Implementation of Network Intrusion Detection System using Variant of Decision Tree Algorithm

被引:0
|
作者
Relan, Neha G. [1 ]
Patil, Dharmaraj R. [1 ]
机构
[1] RC Patel Inst Technol, Dept Comp Engn, Shirpur, Maharashtra, India
关键词
IDS; KDD; Classification Algorithms; Pruning; True positive (TP); False Positive (FP); False Negative (FN); True Negative(TN); NSL_KDD; Accuracy etc;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the need of internet is increasing day by day, the significance of security is also increasing. The enormous usage of internet has greatly affected the security of the system. Hackers do monitor the system minutely or keenly, therefore the security of the network is under observation. A conventional intrusion detection technology indicates more limitation like low detection rate, high false alarm rate and so on. Performance of the classifier is an essential concern in terms of its effectiveness; also number of feature to be examined by the IDS should be improved. In our work, we have proposed two techniques, C4.5 Decision tree algorithm and C4.5 Decision tree with Pruning, using feature selection. In C4.5 Decision tree with pruning we have considered only discrete value attributes for classification. We have used KDDCup' 99 and NSL_KDD dataset to train and test the classifier. The Experimental Result shows that, C4.5 decision tree with pruning approach is giving better results with all most 98% of accuracy.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Intrusion Detection System Using Decision Tree Algorithm
    Kumar, Manish
    Hanumanthappa, M.
    Kumar, T. V. Suresh
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 629 - 634
  • [2] Network Intrusion Detection System Using Principal Component Analysis Algorithm and Decision Tree Classifier
    Osho, Oyeyemi
    Hong, Sungbum
    Kwembe, Tor A.
    [J]. 2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 273 - 279
  • [3] Network Intrusion Detection System Using J48 Decision Tree
    Sahu, Shailendra
    Mehtre, B. M.
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 2023 - 2026
  • [4] A decision tree algorithm for distributed data mining: Towards network intrusion detection
    Baik, S
    Bala, J
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 206 - 212
  • [5] A Review of Intrusion Detection System using various decision tree Algorithm optimize challenges issues
    Jeldi, Sagar Babu
    [J]. PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 272 - 275
  • [6] Network Intrusion Detection using Feature Selection and Decision tree classifier
    Sheen, Shina
    Rajesh, R.
    [J]. 2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, : 1599 - +
  • [7] Network Intrusion Detection System Using Random Forest and Decision Tree Machine Learning Techniques
    Bhavani, T. Tulasi
    Rao, M. Kameswara
    Reddy, A. Manohar
    [J]. FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 637 - 643
  • [8] Identifying False Alarm for Network Intrusion Detection System Using Data Mining and Decision Tree
    Anuar, Nor Badrul
    Sallehudin, Hasimi
    [J]. PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON DATA NETWORKS, COMMUNICATIONS, COMPUTERS (DNCOCO '08): RECENT ADVANCES IN DATA NETWORKS, COMMUNICATIONS, COMPUTERS, 2008, : 22 - 28
  • [9] An Intrusion Detection Algorithm Based on Decision Tree Technology
    Wang, Juan
    Yang, Qiren
    Ren, Dasen
    [J]. 2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 333 - 335
  • [10] Decision Tree with Sensitive Pruning in Network-based Intrusion Detection System
    Chew, Yee Jian
    Ooi, Shih Yin
    Wong, Kok-Seng
    Pang, Ying Han
    [J]. COMPUTATIONAL SCIENCE AND TECHNOLOGY (ICCST 2019), 2020, 603 : 1 - 10