Volume 21 , Issue 1 , PP: 79-88, 2026 | Cite this article as | XML | Html | PDF | Full Length Article
Dunia Alawi Jarwan 1 , Omar Fitian Rashid 2 * , M. Jasim Mohammed 3 , Shaymaa E. Sarhan 4 , Hind Moutaz Al-Dabbas 5 , Maythem K. Abbas 6
Doi: https://doi.org/10.54216/FPA.210106
The significance of the Intrusion Detection System (IDS) is due to its capability in detecting attacks over the network. The current paper proposes a new feature selection method for misuse intrusion detection systems based on RNA encoding, where the proposed method includes five steps. Firstly, the KDD-Cup99 dataset is used and then select random records are used for both training and testing. Secondly, RNA encoding to encode each possible value in the dataset into RNA characters. Thirdly, the keys and their locations are extracted by dividing the achieved RNA sequences from previous steps into blocks with different sizes, then finding the most repeated blocks, choosing them as keys, and storing their location. The next step is the proposed feature selection method based on the extracted keys and their locations, depending on the place of the key within the feature number. Finally, the Raita algorithm for matching to search for keys before and after the applied features selection method. In terms of IDS performance evaluation, experimental outcomes of the proposed feature selection method show the capability of optimizing the time complexity and metrics.
Features Selection , Intrusion Detection , Misuse , RNA encoding , Matching algorithm
[1] O. Ahmed, "Enhancing intrusion detection in wireless sensor networks through machine learning techniques and context awareness integration," Int. J. Math., Stat., Comput. Sci., vol. 2, pp. 244–258, 2024.
[2] Sharma, N. V., & Yadav, N. S. An optimal intrusion detection system using recursive feature elimination and ensemble of classifiers. Microprocessors and Microsystems, 85, 2021.
[3] Selvakumar, K., Karuppiah, M., SaiRamesh, L., Hafizul Islam, S. K., Hassan, M. M., Fortino, G., & Choo, K. R. Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs. Information Sciences, 497, 77-90, 2019.
[4] Zhou, Y., Cheng, G., Jiang, S., & Dai, M. Building an efficient intrusion detection system based on feature selection and ensemble classifier. Computer Network, 174, 2020.
[5] A. K. Sharma, R. Kumar, and P. Singh, "A Comprehensive Survey on Machine Learning Techniques for Intrusion Detection Systems," Journal of Information Technology & Software Engineering, vol. 12, no. 4, pp. 1-10, 2023.
[6] Hajimirzaei, B., & Navimipour, N. J. Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express, 5(1), 56-59, 2019.
[7] Mohy-eddine, M., Guezzaz, A., Benkirane, S., & Azrour, M. An Intrusion Detection Model using election-Based Feature Selection and K-NN. Microprocessors and Microsystems, 2023.
[8] Turukmane, A. V., & Devendiran, R. M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning. Computers & Security, 137, 2024.
[9] Selvakumar, K., Karuppiah, M., SaiRamesh, L., Islam, S. K. H., Hassan, M. M., Fortino, G., & Choo, K. R. Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs. Information Sciences, 497, 77-90, 2019.
[10] Rashid, O. F., Othman, Z. A., & Zainudin, S. Features Selection for Intrusion Detection System Based on DNA Encoding. In: Piuri, V., Balas, V., Borah, S., Syed Ahmad, S. (eds) Intelligent and Interactive Computing. Lecture Notes in Networks and Systems, 67, Springer, Singapore, 2019.
[11] Thakkar, A., & Lohiya, R. Fusion of statistical importance for feature selection in Deep Neural Network-based Intrusion Detection System. Information Fusion, 90, 353-363, 2023.
[12] Zorarpaci, E. A fast intrusion detection system based on swift wrapper feature selection and speedy ensemble classifier. Engineering Applications of Artificial Intelligence, 133, 2024.
[13] Zhang, L., Liu, K., Xie, X., Bai, W., Wu, B., & Dong, P. A data-driven network intrusion detection system using feature selection and deep learning. Journal of Information Security and Applications, 78, 2023.
[14] Fang, Y., Yao, Y., Lin, X., Wang, J., & Zhai, H. A feature selection based on genetic algorithm for intrusion detection of industrial control systems. Computers & Security, 139, 2024.
[15] Al-Bakaa, A., & Al-Musawi, B. A new intrusion detection system based on using non-linear statistical analysis and features selection techniques. Computers & Security, 122, 2022.
[16] Kunhare, N., Tiwari, R., & Dhar, J. Intrusion detection system using hybrid classifiers with meta-heuristic algorithms for the optimization and feature selection by genetic algorithm. Computers and Electrical Engineering, 103, 2022.
[17] Azimjonov, J., & Kim, T. Designing accurate lightweight intrusion detection systems for IoT networks using fine-tuned linear SVM and feature selectors. Computers & Security, 137, 2024.
[18] Rashid, O. F. DNA Encoding for Misuse Intrusion Detection System based on UNSW-NB15 Data Set. Iraqi Journal of Science, 61(12), 3408–3416, 2020.
[19] Waad, F., & Mohammed, I. J. Hybrid CNN-SMOTE-BGMM Deep Learning Framework for Network Intrusion Detection using Unbalanced Dataset. Iraqi Journal of Science, 64(9), 4846-4864, 2023.
[20] Rashid, O. F., Othman, Z. A., & Zainudin, S. Matching algorithms for intrusion detection system based on DNA encoding. Journal of Theoretical and Applied Information Technology, 96 (24), 8410 - 8420, 2018.
[21] Wei, W., Chen, S., Lin, Q., Ji, J., & Chen, J. A multi-objective immune algorithm for intrusion feature selection. Applied Soft Computing, 95, 2020.
[22] Vijayanand, R., Devaraj, D., & Kannapiran, B. Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection. Computers & Security, 77, 304-314, 2018.
[23] Pervez, M. S., & Farid, D. M. Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs. The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014), Dhaka, Bangladesh, 1-6, 2014.
[24] Hooda, M., Babu, J., Vamsi, P. S., & Gopakumar, G. An Improved Intrusion Detection System Based on KDD Dataset Using Feature Ranking and Data Sampling. 2020 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 1128-1132, 2020.
[25] Sheikhi, S., & Kostakos, P. A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection. Sensors, 2022.
[26] Sharmila, B. S., & Nagapadma, R. Intrusion Detection System using Naive Bayes algorithm. 2019 IEEE International WIE Conference on Electrical and Computer Engineering, India, 1-4, 2019.
[27] Shokeen, A., Yadav, N., & Sisaudia, V. Performance analysis of different machine learning algorithms for intrusion detection on KDD-CUP-99 dataset. AIP Conference Proceeding, 2024.