Abstract
Most of researches for intrusion detection model using data mining technology have been dedicated to detection accuracy improvement. However, the size of intrusion detection model (e.g. detection rules) is as important as detection accuracy. In this paper, a method sIDMG is proposed for small-size intrusion detection model generation by using our classification algorithm sC4.5. We also propose an algorithm sC4.5 for small-size decision tree induction for a specific data by complimenting the split-attribute selection criteria of C4.5 during the tree induction. The approach of sC4.5 is to select the next highest gain ratio attribute as the split attribute if the training data set is satisfied with bias properties of C4.5. The results of performance evaluation gives that sC4.5 preserves detection accuracy of C4.5 but the decision tree size of sC4.5 is smaller than the existing C4.5.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lee, W., Stolfo, S.J.: A Framework For Constructing Features and Models For Intrusion Detection Systems. ACM Transactions on Information and System Security 3(4), 227–261 (2000)
Fayyad, U., Haussler, D., Stolorz, P.: Mining scientific data. Communication so of the ACM 39(11) (1996)
Dunham, M.H.: Data Mining: Introductory and Advanced Topics. Prentice-Hall, Englewood Cliffs (2002)
Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and Regression Trees. Wadsworth, Belmont (1984)
Murthy, S.K.: Automatic construction of decision trees from data: A multi-disciplinary survey. Data Mining and Knowledge Discovery 2(4), 345–389 (1998)
Keerthi, S.S., Shevade, S.K., Bhattacharyya, C., Murthy, K.R.K.: Improvements to Platt’s SMO Algorithms for SVM Classifier Design. Neural Computation 13(3), 637–649 (2001)
Plattt, J.: Fast Training of Support Vector Machines using Sequential Minimal Optimization. In: Schölkopf, B., Burges, C., Smola, A. (eds.) Advances In Kernel Methods - Support Vector Learning, MIT Press, Cambridge (1998)
Aha, D., Kibler, D.: Instance-based learning algorithms. Machine Learning 6, 37–66 (1991)
Bishop, C.M.: Neural Networks for Pattern Recognition. Oxford University Press, New York (1995)
Ripley, B.D.: Pattern Recognition and Neural Networks. Cambridge University Press, Cambridge (1996)
Cheeseman, P., Kelly, J., Self, M., et al.: AutoClass: A Bayesian classification system. In: 5th Int’l Conf. on Machine Learning, Morgan Kaufmann, San Francisco (1988)
Brachman, R.J., Khabaza, T., Kloesgen, W., Shapiro, G.P., Simoudis, E.: Mining business databases. Communications of the ACM 39(11), 42–48 (1996)
Inman, W.H.: The data warehouse and data mining. Communications of the ACM 39(11) (1996)
Brown, D.E., Corruble, V., Pittard, C.I.: A Comparison of Decision Tree Classifiers with Backpropagation neural networks for multimodal Classification Problems. Pattern Recognition C 26, 953–961 (1993)
Lim, T.-S., Loh, W.-Y., Shih, Y.-S.: A Comparison of Prediction Accuracy, Complexity, and training time of Thirty-three old and new classification algorithms. Machine Learning C 40, 203–228 (2000)
Quinlan, J.R.: An emprical comparison of genetic and decision-tree classfiers. In: Proc. 5th Int’l Conf. Machine Learning, San Mateo, CA, pp. 135–141 (1998)
Gehrke, J., Ganti, V., Ramakrishnan, R., Loh, W.-Y.: BOAT.optimistic decision tree construction. In: Proceedings of the 1999 ACM SIGMOD International Conference on Management of Data, Philadelphia, Pennsylvania (1999)
Quinlan, J.R.: Induction of decision trees. Machine Learning 1, 81–106 (1986)
Ruggieri, S.: Efficient C4.5. IEEE Transaction on Knowledge and Data Engineering 14(2), 438–444 (2002)
Mitchell, T.M.: Machine Learning. McGraw Hill, New York (1997)
Hyafil, L., Rivest, R.L.: Constructing Optimal Binary Decision Trees is NP-Complete. Information Processing Letters 5(1), 15–17 (1976)
Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Francisco (1993)
Mehta, M., Rissanen, J., Agrawal, R.: MDL-based decision tree pruning. In: Proc. of the 1st Int’l Conf. on Knowledge Discovery and Data Mining, Montreal, Canada (1995)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Paek, SH., Oh, YK., Lee, DH. (2007). sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm. In: Lee, J.K., Yi, O., Yung, M. (eds) Information Security Applications. WISA 2006. Lecture Notes in Computer Science, vol 4298. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71093-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-71093-6_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71092-9
Online ISBN: 978-3-540-71093-6
eBook Packages: Computer ScienceComputer Science (R0)