Implementation of Network Intrusion Detection System using Variant of Decision Tree Algorithm

被引:0
|
作者
Relan, Neha G. [1 ]
Patil, Dharmaraj R. [1 ]
机构
[1] RC Patel Inst Technol, Dept Comp Engn, Shirpur, Maharashtra, India
关键词
IDS; KDD; Classification Algorithms; Pruning; True positive (TP); False Positive (FP); False Negative (FN); True Negative(TN); NSL_KDD; Accuracy etc;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the need of internet is increasing day by day, the significance of security is also increasing. The enormous usage of internet has greatly affected the security of the system. Hackers do monitor the system minutely or keenly, therefore the security of the network is under observation. A conventional intrusion detection technology indicates more limitation like low detection rate, high false alarm rate and so on. Performance of the classifier is an essential concern in terms of its effectiveness; also number of feature to be examined by the IDS should be improved. In our work, we have proposed two techniques, C4.5 Decision tree algorithm and C4.5 Decision tree with Pruning, using feature selection. In C4.5 Decision tree with pruning we have considered only discrete value attributes for classification. We have used KDDCup' 99 and NSL_KDD dataset to train and test the classifier. The Experimental Result shows that, C4.5 decision tree with pruning approach is giving better results with all most 98% of accuracy.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Development of Intrusion Detection System using Residual Feedforward Neural Network Algorithm
    Rushendra
    Ramli, Kalamullah
    Hayati, Nur
    Ihsanto, Eko
    Gunawan, Teddy Surya
    Halbouni, Asmaa Hani
    [J]. 2021 4TH INTERNATIONAL SEMINAR ON RESEARCH OF INFORMATION TECHNOLOGY AND INTELLIGENT SYSTEMS (ISRITI 2021), 2020,
  • [42] A Granular Computing Based Decision Tree Algorithm and Its Application in Intrusion Detection
    Wang, Chenghua
    Zhou, Lin
    Jiang, Feng
    Zhao, Hongbo
    [J]. MATERIALS, MECHANICAL ENGINEERING AND MANUFACTURE, PTS 1-3, 2013, 268-270 : 1730 - +
  • [43] An Intelligent Intrusion Detection System Using Average Manhattan Distance-based Decision Tree
    Selvi, R.
    Kumar, S. Saravan
    Suresh, A.
    [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 205 - 212
  • [44] Implementation of intrusion detection system and improvement utilising genetic algorithm
    Huang, Ke
    Sun, Bichuan
    Sun, Xianming
    Shabaz, Mohammad
    Khan, Rijwan
    [J]. INTERNATIONAL JOURNAL OF NANOTECHNOLOGY, 2023, 20 (5-10) : 600 - 614
  • [45] Decision Tree Applied in Web-based Intrusion Detection System
    Wei, Mingjun
    Liu, Yufang
    Chen, Xuebin
    Li, Jianmin
    [J]. SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 110 - 113
  • [46] Intrusion Detection System Using Genetic Algorithm
    Benaicha, Salah Eddine
    Saoudi, Lalia
    Guermeche, Salah Eddine Bouhouita
    Lounis, Ouarda
    [J]. 2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 564 - 568
  • [47] A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection
    Malik, Arif Jamal
    Khan, Farrukh Aslam
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 667 - 680
  • [48] A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection
    Arif Jamal Malik
    Farrukh Aslam Khan
    [J]. Cluster Computing, 2018, 21 : 667 - 680
  • [49] Research and Implementation of Intrusion Detection Algorithm Based on BP Neural Network
    Wu, Zhenzhen
    [J]. PROCEEDINGS OF THE 2015 CONFERENCE ON INFORMATIZATION IN EDUCATION, MANAGEMENT AND BUSINESS, 2015, 20 : 228 - 232
  • [50] A software implementation of a genetic algorithm based approach to network intrusion detection
    Gong, RH
    Zulkernine, M
    Abolmaesumi, P
    [J]. SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERNG, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING AND FIRST AICS INTERNATIONAL WORKSHOP ON SELF-ASSEMBLING WIRELESS NETWORKS, PROCEEDINGS, 2005, : 246 - 253