Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 476))

Abstract

Today’s computer network security systems like IDS, firewall, access control, etc., are not yet 100% trusted, Still they are suffering from the high classification error. Therefore, there is challenge for the researchers to minimize the classification error of the IDS. In this paper, an IDS has been proposed which is based on the decision tree and genetic algorithm. The base of the system is decision tree C4.5 and in the second phase of the intrusion detection system, genetic algorithm is used to overcome the problem of small disjunct in the C4.5. The competence of the system is tested with KDD CUP data set and outcomes of the proposed system are compared with existing systems. It is worth to mention that the experimental assessment of the proposed system is better in comparison to the IDS reported in the literatures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shon T, Moon J. A hybrid machine learning approach to network anomaly detection. Information Sciences. 2007 Sep 15; 177(18): 3799–821.

    Google Scholar 

  2. Ragsdale DJ, Carver Jr CA, Humphries JW, Pooch UW. Adaptation techniques for intrusion detection and intrusion response systems. In Systems, Man, and Cybernetics, 2000 IEEE International Conference on 2000 (Vol. 4, pp. 2344–2349). IEEE.

    Google Scholar 

  3. http://en.wikipedia.org/wiki/Internet_traffic [Accessed on February 18th, 2015].

  4. Sindhu SS, Geetha S, Kannan A. Decision tree based light weight intrusion detection using a wrapper approach. Expert Systems with applications. 2012 Jan 31; 39(1): 129–41.

    Google Scholar 

  5. Azad C, Jha VK. Data mining in intrusion detection: a comparative study of methods, types and data sets. International Journal of Information Technology and Computer Science (IJITCS). 2013 Jul 1; 5(8): 75.

    Google Scholar 

  6. Kim J, Bentley PJ, Aickelin U, Greensmith J, Tedesco G, Twycross J. Immune system approaches to intrusion detection–a review. Natural computing. 2007 Dec 1; 6(4): 413–66.

    Google Scholar 

  7. Kumar G, Kumar K, Sachdeva M. The use of artificial intelligence based techniques for intrusion detection: a review. Artificial Intelligence Review. 2010 Dec 1; 34(4): 369–87.

    Google Scholar 

  8. Liao HJ, Lin CH, Lin YC, Tung KY. Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications. 2013 Jan 31; 36(1): 16–24.

    Google Scholar 

  9. Ramakrishnan S, Srinivasan S. Intelligent agent based artificial immune system for computer security—a review. Artificial Intelligence Review. 2009 Dec 1; 32(1–4): 13–43.

    Google Scholar 

  10. Julisch K. Data mining for intrusion detection. In Applications of data mining in computer security 2002 (pp. 33–62). Springer US.

    Google Scholar 

  11. Liao SH, Chu PH, Hsiao PY. Data mining techniques and applications–A decade review from 2000 to 2011. Expert Systems with Applications. 2012 Sep 15; 39(12): 11303–11.

    Google Scholar 

  12. Fan W, Bifet A. Mining big data: current status, and forecast to the future. ACM sIGKDD Explorations Newsletter. 2013 Apr 30; 14(2): 1–5.

    Google Scholar 

  13. Han G, Jiang J, Shen W, Shu L, Rodrigues J. IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks. Information Security, IET. 2013 Jun; 7(2): 97–105.

    Google Scholar 

  14. Altwaijry H. Bayesian based intrusion detection system. In IAENG Transactions on Engineering Technologies 2013 (pp. 29–44). Springer Netherlands.

    Google Scholar 

  15. Azad C, Jha VK. Data mining based hybrid intrusion detection system. Indian Journal of Science and Technology. 2014 Jun 30; 7(6): 781–9.

    Google Scholar 

  16. Kim G, Lee S, Kim S. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications. 2014 Mar 31; 41(4): 1690–700.

    Google Scholar 

  17. Khan L, Awad M, Thuraisingham B. A new intrusion detection system using support vector machines and hierarchical clustering. The VLDB Journal—The International Journal on Very Large Data Bases. 2007 Oct 1; 16(4): 507–21.

    Google Scholar 

  18. Portnoy L. Intrusion detection with unlabeled data using clustering. 2000.

    Google Scholar 

  19. Rajeswari LP, Arputharaj K. An active rule approach for network intrusion detection with enhanced C4. 5 Algorithm. International Journal of Communications, Network and System Sciences. 2008 Nov 1; 1(4): 314.

    Google Scholar 

  20. Agrawal R, Srikant R. Fast algorithms for mining association rules. In Proc. 20th int. conf. very large data bases, VLDB 1994 Sep 12 (Vol. 1215, pp. 487–499).

    Google Scholar 

  21. El-Semary A, Edmonds J, Gonzalez-Pino J, Papa M. Applying data mining of fuzzy association rules to network intrusion detection. In Information Assurance Workshop, 2006 IEEE 2006 Jun 21 (pp. 100–107). IEEE.

    Google Scholar 

  22. Mabu S, Chen C, Lu N, Shimada K, Hirasawa K. An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on. 2011 Jan; 41(1): 130–9.

