Abstract
Today’s computer network security systems like IDS, firewall, access control, etc., are not yet 100% trusted, Still they are suffering from the high classification error. Therefore, there is challenge for the researchers to minimize the classification error of the IDS. In this paper, an IDS has been proposed which is based on the decision tree and genetic algorithm. The base of the system is decision tree C4.5 and in the second phase of the intrusion detection system, genetic algorithm is used to overcome the problem of small disjunct in the C4.5. The competence of the system is tested with KDD CUP data set and outcomes of the proposed system are compared with existing systems. It is worth to mention that the experimental assessment of the proposed system is better in comparison to the IDS reported in the literatures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shon T, Moon J. A hybrid machine learning approach to network anomaly detection. Information Sciences. 2007 Sep 15; 177(18): 3799–821.
Ragsdale DJ, Carver Jr CA, Humphries JW, Pooch UW. Adaptation techniques for intrusion detection and intrusion response systems. In Systems, Man, and Cybernetics, 2000 IEEE International Conference on 2000 (Vol. 4, pp. 2344–2349). IEEE.
http://en.wikipedia.org/wiki/Internet_traffic [Accessed on February 18th, 2015].
Sindhu SS, Geetha S, Kannan A. Decision tree based light weight intrusion detection using a wrapper approach. Expert Systems with applications. 2012 Jan 31; 39(1): 129–41.
Azad C, Jha VK. Data mining in intrusion detection: a comparative study of methods, types and data sets. International Journal of Information Technology and Computer Science (IJITCS). 2013 Jul 1; 5(8): 75.
Kim J, Bentley PJ, Aickelin U, Greensmith J, Tedesco G, Twycross J. Immune system approaches to intrusion detection–a review. Natural computing. 2007 Dec 1; 6(4): 413–66.
Kumar G, Kumar K, Sachdeva M. The use of artificial intelligence based techniques for intrusion detection: a review. Artificial Intelligence Review. 2010 Dec 1; 34(4): 369–87.
Liao HJ, Lin CH, Lin YC, Tung KY. Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications. 2013 Jan 31; 36(1): 16–24.
Ramakrishnan S, Srinivasan S. Intelligent agent based artificial immune system for computer security—a review. Artificial Intelligence Review. 2009 Dec 1; 32(1–4): 13–43.
Julisch K. Data mining for intrusion detection. In Applications of data mining in computer security 2002 (pp. 33–62). Springer US.
Liao SH, Chu PH, Hsiao PY. Data mining techniques and applications–A decade review from 2000 to 2011. Expert Systems with Applications. 2012 Sep 15; 39(12): 11303–11.
Fan W, Bifet A. Mining big data: current status, and forecast to the future. ACM sIGKDD Explorations Newsletter. 2013 Apr 30; 14(2): 1–5.
Han G, Jiang J, Shen W, Shu L, Rodrigues J. IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks. Information Security, IET. 2013 Jun; 7(2): 97–105.
Altwaijry H. Bayesian based intrusion detection system. In IAENG Transactions on Engineering Technologies 2013 (pp. 29–44). Springer Netherlands.
Azad C, Jha VK. Data mining based hybrid intrusion detection system. Indian Journal of Science and Technology. 2014 Jun 30; 7(6): 781–9.
Kim G, Lee S, Kim S. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications. 2014 Mar 31; 41(4): 1690–700.
Khan L, Awad M, Thuraisingham B. A new intrusion detection system using support vector machines and hierarchical clustering. The VLDB Journal—The International Journal on Very Large Data Bases. 2007 Oct 1; 16(4): 507–21.
Portnoy L. Intrusion detection with unlabeled data using clustering. 2000.
Rajeswari LP, Arputharaj K. An active rule approach for network intrusion detection with enhanced C4. 5 Algorithm. International Journal of Communications, Network and System Sciences. 2008 Nov 1; 1(4): 314.
Agrawal R, Srikant R. Fast algorithms for mining association rules. In Proc. 20th int. conf. very large data bases, VLDB 1994 Sep 12 (Vol. 1215, pp. 487–499).
El-Semary A, Edmonds J, Gonzalez-Pino J, Papa M. Applying data mining of fuzzy association rules to network intrusion detection. In Information Assurance Workshop, 2006 IEEE 2006 Jun 21 (pp. 100–107). IEEE.
Mabu S, Chen C, Lu N, Shimada K, Hirasawa K. An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on. 2011 Jan; 41(1): 130–9.
Davis JJ, Clark AJ. Data preprocessing for anomaly based network intrusion detection: A review. Computers & Security. 2011 Oct 31; 30(6): 353–75.
