An Improved Perceptron Tree Learning Model Based Intrusion Detection Approach

This paper dedicates to develop an improved perceptron tree (PT) learning model based intrusion detection approach. The binary tree structure of a PT enables the model to divide the intrusion detection problem into sub-problems and solve them in decreased complexity in different tree levels. The expert neural networks (ENNs) embedded in the internal nodes can be simplified by limiting the number of inputs and hidden neurons. The potential advantage of a PT is that the trained learning model is actually a “gray box” since each embedded simplified ENN can be interpreted into explicit rules easily. However, the whole structure of a PT is likely to be high complex, i.e., the trained PT is probably composed of a large number of internal nodes. In this case, the disjunctive description of the learned intrusion detection rules extracted from such PT is too complex to understand. The generalization ability of the detection approach may be depressed as well. In view of this situation, the structure of the trained PT needs to be fine pruned. The experimental results demonstrate that the proposed approach can achieve competitive detection accuracy as well as refined learning model structure.

[1]  Cheng Xiang,et al.  Design of Multiple-Level Hybrid Classifier for Intrusion Detection System , 2005, 2005 IEEE Workshop on Machine Learning for Signal Processing.

[2]  Hiroshi Tsukimoto,et al.  Extracting rules from trained neural networks , 2000, IEEE Trans. Neural Networks Learn. Syst..

[3]  Jingwen Tian,et al.  Network Intrusion Detection Method Based on High Speed and Precise Genetic Algorithm Neural Network , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[4]  Tai-Myoung Chung,et al.  Effective Value of Decision Tree with KDD 99 Intrusion Detection Datasets for Intrusion Detection System , 2008, 2008 10th International Conference on Advanced Communication Technology.

[5]  Rachid Beghdad,et al.  Critical study of neural networks in detecting intrusions , 2008, Comput. Secur..

[6]  S. T. Sarasamma,et al.  Hierarchical Kohonenen net for anomaly detection in network security , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[7]  Xu Qin-zhen An Automatic Facial Expression Recognition Approach Based on Confusion-crossed Support Vector Machine Tree , 2008 .

[8]  Luxi Yang,et al.  An Intrusion Detection Approach Based On Understandable Neural Network Trees , 2006 .

[9]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[10]  N. Chowdhury,et al.  A comparative analysis of Feed-forward neural network & Recurrent Neural network to detect intrusion , 2008, 2008 International Conference on Electrical and Computer Engineering.

[11]  Johnny S. Wong,et al.  Anomalous intrusion detection system for hostile Java applets , 2001, J. Syst. Softw..

[12]  Zhi-Hua Zhou,et al.  Hybrid decision tree , 2002, Knowl. Based Syst..

[13]  Qiangfu Zhao,et al.  Evolutionary design of neural network tree-integration of decision tree, neural network and GA , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).

[14]  Guisong Liu,et al.  An integrated intrusion detection system by using multiple neural networks , 2008, 2008 IEEE Conference on Cybernetics and Intelligent Systems.

[15]  C. Xiang,et al.  Design of mnitiple-level tree classifiers for intrusion detection system , 2004, IEEE Conference on Cybernetics and Intelligent Systems, 2004..