Dendron: Genetic trees driven rule induction for network intrusion detection systems

被引:79
作者
Papamartzivanos, Dimitrios [1 ]
Gomez Marmol, Felix [2 ]
Kambourakis, Georgios [1 ,3 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, Samos 83200, Greece
[2] Univ Murcia, Dept Informat & Commun Engn, Murcia 30100, Spain
[3] George Mason Univ, Comp Sci Dept, Fairfax, VA 22030 USA
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 79卷
基金
欧盟地平线“2020”;
关键词
Intrusion detection systems; Misuse detection; Decision Trees; Genetic Algorithms; Machine learning; Information systems security; DECISION TREE; CLASSIFICATION; MODEL;
D O I
10.1016/j.future.2017.09.056
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion detection systems (IDSs) are essential entities in a network topology aiming to safeguard the integrity and availability of sensitive assets in the protected systems. In misuse detection systems, which is the topic of the paper at hand, the detection process relies on specific attack signatures (rules) in an effort to distinguish between legitimate and malicious network traffic. Generally, three major challenges are associated with any IDS of this category: identifying patterns of new attacks with high accuracy, ameliorating the human-readability of the detection rules, and rightly designating the category these attacks belong to. To this end, we propose Dendron, a methodology for generating new detection rules which are able to classify both common and rare types of attacks. Our methodology takes advantage of both Decision Trees and Genetic Algorithms for the sake of evolving linguistically interpretable and accurate detection rules. It also integrates heuristic methods in the evolutionary process aiming to deal with the challenging nature of the network traffic, which generally biases machine learning techniques to neglect the minority classes of a dataset. The experimental results, using KDDCup'99, NSL-KDD and UNSW-NB15 datasets, reveal that Dendron is able to achieve superior results over other state-of-the-art and legacy techniques under several classification metrics, while at the same time is able to significantly detect rare intrusive incidents. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:558 / 574
页数:17
相关论文
共 38 条
  • [1] [Anonymous], 2009, SIGKDD Explorations, DOI DOI 10.1145/1656274.1656278
  • [2] [Anonymous], 2003, P ICML 2003 WORKSH C
  • [3] [Anonymous], 2015, Karbala International Journal of Modern Science
  • [4] [Anonymous], 2014, C4. 5: programs for machine learning
  • [5] [Anonymous], 2020, Introduction to data mining
  • [6] [Anonymous], 2011, 2011 3 INT C COMM SY
  • [7] Back T., 1996, EVOLUTIONARY ALGORIT, DOI DOI 10.1093/OSO/9780195099713.001.0001
  • [8] Partitioning nominal attributes in decision trees
    Coppersmith, D
    Hong, SJ
    Hosking, JRM
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 1999, 3 (02) : 197 - 217
  • [9] De Jong K, 2012, PROCEEDINGS OF THE FOURTEENTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTATION COMPANION (GECCO'12), P737
  • [10] On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems
    Elhag, Salma
    Fernandez, Alberto
    Bawakid, Abdullah
    Alshomrani, Saleh
    Herrera, Francisco
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (01) : 193 - 202