Intrusion Detection using Decision Tree Model in High-Speed Environment

被引:0
作者
Rathore, M. Mazhar [1 ]
Saeed, Faisal [1 ]
Rehman, Abdul [1 ]
Paul, Anand [1 ]
Daniel, Alfred [2 ]
机构
[1] Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu, South Korea
[2] Sns Coll Technol, Coimbatore, Tamil Nadu, India
来源
IEEE INTERNATIONAL CONFERENCE ON SOFT-COMPUTING AND NETWORK SECURITY (ICSNS 2018) | 2018年
关键词
Intrusion Detection; Big Data; Decision Tree Model;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to the rise in the usage and speed of internet, the rate of data generated over the internet is enormously increasing. This growth also upturns the security threats on the enterprise network and the Internet. Detecting such intrusion in a high-speed network at realtime is a challenging task. Existing machine learning- based Intrusion Detection Systems (IDSs) are not able to perceive recent unknown attacks while working at high-speed networks. Therefore, to address these challenges, we propose a real-time intrusion detection system for the high-speed environment using decision tree-based classification model, i.e., C4.5, with a fewer number of flow features. The nine best features are selected amongst forty-one from KDD99 intrusion dataset using F SR and BER techniques. The accuracy of the proposed IDS is evaluated in terms of true positive (TP- more than 99%) and false positive (FP- less than 0.001 %), and efficiency in terms of processing time. The higher accuracy and efficiency make the system to be able to work in a real-time and high-speed environment.
引用
收藏
页码:301 / 305
页数:5
相关论文
共 20 条
[1]   Efficient decision tree for protocol analysis in intrusion detection [J].
Abbes T. ;
Bouhoula A. ;
Rusinowitch M. .
International Journal of Security and Networks, 2010, 5 (04) :220-235
[2]  
Ahn SH, 2014, INT CONF ADV COMMUN, DOI 10.1109/ICACT.2014.6778962
[3]   Machine-Learning-Based Feature Selection Techniques for Large-Scale Network Intrusion Detection [J].
Al-Jarrah, O. Y. ;
Siddiqui, A. ;
Elsalamouny, M. ;
Yoo, P. D. ;
Muhaidat, S. ;
Kim, K. .
2014 IEEE 34TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2014, :177-181
[4]  
[Anonymous], 1993, MORGAN KAUFMANN SERI
[5]  
[Anonymous], 2013, COMM MARK REP 2013
[6]  
[Anonymous], DARPA INTR DET DAT S
[7]  
[Anonymous], INTRUSION DETECTION
[8]  
Araujo Nelcileno, 2010, 2010 17th International Conference on Telecommunications (ICT 2010), P552, DOI 10.1109/ICTEL.2010.5478852
[9]  
Kayacik H., P 3 ANN C PRIVACY SE
[10]   Network Intrusion Detection System Embedded on a Smart Sensor [J].
Macia-Perez, Francisco ;
Mora-Gimeno, Francisco J. ;
Marcos-Jorquera, Diego ;
Antonio Gil-Martinez-Abarca, Juan ;
Ramos-Morillo, Hector ;
Lorenzo-Fonseca, Iren .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2011, 58 (03) :722-732