A random-forests-based classifier using class association rules and its application to an intrusion detection system

被引:9
作者
Mabu, Shingo [1 ]
Gotoh, Shun [1 ]
Obayashi, Masanao [1 ]
Kuremoto, Takashi [1 ]
机构
[1] Yamaguchi Univ, Grad Sch Sci & Engn, Ube, Yamaguchi, Japan
关键词
Association rule; Data mining; Genetic algorithm; Genetic network programming; Intrusion detection system; Random forests;
D O I
10.1007/s10015-016-0281-x
中图分类号
TP24 [机器人技术];
学科分类号
080202 ; 1405 ;
摘要
With the rapid developments of network technology, devices connected to the network in a variety of fields have increased, and then, network security has become more important. Rule-based classification for intrusion detection is useful, because it is not only easily understood by humans, but also accurate for the classification of new patterns. Genetic network programming (GNP) is one of the rule-mining techniques as well as the evolutionary-optimization techniques. It can extract rules efficiently even from an enormous database, but still needs more accuracy and stability for practical use. This paper describes a classification system with random forests, employing weighted majority vote in the classification to enhance its performance. For the performance evaluation, NSL-KDD (Network Security Laboratory-Knowledge Discovery and Data Mining) data set is used and the proposed method is compared with the conventional methods, including other machine-learning techniques (Random forests, SVM, J4.8) in terms of the accuracy and false positive rate.
引用
收藏
页码:371 / 377
页数:7
相关论文
共 14 条
[1]  
Agrawal R., 1994, P 20 INT C VER LARG, V1215, P487
[2]  
Bishop C. M., 2006, PATTERN RECOGNITION
[3]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[4]  
Holland J. H., 1992, ADAPTATION NATURAL A
[5]  
Katagiri H, 2001, P GECCO INT C, P219
[6]  
KOZA JR, 1994, STAT COMPUT, V4, P87, DOI 10.1007/BF00175355
[7]  
Lee W., 1998, P 1998 USENIX SEC S
[8]   An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming [J].
Mabu, Shingo ;
Chen, Ci ;
Lu, Nannan ;
Shimada, Kaoru ;
Hirasawa, Kotaro .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2011, 41 (01) :130-139
[9]  
Quinlan R., 1993, C4 5 PROGRAMS MACHIN
[10]  
Shimada K., 2006, Transactions of the Institute of Electrical Engineers of Japan, Part C, V126-C, P849, DOI 10.1541/ieejeiss.126.849