Open Access Open Access  Restricted Access Subscription or Fee Access

Classifier Selection Model Based on Gain Ratio Feature Selection Method

P. Amudha, Dr.H. Abdul Rauf

Abstract


The computer networks usage has grown enormous and widespread, which has increased the number of new threats to a great extent. Intruder is one of the most publicized threats to security. In recent years, intrusion detection has emerged as an important technique for network security. Although there are some existing techniques for intrusion detection, there is a need to improve the performance. Data mining techniques have been applied as a new approach for intrusion detection. The quality of the feature selection methods is one of the important factors that affect the effectiveness of the Intrusion Detection system (IDS). In this paper, feature selection method, Gain Ratio is used to extract an optimal subset of features, which are then subjected to a set of classification algorithms to analyze KDDCup‟99 dataset. We used 10-fold cross validation for building our proposed model. The classification algorithms are compared in terms of accuracy, detection rate, false alarm rate and time taken

Keywords


Intrusion Detection, Gain Ratio, KDDCup‟99, Classification, Cross Validation.

Full Text:

PDF

References


P.Amudha, H.Abdul Rauf,” Performance Evaluation of Data Mining Techniques in Intrusion Detection”, Proc. of 2nd Intl Conference on Intelligent Information systems and management, pp. 66, 2011.

R.Kohavi,G.H.John, “Wrappers for feature subset selection”,Artificial Intelligence,vol.1,no.2,pp.273-324,1997.

R.Quinlan, C4.5: Programs for Machine Learning, Morgan Kaufmann Publishers,San Mateo,CA,1993.

Dokas, P., Ertoz, L., Lazarevic, A., Srivastava, J., & Tan, P. N. “Data mining for network intrusion detection”, Proceeding of NGDM, pp.21–30, 2002.

Wu, S., and Yen, E.” Data mining-based intrusion detectors”, Expert Systems with Applications, vol.36, no.3, pp.5605–5612, 2009.

N. B. Amor, S. Benferhat, and Z. Elouedi. “Naive Bayes vs Decision trees in intrusion detection systems”, pp. 420–424, 2004.

Gang Wang. Jinxing Hao, Jian ma, Lihua Huanh,” A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering”, Expert Systems with Applications,2010,doi:10.1016/j.eswa.2010.02.102

R. Kohavi, “Scaling Up the Accuracy of Naïve-Bayes Classifiers: A Decision-tree Hybrid,” Proc. of the 2th International Conference on Knowledge Discovery and Data Mining (KDD‟96), pp.202-207, 1996.

J. Zhang and M. Zulkernine. “Network intrusion detection using Random Forests”, Proc. of the Third Annual Conference on Privacy, Security and Trust, pp. 53–61, 2005

Asha Gowda Karegowda, A.S.Manjunath,M. A.Jayaram,”Comparative Study of Feature selection using Gain Ratio and Correlation based feature selection”,Intl Journal of Information Technology and Knowledge management,vol.2,no.2,pp.271-277.

P.Amudha, H.Abdul Rauf,” Performance Analysis of Data Mining Approaches in Intrusion Detection”, Proc. of IEEE Intl Conference on Process Automation, Control and Computing, pp.1-6, 2011 KDD99,KDDCup 1999 data(1999), http://kdd.ics.uci.edu/

Databases/kddcup99/10 percent.gz.

Daniel T, Larase, Discovering Knowledge in Data. An introduction to Data Mining, John Wiley & Sons, Inc, 2005.

John,G.H.,Langley,P,” Estimating Continuous Distributions in Bayesian classifiers”, In proc. of 11th conf. on Uncertainty in artificial Intelligence,1995.

L.Breiman,” Random Forests”, Machine Learning, vol. 45, no. 1, pp. 5-23, 2001.

www.cs.waikato.ac.nz/ml/weka/.

D. E. Denning, "An intrusion-detection model." IEEE Transactions on Software Engineering, Vol. SE-13,no. 2,pp.222-232, 1987.

Carl Endorf, Eugene Schultz, Jim Mellander, Intrusion Detection & Prevention, McGraw-Hill, 2004.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.