SELEKSI FITUR MENGGUNAKAN MUTUAL INFORMATION UNTUK DETEKSI INTRUSI
DOI:
https://doi.org/10.54314/jssr.v8i3.3112Abstrak
Abstract: This study explores the use of Mutual Information (MI) for feature selection in intrusion detection, focusing on the CICIDS 2017 dataset. Given the complexity and large volume of data in intrusion detection systems, this research aims to identify the most informative features. The methodology includes data preprocessing, MI calculation, and feature selection based on the highest MI values. The analysis results indicate that using MI contributes to improving model accuracy and reducing the false positive rate. These findings underscore the importance of feature selection in enhancing the effectiveness of intrusion detection systems and provide significant contributions to developing more efficient cybersecurity strategies.
Â
Keyword: IDS, Mutual Information, CICIDS2017, Feature selection
Â
Abstrak: Penelitian ini mengeksplorasi penggunaan Mutual Information (MI) untuk seleksi fitur dalam deteksi intrusi, dengan fokus pada dataset CICIDS 2017. Mengingat kompleksitas dan volume data yang besar dalam sistem deteksi intrusi, penelitian ini bertujuan untuk mengidentifikasi fitur-fitur yang paling informatif. Metodologi yang diterapkan mencakup preprocessing data, perhitungan MI, dan seleksi fitur berdasarkan nilai MI tertinggi. Hasil analisis menunjukkan bahwa penggunaan MI berkontribusi pada peningkatan akurasi model serta pengurangan tingkat false positive. Temuan ini menegaskan pentingnya seleksi fitur dalam meningkatkan efektivitas sistem deteksi intrusi dan memberikan kontribusi signifikan dalam pengembangan strategi keamanan siber yang lebih efisien.
Â
Kata kunci: IDS, Mutual Information, CICIDS2017, Seleksi fitur
Unduhan
Referensi
Afolabi, A. S., & Akinola, O. A. (2024). Network Intrusion Detection Using Knapsack Optimization, Mutual Information Gain, and Machine Learning. Journal of Electrical and Computer Engineering, 2024, 1–21. https://doi.org/10.1155/2024/7302909
Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1). https://doi.org/10.1002/ett.4150
Al-E’mari, S., Sanjalawe, Y., Alsmadi, D., Alduweib, E., & Alharbi, A. (2024). EMPLOYING MUTUAL INFORMATION FEATURE SELECTION AND LIGHTGBM FOR INTRUSION DETECTION IN IOT. ICIC Express Letters, 18(6), 597–606. https://doi.org/10.24507/icicel.18.06.597
Barkah, A. S., Selamat, S. R., Abidin, Z. Z., & Wahyudi, R. (2023). Data Generative Model to Detect the Anomalies for IDS Imbalance CICIDS2017 Dataset. TEM Journal, 12(1), 80–89. https://doi.org/10.18421/TEM121-11
Kurniabudi, Stiawan, D., Darmawijoyo, Bin Idris, M. Y. Bin, Bamhdi, A. M., & Budiarto, R. (2020). CICIDS-2017 Dataset Feature Analysis with Information Gain for Anomaly Detection. IEEE Access, 8, 132911–132921. https://doi.org/10.1109/ACCESS.2020.3009843
Kushwaha, J. P., Bhadauria, S., & Tapaswi, S. (2023). Multi-Method Stacked Feature Selection Approach based IDS for IoT Networks. Procedia Computer Science, 230, 564–573. https://doi.org/10.1016/j.procs.2023.12.112
Latif, S., Boulila, W., Koubaa, A., Zou, Z., & Ahmad, J. (2024). DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm. Journal of Network and Computer Applications, 221. https://doi.org/10.1016/j.jnca.2023.103784
Ogwara, N. O., Petrova, K., Yang, M. L., & Tan, L. (2022). Towards the Development of a Cloud Computing Intrusion Detection Framework Using an Ensemble Hybrid Feature Selection Approach. Journal of Computer Networks and Communications, 2022. https://doi.org/10.1155/2022/5988567
Oyelakin, A. M., Ameen, A. O., Ogendele, T. S., Salau-Ibrahim, T., Abdulrauf, U. T., Olufadi, H. I., & Ajiboye, I. K. (2024). Overview and Exploratory Analyses of CICIDS2017 Intrusion Detection Dataset. Indonesian Journal of Data and Science, 4(3). https://doi.org/10.56705/ijodas.v4i3.80
Prazeres, N., Costa, R. L. de C., Santos, L., & Rabadão, C. (2023). Engineering the application of machine learning in an IDS based on IoT traffic flow. Intelligent Systems with Applications, 17. https://doi.org/10.1016/j.iswa.2023.200189
Sahu, D. P., Tripathy, B., & Samantaray, L. (2024). FogNet: Custom CNN with optimal feature selection-based combat model for secured fog computing environment. E-Prime - Advances in Electrical Engineering, Electronics and Energy, 8. https://doi.org/10.1016/j.prime.2024.100604
Saq, A. H. A., Zainal, A., Al-Rimy, B. A. S., Alyami, A., & Abosaq, H. A. (2024). Intrusion Detection in IoT using Gaussian Fuzzy Mutual Information-based Feature Selection. Engineering, Technology and Applied Science Research, 14(6), 17564–17571. https://doi.org/10.48084/etasr.8268
Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018). Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSP 2018 - Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018-January, 108 116. https://doi.org/10.5220/0006639801080116
Yang, Y., & Peng, X. (2025). BERT-based network for intrusion detection system. Eurasip Journal on Information Security, 2025(1). https://doi.org/10.1186/s13635-025-00191-w
Zhou, H., Wang, X., & Zhang, Y. (2024). Feature selection based on weighted conditional mutual information. Applied Computing and Informatics, 20(1–2), 55–68. https://doi.org/10.1016/j.aci.2019.12.003




