A Rough Set Based Decision Tree Algorithm and Its Application in Intrusion Detection

  • Lin Zhou
  • Feng Jiang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6744)

Abstract

In this paper, we propose a novel rough set based algorithm to induce decision trees. To improve the computation efficiency of our algorithm, the rough set based attribute reduction technology is used to filter out the irrelevant attributes from the original set of attributes. And the notions of the significance of attribute and the uniformity of attribute in rough sets are adopted as the heuristic information for the selection of splitting attributes. Moreover, we apply the proposed algorithm to intrusion detection. The experimental results demonstrate that our algorithm can provide competitive solutions efficiently.

Keywords

Rough sets decision trees significance of attribute uniformity of attribute intrusion detection 

References

  1. 1.
    Quinlan, R.: Induction of decision trees. Machine Learning 1(1), 81–106 (1986)Google Scholar
  2. 2.
    Quinlan, R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Francisco (1993)Google Scholar
  3. 3.
    Pawlak, Z.: Rough Sets. Int. J. Comput. Informat. Sci. 11(5), 341–356 (1982)MathSciNetCrossRefMATHGoogle Scholar
  4. 4.
    Pawlak, Z.: Rough Sets: Theoretical Aspects of Reasoning about Data. Kluwer Academic Publishing, Dordrecht (1991)CrossRefMATHGoogle Scholar
  5. 5.
    Li, X.P., Dong, M.: An algorithm for constructing decision tree based on variable precision rough set model. In: Proc. of the 4th Int. Conf. on Natural Computation, pp. 280–283 (2008)Google Scholar
  6. 6.
    Jiang, Y., Li, Z.H., Zhang, Q., Liu, Y.: New method for constructing decision tree based on rough set theory. Computer Appliactions 24(8), 21–23 (2004)Google Scholar
  7. 7.
    Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co., Fort Washington (1980)Google Scholar
  8. 8.
    Li, X.Y., Ye, N.: Decision tree classifiers for computer intrusion detection. Journal of Parallel and Distributed Computing Practices 4(2), 179–190 (2001)MathSciNetGoogle Scholar
  9. 9.
    Wang, G.Y.: Rough set theory and knowledge acquisition. Xian Jiaotong University Press (2001)Google Scholar
  10. 10.
    Liu, S.H., Sheng, Q.J., Wu, B., Shi, Z.Z.: Research on efficient algorithms for rough set methods. Chinese Journal of Computers 26(5), 525–529 (2003)Google Scholar
  11. 11.
    Xu, Z.Y., Liu, Z.P., Yang, B.R., Song, W.: A Quick Attribute Reduction Algorithm with Complexity of max(O(|C| |U|),O(|C|2 |U/C|)). Chinese Journal of Computers 29(3), 391–399 (2006)Google Scholar
  12. 12.
  13. 13.
    Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations. Morgan Kaufmann, San Francisco (2000)Google Scholar
  14. 14.
    Chen, S.T., Chen, G.L., Guo, W.Z., Liu, Y.H.: Feature Selection of the Intrusion Detection Data Based on Particle Swarm Optimization and Neighborhood Reduction. Journal of Computer Research and Development 47(7), 1261–1267 (2010)Google Scholar
  15. 15.
    Øhrn, A.: Rosetta Technical Reference Manual (1999), http://www.idi.ntnu.no/_aleks/rosetta
  16. 16.
    Banerjee, M., Mitra, S., Banka, H.: Evolutionary-Rough feature selection in gene expression data. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 37, 622–632 (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Lin Zhou
    • 1
  • Feng Jiang
    • 1
  1. 1.College of Information Science and TechnologyQingdao University of Science and TechnologyQingdaoP.R. China

Personalised recommendations