    Google Scholar 

  23. Davis JJ, Clark AJ. Data preprocessing for anomaly based network intrusion detection: A review. Computers & Security. 2011 Oct 31; 30(6): 353–75.

    Google Scholar 

  24. Anderson JP. Computer security threat monitoring and surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania; 1980 Apr 15.

    Google Scholar 

  25. Azad C, Jha VK. Fuzzy min–max neural network and particle swarm optimization based intrusion detection system. Microsystem Technologies. 2016: 1–2.

    Google Scholar 

  26. Azad C, Jha VK. A Novel Fuzzy Min-Max Neural Network and Genetic Algorithm-Based Intrusion Detection System. In Proceedings of the Second International Conference on Computer and Communication Technologies 2016 (pp. 429–439). Springer India.

    Google Scholar 

  27. Denning DE. An intrusion-detection model. Software Engineering, IEEE Transactions on. 1987 Feb(2): 222–32.

    Google Scholar 

  28. Mulay SA, Devale PR, Garje GV. Intrusion detection system using support vector machine and decision tree. International Journal of Computer Applications. 2010 Jun; 3(3): 40–3.

    Google Scholar 

  29. Senthilnayaki B, Venkatalakshmi K, Kannan A. An intelligent intrusion detection system using genetic based feature selection and Modified J48 decision tree classifier. In Advanced Computing (ICoAC), 2013 Fifth International Conference on 2013 Dec 18 (pp. 1–7). IEEE.

    Google Scholar 

  30. Muniyandi AP, Rajeswari R, Rajaram R. Network anomaly detection by cascading k-Means clustering and C4. 5 decision tree algorithm. Procedia Engineering. 2012 Dec 31; 30: 174–82.

    Google Scholar 

  31. Panda M, Abraham A, Patra MR. A hybrid intelligent approach for network intrusion detection. Procedia Engineering. 2012 Dec 31; 30: 1–9.

    Google Scholar 

  32. Selvi R, Kumar SS, Suresh A. An Intelligent Intrusion Detection System Using Average Manhattan Distance-based Decision Tree. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems 2015 (pp. 205–212). Springer India.

    Google Scholar 

  33. Jiang F, Sui Y, Cao C. An incremental decision tree algorithm based on rough sets and its application in intrusion detection. Artificial Intelligence Review. 2013 Dec 1; 40(4): 517–30.

    Google Scholar 

  34. Koshal J, Bag M. Cascading of C4. 5 decision tree and support vector machine for rule based intrusion detection system. International Journal of Computer Network and Information Security. 2012 Aug 1; 4(8): 8.

    Google Scholar 

  35. Quinlan JR. C4. 5: programs for machine learning. Elsevier; 2014 Jun 28.

    Google Scholar 

  36. Carvalho DR, Freitas AA. A genetic algorithm-based solution for the problem of small disjuncts. In Principles of Data Mining and Knowledge Discovery 2000 Sep 13 (pp. 345–352). Springer Berlin Heidelberg.

    Google Scholar 

  37. Carvalho DR, Freitas AA. A hybrid decision tree/genetic algorithm method for data mining. Information Sciences. 2004 Jun 14; 163(1): 13–35.

    Google Scholar 

  38. Holte RC, Acker L, Porter BW. Concept Learning and the Problem of Small Disjuncts. In IJCAI 1989 Aug 20 (Vol. 89, pp. 813–818).

    Google Scholar 

  39. Carvalho DR, Freitas AA. A hybrid decision tree/genetic algorithm for coping with the problem of small disjuncts in data mining. In GECCO 2000 Jul (pp. 1061–1068).

    Google Scholar 

  40. Carvalho DR, Freitas AA. A genetic-algorithm for discovering small-disjunct rules in data mining. Applied Soft Computing. 2002 Dec 31; 2(2): 75–88.

    Google Scholar 

  41. Carvalho DR, Freitas AA. A Genetic Algorithm With Sequential Niching For Discovering Small-disjunct Rules. In GECCO 2002 Jul 9 (pp. 1035–1042).

    Google Scholar 

  42. Alcala-Fdez J, Sanchez L, Garcia S, del Jesus MJ, Ventura S, Garrell JM, Otero J, Romero C, Bacardit J, Rivas VM, Fernandez JC. KEEL: a software tool to assess evolutionary algorithms for data mining problems. Soft Computing. 2009 Feb 1; 13(3): 307–18.

    Google Scholar 

  43. Azad C, Jha VK. Genetic Algorithm to Solve the Problem of Small Disjunct In the Decision Tree Based Intrusion Detection System. International Journal of Computer Network and Information Security (IJCNIS). 2015 Jul 8; 7(8): 56.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chandrashekhar Azad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Azad, C., Jha, V.K. (2019). Decision Tree and Genetic Algorithm Based Intrusion Detection System. In: Nath, V., Mandal, J. (eds) Proceeding of the Second International Conference on Microelectronics, Computing & Communication Systems (MCCS 2017). Lecture Notes in Electrical Engineering, vol 476. Springer, Singapore. https://doi.org/10.1007/978-981-10-8234-4_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8234-4_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8233-7

  • Online ISBN: 978-981-10-8234-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics