Decision Tree and Genetic Algorithm Based Intrusion Detection System

Today’s computer network security systems like IDS, firewall, access control, etc., are not yet 100% trusted, Still they are suffering from the high classification error. Therefore, there is challenge for the researchers to minimize the classification error of the IDS. In this paper, an IDS has been proposed which is based on the decision tree and genetic algorithm. The base of the system is decision tree C4.5 and in the second phase of the intrusion detection system, genetic algorithm is used to overcome the problem of small disjunct in the C4.5. The competence of the system is tested with KDD CUP data set and outcomes of the proposed system are compared with existing systems. It is worth to mention that the experimental assessment of the proposed system is better in comparison to the IDS reported in the literatures.

[1]  María José del Jesús,et al.  KEEL: a software tool to assess evolutionary algorithms for data mining problems , 2008, Soft Comput..

[2]  Vijay Kumar Jha,et al.  Data Mining in Intrusion Detection: A Comparative Study of Methods, Types and Data Sets , 2013 .

[3]  Andrew J. Clark,et al.  Data preprocessing for anomaly based network intrusion detection: A review , 2011, Comput. Secur..

[4]  Cungen Cao,et al.  An incremental decision tree algorithm based on rough sets and its application in intrusion detection , 2011, Artificial Intelligence Review.

[5]  Shingo Mabu,et al.  An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[6]  Gulshan Kumar,et al.  The use of artificial intelligence based techniques for intrusion detection: a review , 2010, Artificial Intelligence Review.

[7]  Snehal A. Mulay,et al.  Intrusion Detection System using Support Vector Machine and Decision Tree , 2010 .

[8]  Shu-Hsien Liao,et al.  Data mining techniques and applications - A decade review from 2000 to 2011 , 2012, Expert Syst. Appl..

[9]  Deborah R. Carvalho,et al.  A Genetic Algorithm-Based Solution for the Problem of Small Disjuncts , 2000, PKDD.

[10]  Vijay Kumar Jha,et al.  A Novel Fuzzy Min-Max Neural Network and Genetic Algorithm-Based Intrusion Detection System , 2016 .

[11]  Wei Fan,et al.  Mining big data: current status, and forecast to the future , 2013, SKDD.

[12]  Gisung Kim,et al.  A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014, Expert Syst. Appl..

[13]  Julie Greensmith,et al.  Immune system approaches to intrusion detection – a review , 2004, Natural Computing.

[14]  Arputharaj Kannan,et al.  An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm , 2008, Int. J. Commun. Netw. Syst. Sci..

[15]  Vijay Kumar Jha,et al.  Fuzzy min–max neural network and particle swarm optimization based intrusion detection system , 2017 .

[16]  Taeshik Shon,et al.  A hybrid machine learning approach to network anomaly detection , 2007, Inf. Sci..

[17]  Amutha Prabakar Muniyandi,et al.  Network Anomaly Detection by Cascading K-Means Clustering and C4.5 Decision Tree algorithm , 2012 .

[18]  A. El-Semary,et al.  Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection , 2006, 2006 IEEE Information Assurance Workshop.

[19]  Sujatha Srinivasan,et al.  Intelligent agent based artificial immune system for computer security—a review , 2009, Artificial Intelligence Review.

[20]  Udo W. Pooch,et al.  Adaptation techniques for intrusion detection and intrusion response systems , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[21]  Klaus Julisch,et al.  Data Mining for Intrusion Detection , 2002, Applications of Data Mining in Computer Security.

[22]  Leonid Portnoy,et al.  Intrusion detection with unlabeled data using clustering , 2000 .

[23]  Bhavani M. Thuraisingham,et al.  A new intrusion detection system using support vector machines and hierarchical clustering , 2007, The VLDB Journal.

[24]  Monark Bag,et al.  Cascading of C4.5 Decision Tree and Support Vector Machine for Rule Based Intrusion Detection System , 2012 .

[25]  S. Saravan Kumar,et al.  An Intelligent Intrusion Detection System Using Average Manhattan Distance-based Decision Tree , 2015 .

[26]  Ramakrishnan Srikant,et al.  Fast algorithms for mining association rules , 1998, VLDB 1998.

[27]  Vijay Kumar Jha,et al.  Data Mining based Hybrid Intrusion Detection System , 2014 .

[28]  Hesham Altwaijry,et al.  Bayesian based intrusion detection system , 2012, J. King Saud Univ. Comput. Inf. Sci..

[29]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[30]  Deborah R. Carvalho,et al.  A hybrid decision tree/genetic algorithm for coping with the problem of small disjuncts in data mining , 2000, GECCO.

[31]  A. Kannan,et al.  An intelligent intrusion detection system using genetic based feature selection and Modified J48 decision tree classifier , 2013, 2013 Fifth International Conference on Advanced Computing (ICoAC).

[32]  Guangjie Han,et al.  IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks , 2013, IET Inf. Secur..

[33]  Vijay Kumar Jha,et al.  Genetic Algorithm to Solve the Problem of Small Disjunct In the Decision Tree Based Intrusion Detection System , 2015 .

[34]  Manas Ranjan Patra,et al.  A Hybrid Intelligent Approach for Network Intrusion Detection , 2012 .

[35]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[36]  Arputharaj Kannan,et al.  Decision tree based light weight intrusion detection using a wrapper approach , 2012, Expert Syst. Appl..

[37]  Robert C. Holte,et al.  Concept Learning and the Problem of Small Disjuncts , 1989, IJCAI.

[38]  Deborah R. Carvalho,et al.  A genetic-algorithm for discovering small-disjunct rules in data mining , 2002, Appl. Soft Comput..

[39]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[40]  Deborah R. Carvalho,et al.  A Genetic Algorithm With Sequential Niching For Discovering Small-disjunct Rules , 2002, GECCO.