Skip to main content

sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm

  • Conference paper
Book cover Information Security Applications (WISA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4298))

Included in the following conference series:

  • 521 Accesses

Abstract

Most of researches for intrusion detection model using data mining technology have been dedicated to detection accuracy improvement. However, the size of intrusion detection model (e.g. detection rules) is as important as detection accuracy. In this paper, a method sIDMG is proposed for small-size intrusion detection model generation by using our classification algorithm sC4.5. We also propose an algorithm sC4.5 for small-size decision tree induction for a specific data by complimenting the split-attribute selection criteria of C4.5 during the tree induction. The approach of sC4.5 is to select the next highest gain ratio attribute as the split attribute if the training data set is satisfied with bias properties of C4.5. The results of performance evaluation gives that sC4.5 preserves detection accuracy of C4.5 but the decision tree size of sC4.5 is smaller than the existing C4.5.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lee, W., Stolfo, S.J.: A Framework For Constructing Features and Models For Intrusion Detection Systems. ACM Transactions on Information and System Security 3(4), 227–261 (2000)

    Article  Google Scholar 

  2. Fayyad, U., Haussler, D., Stolorz, P.: Mining scientific data. Communication so of the ACM 39(11) (1996)

    Google Scholar 

  3. Dunham, M.H.: Data Mining: Introductory and Advanced Topics. Prentice-Hall, Englewood Cliffs (2002)

    Google Scholar 

  4. Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and Regression Trees. Wadsworth, Belmont (1984)

    MATH  Google Scholar 

  5. Murthy, S.K.: Automatic construction of decision trees from data: A multi-disciplinary survey. Data Mining and Knowledge Discovery 2(4), 345–389 (1998)

    Article  Google Scholar 

  6. Keerthi, S.S., Shevade, S.K., Bhattacharyya, C., Murthy, K.R.K.: Improvements to Platt’s SMO Algorithms for SVM Classifier Design. Neural Computation 13(3), 637–649 (2001)

    Article  MATH  Google Scholar 

  7. Plattt, J.: Fast Training of Support Vector Machines using Sequential Minimal Optimization. In: Schölkopf, B., Burges, C., Smola, A. (eds.) Advances In Kernel Methods - Support Vector Learning, MIT Press, Cambridge (1998)

    Google Scholar 

  8. Aha, D., Kibler, D.: Instance-based learning algorithms. Machine Learning 6, 37–66 (1991)

    Google Scholar 

  9. Bishop, C.M.: Neural Networks for Pattern Recognition. Oxford University Press, New York (1995)

    Google Scholar 

  10. Ripley, B.D.: Pattern Recognition and Neural Networks. Cambridge University Press, Cambridge (1996)

    MATH  Google Scholar 

  11. Cheeseman, P., Kelly, J., Self, M., et al.: AutoClass: A Bayesian classification system. In: 5th Int’l Conf. on Machine Learning, Morgan Kaufmann, San Francisco (1988)

    Google Scholar 

  12. Brachman, R.J., Khabaza, T., Kloesgen, W., Shapiro, G.P., Simoudis, E.: Mining business databases. Communications of the ACM 39(11), 42–48 (1996)

    Article  Google Scholar 

  13. Inman, W.H.: The data warehouse and data mining. Communications of the ACM 39(11) (1996)

    Google Scholar 

  14. Brown, D.E., Corruble, V., Pittard, C.I.: A Comparison of Decision Tree Classifiers with Backpropagation neural networks for multimodal Classification Problems. Pattern Recognition C 26, 953–961 (1993)

    Article  Google Scholar 

  15. Lim, T.-S., Loh, W.-Y., Shih, Y.-S.: A Comparison of Prediction Accuracy, Complexity, and training time of Thirty-three old and new classification algorithms. Machine Learning C 40, 203–228 (2000)

    Article  Google Scholar 

  16. Quinlan, J.R.: An emprical comparison of genetic and decision-tree classfiers. In: Proc. 5th Int’l Conf. Machine Learning, San Mateo, CA, pp. 135–141 (1998)

    Google Scholar 

  17. Gehrke, J., Ganti, V., Ramakrishnan, R., Loh, W.-Y.: BOAT.optimistic decision tree construction. In: Proceedings of the 1999 ACM SIGMOD International Conference on Management of Data, Philadelphia, Pennsylvania (1999)

    Google Scholar 

  18. Quinlan, J.R.: Induction of decision trees. Machine Learning 1, 81–106 (1986)

    Google Scholar 

  19. Ruggieri, S.: Efficient C4.5. IEEE Transaction on Knowledge and Data Engineering 14(2), 438–444 (2002)

    Article  Google Scholar 

  20. Mitchell, T.M.: Machine Learning. McGraw Hill, New York (1997)

    MATH  Google Scholar 

  21. Hyafil, L., Rivest, R.L.: Constructing Optimal Binary Decision Trees is NP-Complete. Information Processing Letters 5(1), 15–17 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  22. Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Francisco (1993)

    Google Scholar 

  23. Mehta, M., Rissanen, J., Agrawal, R.: MDL-based decision tree pruning. In: Proc. of the 1st Int’l Conf. on Knowledge Discovery and Data Mining, Montreal, Canada (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jae Kwang Lee Okyeon Yi Moti Yung

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Paek, SH., Oh, YK., Lee, DH. (2007). sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm. In: Lee, J.K., Yi, O., Yung, M. (eds) Information Security Applications. WISA 2006. Lecture Notes in Computer Science, vol 4298. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71093-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71093-6_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71092-9

  • Online ISBN: 978-3-540-71093-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics