RBDT: The cascading of machine learning classifiers for anomaly detection with case study of two datasets

被引:0
作者
Jidiga, Goverdhan Reddy [1 ]
Sammulal, Porika [2 ,3 ]
机构
[1] Department of Technical Education, Govt. of Andhrapradesh, Hyderabad
[2] JNTUH College of Engineering, Karimnager
[3] JNTU University, Hyderabad
来源
Advances in Intelligent Systems and Computing | 2015年 / 320卷
关键词
Anomaly detection; C4.5; Decision tree; Naïve bayes; RBDT;
D O I
10.1007/978-3-319-11218-3_29
中图分类号
学科分类号
摘要
The inhuman cause of behavior in computer users, lack of coding skills pursue a malfunctioning of applications creating security breaches and vulnerable to every use of online transaction today. The anomaly detection is in-sighted into security of information in early stage of 1980, but still we have potential abnormalities in real time critical applications and unable to model online, real world behavior. The anomalies are pinpointed by conventional algorithms was very poor and false positive rate (FPR) is increased. So, in this context better use the adorned machine learning techniques to improve the performance of an anomaly detection system (ADS). In this paper we have given a new classifier called rule based decision tree (RBDT), it is a cascading of C4.5 and Naïve Bayes use the conjunction of C4.5 and Naïve Bayes rules towards a new machine learning classifier to ensure that to improve in results. Here two case studies used in experimental work, one taken from UCI machine learning repository and other one is real bank dataset, finally comparison analysis is given by applying datasets to the decision trees (ID3, CHAID, C4.5, Improved C4.5, C4.5 Rule), Neural Networks, Naïve Bayes and RBDT. © Springer International Publishing Switzerland 2015.
引用
收藏
页码:309 / 324
页数:15
相关论文
共 41 条
[1]  
Denning D.E., An intrusion detection model, IEEE Transactions on Software Engineering, (1987)
[2]  
Axelsson S., Intrusion Detection Systems: A Survey and Taxonomy, (2000)
[3]  
Feng H.H., Kolesnikov O.M., Fogla P., Lee W., Gong W., Anomaly Detection Using Call Stack Information, In: IEEE Symposium on Security and Privacy, pp. 62-75, (2003)
[4]  
Lee W., Stolfo S.J., Data mining approaches for intrusion detection, 7th USENIX Security Symposium, pp. 79-94, (1998)
[5]  
Lane T., Brodley C.E., An Application of Machine Learning to Anomaly Detection, Proceedings of the 20th National Information Systems Security Conference, pp. 366-377, (1997)
[6]  
Breiman L., Random Forests. Machine Learning, 45, pp. 5-32, (2001)
[7]  
Jidiga G.R., Sammulal P., Foundations of Intrusion Detection Systems: Focus on Role of Anomaly Detection using Machine Learning, In: ICACM-2013 Elsevier 2nd International Conference
[8]  
Jidiga G.R., Sammulal P., The Need of Awareness in Cyber Security with a Case Study, Proceedings of the 4th IEEE Conference (ICCCNT), (2013)
[9]  
Kass G.V., An Exploratory Technique for Investigating Large Quantities of Categorical Data, Applied Statistics, 29, 2, pp. 119-127, (1980)
[10]  
Quinlan J.R., Induction of decision trees, Machine Learning 1, pp. 81-106, (1986)