An intrusion detection system based on combining probability predictions of a tree of classifiers

被引:36
|
作者
Ahmim, Ahmed [1 ]
Derdour, Makhlouf [1 ]
Ferrag, Mohamed Amine [2 ]
机构
[1] Univ Larbi Tebessi, Fac Exact Sci & Sci Nat & Life, Dept Math & Comp Sci, Route Constantine, Tebessa 12002, Algeria
[2] Guelma Univ, Dept Comp Sci, Fac Math Comp Sci & Mat Sci, BP 401, Guelma 24000, Algeria
关键词
computer security; data mining; hybrid IDS; hierarchical IDS; intrusion detection system; IDS; network security;
D O I
10.1002/dac.3547
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrusion detection system (IDS) represents an unavoidable tool to secure our network. It is considered as a second defense line against the different form of attacks. The principal limits of the current IDSs are their inability to combine the detection of the new form of attacks with high detection rate and low false alarm rate. In this paper, we propose an intrusion detection system based on the combination of the probability predictions of a tree of classifiers. Specifically, our model is composed of 2 layers. The first one is a tree of classifiers. The second layer is a classifier that combines the probability predictions of the tree. The built tree contains 4 levels where each node of this tree represents a classifier. The first node classifies the connections in 2 clusters: Denial of Service attacks and Cluster 2. Then, the second node classifies the connections of the Cluster 2 in Probing attacks and Cluster 3. The third node classifies the connections of the Cluster 3 in Remote-to-Local attacks and Cluster 4. Finally, the last node classifies the connections of the Cluster 4 in User-to-Root attacks and Normal connections. The second layer contains the last classifier that combines the probability predictions of the first layer and take the final decision. The experiments on KDD'99 and NSL-KDD show that our model gives a low false alarm rate and the highest detection rate. Furthermore, our model is more precise than the recent intrusion detection system models with accuracy equal to 96.27% for KDD'99 and 89.75% for NSL-KDD.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] An Analysis of Supervised Tree Based Classifiers for Intrusion Detection System
    Thaseen, Sumaiya
    Kumar, Ch. Aswani
    [J]. 2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [2] A new hierarchical intrusion detection system based on a binary tree of classifiers
    Ahmim, Ahmed
    Zine, Nacira Ghoualmi
    [J]. INFORMATION AND COMPUTER SECURITY, 2015, 23 (01) : 31 - 57
  • [3] Combining heterogeneous classifiers for network intrusion detection
    Borji, Ali
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 254 - 260
  • [4] Design of multiple-level tree classifiers for intrusion detection system
    Xiang, C
    Chong, MY
    Zhu, HL
    [J]. 2004 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2004, : 873 - 878
  • [5] HFSTE: Hybrid Feature Selections and Tree-Based Classifiers Ensemble for Intrusion Detection System
    Tama, Bayu Adhi
    Rhee, Kyung-Hyune
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (08) : 1729 - 1737
  • [6] Intrusion Detection System Based on Hybrid Hierarchical Classifiers
    Mohd, Noor
    Singh, Annapurna
    Bhadauria, H. S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 121 (01) : 659 - 686
  • [7] Intrusion Detection System Based on Hybrid Hierarchical Classifiers
    Noor Mohd
    Annapurna Singh
    H. S. Bhadauria
    [J]. Wireless Personal Communications, 2021, 121 : 659 - 686
  • [8] Application of decision tree classifiers to computer intrusion detection
    Ye, N
    Li, XY
    [J]. DATA MINING II, 2000, 2 : 381 - 390
  • [9] Network Intrusion Detection by combining one-class classifiers
    Giacinto, G
    Perdisci, R
    Roli, F
    [J]. IMAGE ANALYSIS AND PROCESSING - ICIAP 2005, PROCEEDINGS, 2005, 3617 : 58 - 65
  • [10] Ensemble Classifiers for Network Intrusion Detection System
    Zainal, Anazida
    Maarof, Mohd Aizaini
    Shamsuddin, Siti Mariyam
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (03): : 217 - 225