Evolutionary Decision Tree-Based Intrusion Detection System

被引:2
|
作者
Azad, Chandrashekhar [1 ]
Mehta, Ashok Kumar [1 ]
Jha, Vijay Kumar [2 ]
机构
[1] NIT Jamshedpur, Dept Comp Applicat, Jamshedpur 831014, Bihar, India
[2] Birla Inst Technol Mesra, Dept CSE, Ranchi 835215, Bihar, India
关键词
Anomaly detection; Data mining; Decision tree; Genetic algorithm; IDS; Misuse detection; NETWORK;
D O I
10.1007/978-981-13-7091-5_25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, an Evolutionary Decision Tree based Intrusion Detection System (IDS) has been proposed which is based on the concept of decision tree (DT) and genetic algorithm (GA). The goal of the projected IDS is to protect the computer network from the various types of cyberattacks. The main hurdles in today's decision tree-based IDS are the problem of small disjunct, preprocessing of the network logs, learning of the desired system for anomalous or signature detection, outlier handling on the training set, etc. In this research paper, the concept of interquartile range is used to preprocess the data to handle the outlier and extreme values in the training set, and then the decision tree is used to generate the DT. Further, the decision rules, which come in the category of small disjunct, who have a vital role in the accuracy are optimized using metaheuristic GA. Furthermore, the proposed system is compared with the existing IDS. The performance of the system is significant in terms of accuracy and classification error is compared to the existing systems.
引用
收藏
页码:271 / 282
页数:12
相关论文
共 50 条
  • [1] A weighted decision tree-based fast intrusion detection model
    Tian, Jun-feng
    Guo, Huai-yu
    Ma, Guo-fu
    [J]. IC-BNMT 2007: PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2007, : 115 - 120
  • [2] A Consolidated Decision Tree-Based Intrusion Detection System for Binary and Multiclass Imbalanced Datasets
    Panigrahi, Ranjit
    Borah, Samarjeet
    Bhoi, Akash Kumar
    Ijaz, Muhammad Fazal
    Pramanik, Moumita
    Kumar, Yogesh
    Jhaveri, Rutvij H.
    [J]. MATHEMATICS, 2021, 9 (07)
  • [3] RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks
    Ferrag, Mohamed Amine
    Maglaras, Leandros
    Ahmim, Ahmed
    Derdour, Makhlouf
    Janicke, Helge
    [J]. FUTURE INTERNET, 2020, 12 (03)
  • [4] Tree-based Intelligent Intrusion Detection System in Internet of Vehicles
    Yang, Li
    Moubayed, Abdallah
    Hamieh, Ismail
    Shami, Abdallah
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [5] Evaluation of Decision Tree-Based Rule Derivation for Intrusion Detection in Automotive Ethernet
    Gail, Felix
    Rieke, Roland
    Fenzl, Florian
    Krauss, Christoph
    [J]. 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1392 - 1399
  • [6] Design and Simulation of a Tree-Based Intrusion Detection System against Denial of Service
    Bai Yuan
    Bai Zhong-ying
    [J]. APPLIED MECHANICS AND MECHANICAL ENGINEERING, PTS 1-3, 2010, 29-32 : 790 - +
  • [7] Choosing Decision Tree-Based Boundary Patterns in the Intrusion Detection Systems with Large Data Sets
    Ghaffari, Hamidreza
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2022, 19 (03) : 363 - 369
  • [8] Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems
    Buschlinger, Lucas
    Rieke, Roland
    Sarda, Sanat
    Krauss, Christoph
    [J]. 30TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2022), 2022, : 246 - 254
  • [9] Decision tree-based Design Defects Detection
    Maddeh, Mohamed
    Ayouni, Sarra
    Alyahya, Sultan
    Hajjej, Fahima
    [J]. IEEE ACCESS, 2021, 9 : 71606 - 71614
  • [10] An Intelligent Tree-Based Intrusion Detection Model for Cyber Security
    Al-Omari, Mohammad
    Rawashdeh, Majdi
    Qutaishat, Fadi
    Alshira'H, Mohammad
    Ababneh, Nedal
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2021, 29 (02)