Nothing Special   »   [go: up one dir, main page]

Skip to main content

Performance Analysis of Tree Based Classification Algorithms for Intrusion Detection System

  • Conference paper
Mining Intelligence and Knowledge Exploration

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 8284))

Abstract

Intruders attack both commercial and corporate distributed systems successfully. The problem of intruders has become vital. The most effective resistance today is the use of Intrusion Detection Systems. An intrusion detection system analysis all aspects of network activities in order to identify the existence of unusual patterns that may represent a network or system attack made by intruders attempting to compromise a system. This paper brings an idea of applying data mining algorithms to the intrusion detection system. Performance of various tree based classifiers like Decision Stump, BF Tree, ID3, J48, LAD, Random Tree, REP Tree, Random Forest and Simple Cart algorithms are compared and the experimental study shows that the Random Forest algorithm outperforms than other algorithms in terms of accuracy, specificity and sensitivity and Time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Han, J., Kamber: Data Mining: Concepts and Techniques, 2nd edn. Morgan Kaufman Publishers, Elsevier Inc. (2006)

    Google Scholar 

  2. Banfield, R.E., Bowyer, K.W., Philip Kegelmeyer, W.: A Comparison of Decision Tree Ensemble Creation Techniques. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1–18 (2006)

    Google Scholar 

  3. Sabhnani, M., Serpen, G.: Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context, pp. 1–7

    Google Scholar 

  4. Renu Deepti, S., Loshma, G.: A Novel Data Mining Based Approach for Remote Intrusion Detection. International Journal of Computer Trends and Technology 3(3), 430–435 (2012)

    Google Scholar 

  5. Kumar, Y., Upendra: An efficient Intrusion Detection Based on Detecision Tree Classifier Using Feature Reduction. International Journal of Scientific and Research Publications 2(1), 1–6 (2012)

    Google Scholar 

  6. Mulay, S.A., Devale, P.R., Garje, G.V.: Intrusion Detection System using Support Vector Machine and Decision Tree. International Journal of Computer Applications 3(3), 40–43 (2010)

    Article  Google Scholar 

  7. Gaikwad, V.S., Kulkarni, P.J.: One Versus All Classification in Network Intrusion detection using decision tree. International Journal of Scientific and Research Publications 2(3), 1–5 (2012)

    Google Scholar 

  8. Sharma, T.C., Jain, M.: WEKA Approach for Comparative Study of Classification Algorithm. International Journal of Advanced Research in Computer and Communication Engineering 2(4), 1925–1931 (2013)

    MathSciNet  Google Scholar 

  9. Available on Wikipedia, http://en.wikipedia.org/wiki/Decision_Stump (last accessed on August 12)

  10. Kumar, N., Obi Reddy, G.P., Chatterji, S.: Evaluation of Best First Decision Tree on Categorical Soil Survey Data for Land Capability Classification. International Journal of Computer Applications 72(4), 5–8 (2013)

    Article  Google Scholar 

  11. Quinlan, J.R.: Induction of Decision Trees. Machine Learning (1), 81–106 (1986)

    Google Scholar 

  12. Folorunsho, O.: Comparative Study of Different Data Mining Techniques Performance in knowledge Discovery from Medical Database. International Journal of Advanced Research in Computer Science and Software Engineering 3(3), 11–15 (2013)

    Google Scholar 

  13. http://weka.sourceforge.net/doc/weka/classifiers/trees/RandomTree.html (last accessed on August 12)

  14. Singh, S., Gupta, D.L., Malviya, A.K.: Performance Analysis of Classification Tree Learning Algorithms. International Journal of Computer Applications 55(6), 39–44 (2012)

    Article  Google Scholar 

  15. Breiman, L.: Random Forest. Machine Learning 45(1), 5–32 (2001)

    Article  MATH  Google Scholar 

  16. Sharma, A.K., Sahnip, S.: A Comparative Study of Classification Algorithms for Spam Email Data Analysis. International Journal on Computer Science and Engineering 3(5), 1890–1895 (2011)

    Google Scholar 

  17. KDD Cup 99 intrusion Detection Data set, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Nadiammai, G.V., Hemalatha, M. (2013). Performance Analysis of Tree Based Classification Algorithms for Intrusion Detection System. In: Prasath, R., Kathirvalavakumar, T. (eds) Mining Intelligence and Knowledge Exploration. Lecture Notes in Computer Science(), vol 8284. Springer, Cham. https://doi.org/10.1007/978-3-319-03844-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03844-5_9

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03843-8

  • Online ISBN: 978-3-319-03844-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics