CFP last date
20 December 2024
Reseach Article

Real Time and Offline Network Intrusion Detection using Improved Decision Tree Algorithm

by G. Sunil Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 48 - Number 25
Year of Publication: 2012
Authors: G. Sunil Kumar
10.5120/7541-0482

G. Sunil Kumar . Real Time and Offline Network Intrusion Detection using Improved Decision Tree Algorithm. International Journal of Computer Applications. 48, 25 ( June 2012), 1-6. DOI=10.5120/7541-0482

@article{ 10.5120/7541-0482,
author = { G. Sunil Kumar },
title = { Real Time and Offline Network Intrusion Detection using Improved Decision Tree Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 48 },
number = { 25 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume48/number25/7541-0482/ },
doi = { 10.5120/7541-0482 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:44:59.769102+05:30
%A G. Sunil Kumar
%T Real Time and Offline Network Intrusion Detection using Improved Decision Tree Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 48
%N 25
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data mining has been used extensively and broadly by several network organizations. Classification based algorithms provide a significant advantage in order to detect attacks in the training data. Network applications usage is being increased every day as the internet usage is exponentially increasing. In the same way, Network attacks detection is gradually decreased as data source is increasing. There is a need to develop some robust decision tree in order to produce effective decision rules from the attacked data. In this paper improved, decision tree is implemented in order to detect network attacks like TCP SYN , Ping of Death, ARP Spoof attacks. This improved tree is also tested on famous network intrusion dataset Kddcup 99 dataset. Experimental result shows this improved decision tree classifier gives effective decision rules compare to existing decision tree techniques like ID3 and C45 algorithms. Finally, this robust decision tree evaluates less false positive and true negative alarm rates compare to existing algorithms.

References
  1. Dianhong Wang, Liangxiao Jiang "An Improved Attribute Selection Measure for Decision Tree Induction",IEEE Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007).
  2. R. L. de Mantaras. A distance-based attribute selection measure for decision tree induction. Machine Learning, 6:81–92, 1991.
  3. J. Mingers. An empirical comparison of selection measures for decision-tree induction. Machine Learning, 3:319–342, 1989.
  4. Nageswararao,Dr. D. RajyaLakshmi,Prof T. Venkateswara Rao," Robust Statistical Outlier based Feature Selection Technique for Network Intrusion Detection ,(IJSCE 2012).
  5. http://en. wikipedia. org/wiki/C4. 5_algorithm .
  6. Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani "A Detailed Analysis of the KDD CUP 99 Data Set", IEEE 2009.
  7. http://www. webopedia. com/TERM/P/ping_of_death. html
  8. Ian H. Witten, Eibe Frank, Len Trigg, Mark Hall," Weka: Practical Machine Learning Tools and Techniques with Java Implementations"
  9. J. R. Quinlan, "C4. 5: programs for machine learning", Morgan Kaufmann Publishers, 1993.
  10. Hybrid Neural Network and C4. 5 for Misuse Detection Zhi-Song Pan, Song-Can Chen, Gen-Bao Hu, Dao-Qiang Zhang, Proceedings of the Second International Conference on Machine Learning and Cybernetics, Xi'an, 2-5 November 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Ddos Tcp Upd C45