International Conference in Computational Intelligence |
Foundation of Computer Science USA |
ICCIA - Number 8 |
March 2012 |
Authors: Radhakrishna Naik, Vivek Kshirsagar, B S Sonawane |
7b61b179-cbe6-4083-b0ed-f6bccc8fafa9 |
Radhakrishna Naik, Vivek Kshirsagar, B S Sonawane . New Strategy for detecting Intrusion by using c4.5 algorithm. International Conference in Computational Intelligence. ICCIA, 8 (March 2012), 41-45.
Nowadays, as information systems are more open to the Internet, the importance of secure networks is tremendously increased. New intelligent Intrusion Detection Systems (IDSs) which are based on sophisticated algorithms rather than current signature-base detections are in demand. In this paper, we propose a new data-mining based technique for intrusion detection using an ensemble of binary classifiers with feature selection and multiboosting simultaneously. Our model employs feature selection so that the binary classifier for each type of attack can be more accurate, which improves the detection of attacks that occur less frequently in the training data. Based on the accurate binary classifiers, our model applies a new ensemble approach which aggregates each binary classifier’s decisions for the same input and decides which class is most suitable for a given input. During this process, the potential bias of certain binary classifier could be alleviated by other binary classifiers’ decision. Our model also makes use of multiboosting for reducing both variance and bias. The experimental results show that our approach provides better performance in terms of accuracy and cost than the winner entry of the ‘Knowledge Development and Data mining’ (KDD) ’99 cup challenge. Future works will extend our analysis to a new ‘Protected Repository for the Defense of Infrastructure against Cyber Threats’ (PREDICT) dataset as well as real network data.