Intelligent intrusion detection system using fuzzy rough set based C4.5 algorithm

In recent years, as the usage of internet increases, new type of attacks on network information is also increasing continuously. Intrusion Detection System (IDS) is an important component that provides security to the network information by identifying various kinds of attacks occurring in the networks. Currently, there are many researches who are working in this area and they focus on developing effective IDS using machine learning techniques. However, there is a need for better systems with improved detection accuracy and reduced false alarm rate. In this paper, we propose an Intelligent IDS using fuzzy rough set based C4.5 classification algorithm to improve the detection accuracy. This system has been compared with Support Vector Machines for illustrating the improvement with respect to the detection accuracy. The inputs to these classifiers were preprocessed using a fuzzy rough set based outlier detection algorithm. In this work, we used the KDD'99 Cup dataset for carrying out the simulation of the experiments. The experimental results obtained in this work show that the proposed model reduces the false alarm rate and improves overall detection accuracy.

[1]  S J Ghule,et al.  Network Intrusion Detection System using Fuzzy Logic , 2014 .

[2]  L. Kuncheva Fuzzy rough sets: application to feature selection , 1992 .

[3]  I. Hatono,et al.  Fuzzy decision trees by fuzzy ID3 algorithm and its application to diagnosis systems , 1994, Proceedings of 1994 IEEE 3rd International Fuzzy Systems Conference.

[4]  J. Ross Quinlan,et al.  Induction of Decision Trees , 1986, Machine Learning.

[5]  Qinghua Hu,et al.  Information-preserving hybrid data reduction based on fuzzy-rough techniques , 2006, Pattern Recognit. Lett..

[6]  R. Shanmugavadivu NETWORK INTRUSION DETECTION SYSTEM USING FUZZY LOGIC , 2011 .

[7]  Xizhao Wang,et al.  Attributes Reduction Using Fuzzy Rough Sets , 2008, IEEE Transactions on Fuzzy Systems.

[8]  M. Shaw,et al.  Induction of fuzzy decision trees , 1995 .

[9]  Chang-Tien Lu,et al.  Algorithms for spatial outlier detection , 2003, Third IEEE International Conference on Data Mining.

[10]  Thair Nu Phyu Survey of Classification Techniques in Data Mining , 2009 .

[11]  Chih-Fong Tsai,et al.  A triangle area based nearest neighbors approach to intrusion detection , 2010, Pattern Recognit..

[12]  Daniel S. Yeung,et al.  Rough approximations on a complete completely distributive lattice with applications to generalized rough sets , 2006, Inf. Sci..

[13]  Sukumar Nandi,et al.  An Outlier Detection Method Based on Clustering , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.

[14]  Qiang Shen,et al.  Centre for Intelligent Systems and Their Applications Fuzzy Rough Attribute Reduction with Application to Web Categorization Fuzzy Rough Attribute Reduction with Application to Web Categorization Fuzzy Sets and Systems ( ) – Fuzzy–rough Attribute Reduction with Application to Web Categorization , 2022 .

[15]  Salvatore Ruggieri,et al.  Efficient C4.5 , 2002, IEEE Trans. Knowl. Data Eng..

[16]  Venkata Naga Sudheer Decision Tree Construction Based on Degree of Rough Sets D , 2011 .

[17]  Fu Xiao,et al.  Using Outlier Detection to Reduce False Positives in Intrusion Detection , 2008, 2008 IFIP International Conference on Network and Parallel Computing.

[18]  D. Dubois,et al.  ROUGH FUZZY SETS AND FUZZY ROUGH SETS , 1990 .

[19]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[20]  Shashi Shekhar,et al.  A Unified Approach to Detecting Spatial Outliers , 2003, GeoInformatica.

[21]  C. Lu A Uniied Approach to Spatial Outliers Detection , 2003 .

[22]  Lin Yao,et al.  Algorithm for Fast Spatial Outlier Detection , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[23]  Jisu Oh,et al.  Spatial Outlier Detection and Implementation in WEKA ” , 2004 .

[24]  Tien-Chin Wang,et al.  Constructing a fuzzy decision tree by integrating fuzzy sets and entropy , 2006 .

[25]  Arputharaj Kannan,et al.  An Intelligent Agent Based Intrusion Detection System Using Fuzzy Rough Set Based Outlier Detection , 2012, Soft Computing Techniques in Vision Science.