A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality

被引:37
作者
Guezzaz, Azidine [1 ]
Benkirane, Said [1 ]
Azrour, Mourade [2 ]
Khurram, Shahzada [3 ]
机构
[1] Cadi Ayyad Univ, Technol Higher Sch, Comp Sci Dept, Essaouira, Morocco
[2] Moulay Ismail Univ, Fac Sci & Tech, Comp Sci Dept, IDMS Team, Errachidia, Morocco
[3] Islamia Univ, Fac Comp, Comp Dept Informat Secur, Bahawalpur, Pakistan
关键词
DETECTION SYSTEM;
D O I
10.1155/2021/1230593
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the recent advancements in the Internet of things (IoT) and cloud computing technologies and growing number of devices connected to the Internet, the security and privacy issues are important to be resolved and protect the data and computer network. To provide security, a real-time monitoring of the network data and resources is needed. Intrusion detection systems have been used to monitor, detect, and alert an intrusion event in real time. Recently, the intrusion detection systems (IDS) incorporate several machine learning (ML) techniques. One of the techniques is decision tree, which can take reliable network measures and make good decisions by increasing the detection rate and accuracy. In this paper, we propose a reliable network intrusion detection approach using decision tree with enhanced data quality. Specifically, network data preprocessing and entropy decision feature selection is carried out for enhancing the data quality and relevant training; then, a decision tree classifier is built for reliable intrusion detection. Experimental study on two datasets shows that the proposed model can reach robust results. Actually, our model achieves 99.42% and 98.80% accuracy with NSL-KDD and CICIDS2017 datasets, respectively. The novel approach gives many advantages compared to the other models in term of accuracy (ACC), detection rate (DR), and false alarm rate (FAR).
引用
收藏
页数:8
相关论文
共 38 条
  • [1] A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models
    Ahmim, Ahmed
    Maglaras, Leandros
    Ferrag, Mohamed Amine
    Derdour, Makhlouf
    Janicke, Helge
    [J]. 2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2019, : 228 - 233
  • [2] A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer
    Alazzam, Hadeel
    Sharieh, Ahmad
    Sabri, Khair Eddin
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2020, 148 (148)
  • [3] Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
    Aldweesh, Arwa
    Derhab, Abdelouahid
    Emam, Ahmed Z.
    [J]. KNOWLEDGE-BASED SYSTEMS, 2020, 189 (189)
  • [4] Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
    Ambusaidi, Mohammed A.
    He, Xiangjian
    Nanda, Priyadarsi
    Tan, Zhiyuan
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) : 2986 - 2998
  • [5] A Neural Network Ensemble Classifier for Effective Intrusion Detection Using Fuzzy Clustering and Radial Basis Function Networks
    Amini, Mohammad
    Rezaeenour, Jalal
    Hadavandi, Esmaeil
    [J]. INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2016, 25 (02)
  • [6] Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection
    Ayo, Femi Emmanuel
    Folorunso, Sakinat Oluwabukonla
    Abayomi-Alli, Adebayo A.
    Adekunle, Adebola Olayinka
    Awotunde, Joseph Bamidele
    [J]. INFORMATION SECURITY JOURNAL, 2020, 29 (06): : 267 - 283
  • [7] A new hybrid approach for intrusion detection using machine learning methods
    Cavusoglu, Unal
    [J]. APPLIED INTELLIGENCE, 2019, 49 (07) : 2735 - 2761
  • [8] PFLUA-DIoT: A Pairing Free Lightweight and Unlinkable User Access Control Scheme for Distributed IoT Environments
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Kumar, Neeraj
    Alsharif, Mohammed H.
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 309 - 316
  • [9] An improved anonymous authentication scheme for distributed mobile cloud computing services
    Chaudhry, Shehzad Ashraf
    Kim, I. Luk
    Rho, Seungmin
    Farash, Mohammad Sabzinejad
    Shon, Taeshik
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1595 - 1609
  • [10] Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms
    Chiba, Zouhair
    Abghour, Noreddine
    Moussaid, Khalid
    El Omri, Amina
    Rida, Mohamed
    [J]. COMPUTERS & SECURITY, 2019, 86 : 291 - 317