTRUSION DETECTION IN IOT. ICIC Express Letters, 18(6), 597–606. https://doi.org/10.24507/icicel.18.06.597

Barkah, A. S., Selamat, S. R., Abidin, Z. Z., & Wahyudi, R. (2023). Data Generative Model to Detect the Anomalies for IDS Imbalance CICIDS2017 Dataset. TEM Journal, 12(1), 80–89. https://doi.org/10.18421/TEM121-11

Kurniabudi, Stiawan, D., Darmawijoyo, Bin Idris, M. Y. Bin, Bamhdi, A. M., & Budiarto, R. (2020). CICIDS-2017 Dataset Feature Analysis with Information Gain for Anomaly Detection. IEEE Access, 8, 132911–132921. https://doi.org/10.1109/ACCESS.2020.3009843

Kushwaha, J. P., Bhadauria, S., & Tapaswi, S. (2023). Multi-Method Stacked Feature Selection Approach based IDS for IoT Networks. Procedia Computer Science, 230, 564–573. https://doi.org/10.1016/j.procs.2023.12.112

Latif, S., Boulila, W., Koubaa, A., Zou, Z., & Ahmad, J. (2024). DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm. Journal of Network and Computer Applications, 221. https://doi.org/10.1016/j.jnca.2023.103784

Ogwara, N. O., Petrova, K., Yang, M. L., & Tan, L. (2022). Towards the Development of a Cloud Computing Intrusion Detection Framework Using an Ensemble Hybrid Feature Selection Approach. Journal of Computer Networks and Communications, 2022. https://doi.org/10.1155/2022/5988567

Oyelakin, A. M., Ameen, A. O., Ogendele, T. S., Salau-Ibrahim, T., Abdulrauf, U. T., Olufadi, H. I., & Ajiboye, I. K. (2024). Overview and Exploratory Analyses of CICIDS2017 Intrusion Detection Dataset. Indonesian Journal of Data and Science, 4(3). https://doi.org/10.56705/ijodas.v4i3.80

Prazeres, N., Costa, R. L. de C., Santos, L., & Rabadão, C. (2023). Engineering the application of machine learning in an IDS based on IoT traffic flow. Intelligent Systems with Applications, 17. https://doi.org/10.1016/j.iswa.2023.200189

Sahu, D. P., Tripathy, B., & Samantaray, L. (2024). FogNet: Custom CNN with optimal feature selection-based combat model for secured fog computing environment. E-Prime - Advances in Electrical Engineering, Electronics and Energy, 8. https://doi.org/10.1016/j.prime.2024.100604

Saq, A. H. A., Zainal, A., Al-Rimy, B. A. S., Alyami, A., & Abosaq, H. A. (2024). Intrusion Detection in IoT using Gaussian Fuzzy Mutual Information-based Feature Selection. Engineering, Technology and Applied Science Research, 14(6), 17564–17571. https://doi.org/10.48084/etasr.8268

Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018). Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSP 2018 - Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018-January, 108 116. https://doi.org/10.5220/0006639801080116

Yang, Y., & Peng, X. (2025). BERT-based network for intrusion detection system. Eurasip Journal on Information Security, 2025(1). https://doi.org/10.1186/s13635-025-00191-w

Zhou, H., Wang, X., & Zhang, Y. (2024). Feature selection based on weighted conditional mutual information. Applied Computing and Informatics, 20(1–2), 55–68. https://doi.org/10.1016/j.aci.2019.12.003

Downloads

Published

2025-08-28

How to Cite

SELEKSI FITUR MENGGUNAKAN MUTUAL INFORMATION UNTUK DETEKSI INTRUSI. (2025). JOURNAL OF SCIENCE AND SOCIAL RESEARCH, 8(3), 3482-3490. https://doi.org/10.54314/jssr.v8i3.3112

Most read articles by the same author(s)

1 2 > >>