Anderson JP. Computer security threat monitoring and surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania; 1980 Apr 15.
Azad C, Jha VK. Fuzzy min–max neural network and particle swarm optimization based intrusion detection system. Microsystem Technologies. 2016: 1–2.
Azad C, Jha VK. A Novel Fuzzy Min-Max Neural Network and Genetic Algorithm-Based Intrusion Detection System. In Proceedings of the Second International Conference on Computer and Communication Technologies 2016 (pp. 429–439). Springer India.
Denning DE. An intrusion-detection model. Software Engineering, IEEE Transactions on. 1987 Feb(2): 222–32.
Mulay SA, Devale PR, Garje GV. Intrusion detection system using support vector machine and decision tree. International Journal of Computer Applications. 2010 Jun; 3(3): 40–3.
Senthilnayaki B, Venkatalakshmi K, Kannan A. An intelligent intrusion detection system using genetic based feature selection and Modified J48 decision tree classifier. In Advanced Computing (ICoAC), 2013 Fifth International Conference on 2013 Dec 18 (pp. 1–7). IEEE.
Muniyandi AP, Rajeswari R, Rajaram R. Network anomaly detection by cascading k-Means clustering and C4. 5 decision tree algorithm. Procedia Engineering. 2012 Dec 31; 30: 174–82.
Panda M, Abraham A, Patra MR. A hybrid intelligent approach for network intrusion detection. Procedia Engineering. 2012 Dec 31; 30: 1–9.
Selvi R, Kumar SS, Suresh A. An Intelligent Intrusion Detection System Using Average Manhattan Distance-based Decision Tree. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems 2015 (pp. 205–212). Springer India.
Jiang F, Sui Y, Cao C. An incremental decision tree algorithm based on rough sets and its application in intrusion detection. Artificial Intelligence Review. 2013 Dec 1; 40(4): 517–30.
Koshal J, Bag M. Cascading of C4. 5 decision tree and support vector machine for rule based intrusion detection system. International Journal of Computer Network and Information Security. 2012 Aug 1; 4(8): 8.
Quinlan JR. C4. 5: programs for machine learning. Elsevier; 2014 Jun 28.
Carvalho DR, Freitas AA. A genetic algorithm-based solution for the problem of small disjuncts. In Principles of Data Mining and Knowledge Discovery 2000 Sep 13 (pp. 345–352). Springer Berlin Heidelberg.
Carvalho DR, Freitas AA. A hybrid decision tree/genetic algorithm method for data mining. Information Sciences. 2004 Jun 14; 163(1): 13–35.
Holte RC, Acker L, Porter BW. Concept Learning and the Problem of Small Disjuncts. In IJCAI 1989 Aug 20 (Vol. 89, pp. 813–818).
Carvalho DR, Freitas AA. A hybrid decision tree/genetic algorithm for coping with the problem of small disjuncts in data mining. In GECCO 2000 Jul (pp. 1061–1068).
Carvalho DR, Freitas AA. A genetic-algorithm for discovering small-disjunct rules in data mining. Applied Soft Computing. 2002 Dec 31; 2(2): 75–88.
Carvalho DR, Freitas AA. A Genetic Algorithm With Sequential Niching For Discovering Small-disjunct Rules. In GECCO 2002 Jul 9 (pp. 1035–1042).
Alcala-Fdez J, Sanchez L, Garcia S, del Jesus MJ, Ventura S, Garrell JM, Otero J, Romero C, Bacardit J, Rivas VM, Fernandez JC. KEEL: a software tool to assess evolutionary algorithms for data mining problems. Soft Computing. 2009 Feb 1; 13(3): 307–18.
Azad C, Jha VK. Genetic Algorithm to Solve the Problem of Small Disjunct In the Decision Tree Based Intrusion Detection System. International Journal of Computer Network and Information Security (IJCNIS). 2015 Jul 8; 7(8): 56.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Azad, C., Jha, V.K. (2019). Decision Tree and Genetic Algorithm Based Intrusion Detection System. In: Nath, V., Mandal, J. (eds) Proceeding of the Second International Conference on Microelectronics, Computing & Communication Systems (MCCS 2017). Lecture Notes in Electrical Engineering, vol 476. Springer, Singapore. https://doi.org/10.1007/978-981-10-8234-4_13
Download citation
DOI: https://doi.org/10.1007/978-981-10-8234-4_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8233-7
Online ISBN: 978-981-10-8234-4
eBook Packages: EngineeringEngineering (R0)