Open Access Open Access  Restricted Access Subscription or Fee Access

A Design of Intrusion Detection System Using Decision Tree Based Algorithms

R. Velusamy

Abstract


Intrusion detection system is the most important part of network security system because the volume of unauthorized access to the network resources and services increase day by day. In this paper it is analysed that Decision Tree intrusion detection system is proposed to solve the problem which is used to improve the coverage of the rules and which scope with problem. The security is the most important aspect for any type of organization. Due to these reason, intrusion detection has been an important research issue. An IDS (intrusion Detection System) can be classified as signature based IDS and Anomaly based IDS.


Full Text:

PDF

References


P. Aggarwal, and S.K. Sharma, An Empirical Comparison of Classifiers to Analyze Intrusion Detection, Proc. of Fifth International Conference an Advanced Computing and Communication Technologies, 2015.

Ho, and Tin Kam, Random Decision Forests, Proof the 3rd International Conference on Document Analysis and Recognition, Montreal, QC, 14–16 August1995. pp. 278–282.

http://www.saedsayad.com/oner.htm

C. Cortes, and V. Vapnik, (1995). Support-vector networks, Machine Learning 20 (3): 273.

P.N. Tan, M. Steinbach, V. Kumar, Introduction to Data Mining, Pearson Addison Wesley, 2005.

J. Markey, Using Decision Tree Analysis for Intrusion Detection: A How-To Guide, SANS Institute InfoSec Reading Room, June, 2011.

T. M. Mitchell, (1997). Machine Learning. The Mc- Graw-Hill Companies, Inc. ISBN 0070428077.

J.R. Quinlan, C4.5: Programs for Machine Learning, Morgan Kaufmann Publishers, 1993.

D.P. Gaikwad, and R.C. Thool, Intrusion Detection System Using Bagging with Partial Decision Tree Base Classifier, Proc. of the 4th International Conference on Advances in Computing, Communication and Control, 2015.

K. Bajaj, and A. Arora, Improving the Intrusion Detection using Discriminative Machine Learning Approach and Improve the Time Complexity by Data Mining Feature Selection Methods, International Journal of Computer Science, vol. 76, Aug, 2013.

A. Alazab, M. Hobbs, J.Abawajy, and M. Alazab, Using Feature Selection for Intrusion Detection System, International Symposium on Communications and Information Technologies, 2012.

S. Thaseen, and Ch. A. Kumar, An Analysis of Supervised Tree Based Classifiers for Intrusion Detection System, In Proc. of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, Feb, 2013.

S. Revathi, and A. Malathi, A detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection, International Journal of Engineering research and Technology, vol 2, Issue 12, Dec, 2013.

V. Jyothsna, and V.V. Prasad, A Comparative Study on Performance Evaluation of Intrusion Detection System through Feature Reduction for High Speed Networks, Global Journal of Computer Science and Technology: E Network, Web and Security, vol. 14, Issue 7, Version 1.0, 2014.

P. Ghosh, C. Debnath, D. Metia, and Dr. R. Dutta, An Efficient Hybrid Multilevel Intrusion Detection System in Cloud Environment, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul – Aug. 2014), PP 16-26.

K.S. Elekar, and M.M. Waghmare, Comparison of Tree base Data Mining Algorithms for Network Intrusion Detection, International Journal of Engineering, Education and Technology, vol 3 Issue 2, 2015.

S. Mallissery, S. Kolekar, and R. Ganiga, Accuracy Analysis of Machine Learning Algorithms for intrusion Detection System using NSL-KDD Dataset, Proc. International Conference on Future Trends in Computing and Communication -- FTCC 2013, July 2013, Bangkok.

A.S.A. Aziz, A.E. Hassanien, S. El-Ola Hanafy, M.F. Tolba, Multi-layer hybrid machine learning techniques for anomalies detection and classification approach, 13th International Conference on Hybrid Intelligent Systems (HIS), 2013, IEEE.

A. Raeeyat, and H. Sajedi, HIDS: DC-ADT: An Effective Hybrid Intrusion Detection System based on Data Correlation and Adaboost based Decision Tree classifier, Journal of Academic and Applied Studies,vol. 2(12), Dec. 2012, pp.19-33.

R.M. Elbasiony, E.A. Sallan, T.E. Eltobely, and M.M. Fahmy, A hybrid network intrusion detection framework based on random forests and weighted kmeans, Ain Shams Engineering Journal, vol.4, Issue 4,Dec, 2013, pp. 753-762.

D.P. Gaikwad, and R.C. Thool, Intrusion Detection System using Ripple Down Rule learner and Genetic Algorithm, International Journal of Computer Science and Information Technologies, vol. 5, 2014, pp. 6976-6980.

L.M. Ibrahim, D.T. Basheer, and M.S. Mahmod, A comparison study for intrusion database (KDD99, NSLKDD) based on Self Organization Map (SOM) Artificial Neural Network, Journal of Engineering Science and Technology, vol. 8, No. 1, 2013.


Refbacks

  • There are currently no refbacks.