Intrusion Detection Model Based on TF.IDF and C4.5 Algorithms

被引:6
作者
Awadh, Khaldoon [1 ]
Akbas, Ayhan [2 ]
机构
[1] Univ Turkish Aeronaut Assoc, Comp Engn Dept, Ankara, Turkey
[2] Cankiri Karatekin Univ, Comp Engn Dept, Cankiri, Turkey
来源
JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI | 2021年 / 24卷 / 04期
关键词
IDS; TF.IDF; data mining; machine learning; network security;
D O I
10.2339/politeknik.693221
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In recent years, the use of machine learning and data mining technologies has drawn researchers' attention to new ways to improve the performance of Intrusion Detection Systems (IDS). These techniques have proven to be an effective method in distinguishing malicious network packets. One of the most challenging problems that researchers are faced with is the transformation of data into a form that can be handled effectively by Machine Learning Algorithms (MLA). In this paper, we present an IDS model based on the decision tree C4.5 algorithm with transforming simulated UNSW-NB15 dataset as a pre-processing operation. Our model uses Term Frequency.Inverse Document Frequency (TF.IDF) to convert data types to an acceptable and efficient form for machine learning to achieve high detection performance. The model has been tested with randomly selected 250000 records of the UNSW-NB15 dataset. Selected records have been grouped into various segment sizes, like 50, 500, 1000, and 5000 items. Each segment has been, further, grouped into two subsets of multi and binary class datasets. The performance of the Decision Tree C4.5 algorithm with Multilayer Perceptron (MLP) and Naive Bayes (NB) has been compared in Weka software. Our proposed method significantly has improved the accuracy of classifiers and decreased incorrectly detected instances. The increase in accuracy reflects the efficiency of transforming the dataset with TF.IDF of various segment sizes.
引用
收藏
页码:1691 / 1698
页数:8
相关论文
共 50 条
  • [31] Explainable AI-based innovative hybrid ensemble model for intrusion detection
    Ahmed, Usman
    Zheng, Jiangbin
    Almogren, Ahmad
    Khan, Sheharyar
    Sadiq, Muhammad Tariq
    Altameem, Ayman
    Rehman, Ateeq Ur
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [32] A C4.5 - CART DECISION TREE MODEL FOR REAL ESTATE PRICE PREDICTION AND THE ANALYSIS OF THE UNDERLYING FEATURES
    Yucebas, Sait Can
    Dogan, Melike
    Genc, Levent
    KONYA JOURNAL OF ENGINEERING SCIENCES, 2022, 10 (01): : 147 - 161
  • [33] A Filter-based Feature Selection Model for Anomaly-based Intrusion Detection Systems
    Ullah, Imtiaz
    Mahmoud, Qusay H.
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 2151 - 2159
  • [34] INTRUSION DETECTION MODEL BASED ON ANDROID
    Kou, Xiaoming
    Wen, Qiaoyan
    2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 624 - 628
  • [35] Construction and optimization of vending machine decision support system based on improved C4.5 decision tree
    Li, Ping
    Xiong, Fang
    Huang, Xibei
    Wen, Xiaojun
    HELIYON, 2024, 10 (03)
  • [36] Network Intrusion Detection System Model Based on Data Mining
    Zhao, Yanjie
    2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 155 - 160
  • [37] Research on Immune based Adaptive Intrusion Detection System Model
    Deng, Lei
    Gao, De-yuan
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 488 - 491
  • [38] Movie Popularity Classification based on Inherent Movie Attributes using C4.5, PART and Correlation Coefficient
    Asad, Khalid Ibnal
    Ahmed, Tanvir
    Rahman, Md. Saiedur
    2012 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2012, : 747 - 752
  • [39] An efficient intrusion detection model based on fast inductive learning
    Yang, Wu
    Wan, Wei
    Guo, Lin
    Zhang, Le-Jun
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3249 - 3254
  • [40] Survey of Intrusion Detection Methods Based on Data Mining Algorithms
    Jin, Zichuan
    Cui, Yanpeng
    Yan, Zheng
    BDE 2019: 2019 INTERNATIONAL CONFERENCE ON BIG DATA ENGINEERING, 2019, : 92 - 100