Abstract
Intruders attack both commercial and corporate distributed systems successfully. The problem of intruders has become vital. The most effective resistance today is the use of Intrusion Detection Systems. An intrusion detection system analysis all aspects of network activities in order to identify the existence of unusual patterns that may represent a network or system attack made by intruders attempting to compromise a system. This paper brings an idea of applying data mining algorithms to the intrusion detection system. Performance of various tree based classifiers like Decision Stump, BF Tree, ID3, J48, LAD, Random Tree, REP Tree, Random Forest and Simple Cart algorithms are compared and the experimental study shows that the Random Forest algorithm outperforms than other algorithms in terms of accuracy, specificity and sensitivity and Time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Han, J., Kamber: Data Mining: Concepts and Techniques, 2nd edn. Morgan Kaufman Publishers, Elsevier Inc. (2006)
Banfield, R.E., Bowyer, K.W., Philip Kegelmeyer, W.: A Comparison of Decision Tree Ensemble Creation Techniques. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1–18 (2006)
Sabhnani, M., Serpen, G.: Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context, pp. 1–7
Renu Deepti, S., Loshma, G.: A Novel Data Mining Based Approach for Remote Intrusion Detection. International Journal of Computer Trends and Technology 3(3), 430–435 (2012)
Kumar, Y., Upendra: An efficient Intrusion Detection Based on Detecision Tree Classifier Using Feature Reduction. International Journal of Scientific and Research Publications 2(1), 1–6 (2012)
Mulay, S.A., Devale, P.R., Garje, G.V.: Intrusion Detection System using Support Vector Machine and Decision Tree. International Journal of Computer Applications 3(3), 40–43 (2010)
Gaikwad, V.S., Kulkarni, P.J.: One Versus All Classification in Network Intrusion detection using decision tree. International Journal of Scientific and Research Publications 2(3), 1–5 (2012)
Sharma, T.C., Jain, M.: WEKA Approach for Comparative Study of Classification Algorithm. International Journal of Advanced Research in Computer and Communication Engineering 2(4), 1925–1931 (2013)
Available on Wikipedia, http://en.wikipedia.org/wiki/Decision_Stump (last accessed on August 12)
Kumar, N., Obi Reddy, G.P., Chatterji, S.: Evaluation of Best First Decision Tree on Categorical Soil Survey Data for Land Capability Classification. International Journal of Computer Applications 72(4), 5–8 (2013)
Quinlan, J.R.: Induction of Decision Trees. Machine Learning (1), 81–106 (1986)
Folorunsho, O.: Comparative Study of Different Data Mining Techniques Performance in knowledge Discovery from Medical Database. International Journal of Advanced Research in Computer Science and Software Engineering 3(3), 11–15 (2013)
http://weka.sourceforge.net/doc/weka/classifiers/trees/RandomTree.html (last accessed on August 12)
Singh, S., Gupta, D.L., Malviya, A.K.: Performance Analysis of Classification Tree Learning Algorithms. International Journal of Computer Applications 55(6), 39–44 (2012)
Breiman, L.: Random Forest. Machine Learning 45(1), 5–32 (2001)
Sharma, A.K., Sahnip, S.: A Comparative Study of Classification Algorithms for Spam Email Data Analysis. International Journal on Computer Science and Engineering 3(5), 1890–1895 (2011)
KDD Cup 99 intrusion Detection Data set, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this paper
Cite this paper
Nadiammai, G.V., Hemalatha, M. (2013). Performance Analysis of Tree Based Classification Algorithms for Intrusion Detection System. In: Prasath, R., Kathirvalavakumar, T. (eds) Mining Intelligence and Knowledge Exploration. Lecture Notes in Computer Science(), vol 8284. Springer, Cham. https://doi.org/10.1007/978-3-319-03844-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-03844-5_9
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-03843-8
Online ISBN: 978-3-319-03844-5
eBook Packages: Computer ScienceComputer Science (R0)