Decision tree based light weight intrusion detection using a wrapper approach

被引:192
作者
Sindhu, Siva S. Sivatha [1 ]
Geetha, S. [2 ]
Kannan, A. [1 ]
机构
[1] Anna Univ, Dept Comp Sci & Engn, Madras 600025, Tamil Nadu, India
[2] Thiagarajar Coll Engn, Dept Informat Technol, Madurai 625015, Tamil Nadu, India
关键词
Intrusion Detection System; Misuse detection; Genetic algorithm; Neural network; Decision tree; Neurotree; ANOMALY DETECTION;
D O I
10.1016/j.eswa.2011.06.013
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The objective of this paper is to construct a lightweight Intrusion Detection System (IDS) aimed at detecting anomalies in networks. The crucial part of building lightweight IDS depends on preprocessing of network data, identifying important features and in the design of efficient learning algorithm that classify normal and anomalous patterns. Therefore in this work, the design of IDS is investigated from these three perspectives. The goals of this paper are (i) removing redundant instances that causes the learning algorithm to be unbiased (ii) identifying suitable subset of features by employing a wrapper based feature selection algorithm (iii) realizing proposed IDS with neurotree to achieve better detection accuracy. The lightweight IDS has been developed by using a wrapper based feature selection algorithm that maximizes the specificity and sensitivity of the IDS as well as by employing a neural ensemble decision tree iterative procedure to evolve optimal features. An extensive experimental evaluation of the proposed approach with a family of six decision tree classifiers namely Decision Stump, C4.5, Naive Baye's Tree, Random Forest, Random Tree and Representative Tree model to perform the detection of anomalous network pattern has been introduced. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:129 / 141
页数:13
相关论文
共 26 条
[1]  
[Anonymous], 2007, IEEE T KNOWLEDGE DAT
[2]  
[Anonymous], 2014, C4. 5: programs for machine learning
[3]  
[Anonymous], 1984, OLSHEN STONE CLASSIF, DOI 10.2307/2530946
[4]  
[Anonymous], 2004, P 2004 ACM S APPL CO, DOI DOI 10.1145/967900.967989
[5]  
[Anonymous], 2009, IEEE CISDA 09
[6]  
[Anonymous], 2008, WAIK ENV KNOWL AN WE
[7]  
BAUER E, 1998, EMPIRICAL COMPARISON, P1
[8]  
Benferhat S, 2006, INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MODELLING, CONTROL & AUTOMATION JOINTLY WITH INTERNATIONAL CONFERENCE ON INTELLIGENT AGENTS, WEB TECHNOLOGIES & INTERNET COMMERCE, VOL 1, PROCEEDINGS, P211
[9]  
Cannady J., 1998, NAT INF SYSTEMS SEC
[10]   Evolving data mining into solutions for insights - Introduction [J].
Fayyad, U ;
Uthurusamy, R .
COMMUNICATIONS OF THE ACM, 2002, 45 (08) :28-31