Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2345396.2345493acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacciciConference Proceedingsconference-collections
research-article

Intelligent intrusion detection system using fuzzy rough set based C4.5 algorithm

Published: 03 August 2012 Publication History

Abstract

In recent years, as the usage of internet increases, new type of attacks on network information is also increasing continuously. Intrusion Detection System (IDS) is an important component that provides security to the network information by identifying various kinds of attacks occurring in the networks. Currently, there are many researches who are working in this area and they focus on developing effective IDS using machine learning techniques. However, there is a need for better systems with improved detection accuracy and reduced false alarm rate. In this paper, we propose an Intelligent IDS using fuzzy rough set based C4.5 classification algorithm to improve the detection accuracy. This system has been compared with Support Vector Machines for illustrating the improvement with respect to the detection accuracy. The inputs to these classifiers were preprocessed using a fuzzy rough set based outlier detection algorithm. In this work, we used the KDD'99 Cup dataset for carrying out the simulation of the experiments. The experimental results obtained in this work show that the proposed model reduces the false alarm rate and improves overall detection accuracy.

References

[1]
Thair Nu Phyu. 2009. Survey of Classification Techniques in Data Mining. In Proceedings of the International Multi Conference of Engineers and Computer Scientists. Vol. 1, (IMECS) March 18-20, Hong Kong.
[2]
Chih-Fong Tsai and Chia-YingLin. 2010. A triangle area based nearest neighbours approach to intrusion detection. Pattern Recognition. Vol. 43, 222--229.
[3]
Salvatore Ruggieri. 2002. Efficient C4.5. IEEE Transaction on knowledge and data engineering. Vol. 14, No. 2, 438--444.
[4]
Jisu Oh and Shan Huang. 2004. Spatial Outlier Detection and Implementation in WEKA. Computer Science Department, University of Minnesota, 1--23.
[5]
Tien-Chin Wang and Hsien-Da Lee. 2006. Constructing a Fuzzy Decision Tree by Integrating Fuzzy Sets and Entropy. In Proceedings of the 5th WSEAS international conference on Applied computer science. 306--311.
[6]
R. Shanmugavadivu and Nagarajan. 2011. Network Intrusion Detection System Using Fuzzy Logic. Indian Journal of Computer Science and Engineering (IJCSE) Vol.2, No. 1, 101--111.
[7]
Chang-Tien Lu, Dechang Chen, and Yufeng Kou. 2003. Algorithms for Spatial Outlier Detection. In Proceedings of the Third IEEE International Conference on Data Mining (ICDM'03).
[8]
Anrong Xue, Lin Yao, Shiguang Ju, Weihe Chen, and Handa Ma. 2008. Algorithm for Fast Spatial Outlier Detection. In the Proceedings of the 9th International Conference for Young Scientists, 1872--1877.
[9]
Pamula. R, Deka. J. K., and Nandi. S. 2011. An Outlier Detection Method Based on Clustering. In Proceedings of the Emerging Applications of Information Technology. (EAIT), 253--256.
[10]
Fu Xiao and Xie Li. 2008. Using Outlier Detection to Reduce False Positives in Intrusion Detection. Network and Parallel Computing. In Proceedings of the IFIP International Conference. 26--33.
[11]
S. Shekhar, C.-T. Lu, and P. Zhang. 2003. A Unified Approach to Spatial Outliers Detection. GeoInformatica, An International Journal on Advances of Computer Science for Geographic Information System, Vol. 7, No. 2, 139--166.
[12]
L.A. Zadeh. 1965. Fuzzy Sets. Information and control. Vol. 8, 338--353.
[13]
Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu and Ali A. Ghorbani. 2009. A detailed analysis of the KDD CUP 99 data set. In Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications. 53--58.
[14]
Hu Q, Yu D, Xie Z. 2006. Information-preserving hybrid data reduction based on fuzzy-rough techniques. Pattern Recognition Letter. Vol. 27, No. 5, 414--423.
[15]
Quinlan JR. 1986. Induction of decision trees. Machine Learning. 81--106.
[16]
Umano M, Okamolo H, Hatono I, Tamura H. 1994. Fuzzy decision trees by fuzzy ID3 algorithm and its application to Diagnosis System. In Proceedings of the third IEEE International Conference on Fuzzy Systems. Vol. 3, 2113--2118.
[17]
Yuan Y, Shaw MJ. 1995. Induction of fuzzy decision trees. Journal of Fuzzy Sets Systems. Vol. 69, No. 2, 125--139.
[18]
Pawlak Z. 1982. Rough Sets. International Journal of Information and Computer Science. Vol. 11, 341--356.
[19]
Dubois D, Prade H, "Rough fuzzy sets and fuzzy rough sets. International. Journal of Genetic Systems. Vol. 17, 191--208, 1990.
[20]
Chen DG, Zhang WX, Yeung DS, Tsang ECC. 2006. Rough approximations on a completely distributive lattice with applications to generalized rough sets. Journal of informations sSciences. Vol. 176, No. 13, 1829--1848.
[21]
Tsang ECC, Chen DG, Yeung DS, Wang XZ, Lee JWT. 2008. Attributes reduction using fuzzy rough sets. IEEE Transactions on fuzzy Systems. Vol. 16, No. 5, 1130--1141.
[22]
Jensen R, Shen Q. 2004. Fuzzy-rough attributes reduction with application to web categorization. Journal of Fuzzy Sets Systems. Vol. 141, No. 3, 469--485.
[23]
Venkata Naga Sudheer T, Rama Mohan Reddy. 2011. Decision Tree Construction Based on Degree of Rough sets. International Journal of Engineering Research and Applications (IJERA), Vol. 1, Issue 3, 677--682.
[24]
N. Jaisankar, S. Ganapathy, P. Yogesh, A. Kannan, K. Anand, "An Intelligent Agent Based Intrusion Detection System Using Fuzzy Rough Set Based Outlier Detection", Springer-Soft Computing Techniques in Vision Science, Studies in Computational Intelligence, Vol.395, pp. 147--153, 2012.
[25]
Kuncheva LI. 1992. Fuzzy rough sets: application to feature selection. Fuzzy Sets Systems. Vol. 51, 147--153.
[26]
P. Yogesh, Associate Professor, College of Engineering, Anna University, Chennai. [email protected], 9444366580
[27]
S. Tharunya, Research Scholar, RMK Engineering College, Anna University, Chennai.
[28]
K.L. Shunmuganathan, Professor, RMK Engineering College, Anna University, Chennai. [email protected], 9443125834

Cited By

View all
  • (2022)An Integrated IDS Using ICA-Based Feature Selection and SVM Classification MethodIllumination of Artificial Intelligence in Cybersecurity and Forensics10.1007/978-3-030-93453-8_11(255-271)Online publication date: 1-Jan-2022
  • (2021)An adapting soft computing model for intrusion detection systemComputational Intelligence10.1111/coin.1243338:3(855-875)Online publication date: 26-Jan-2021
  • (2018)Detection of phishing websites using a novel twofold ensemble modelJournal of Systems and Information Technology10.1108/JSIT-09-2017-0074Online publication date: 18-Oct-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICACCI '12: Proceedings of the International Conference on Advances in Computing, Communications and Informatics
August 2012
1307 pages
ISBN:9781450311960
DOI:10.1145/2345396
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • ISCA: International Society for Computers and Their Applications
  • RPS: Research Publishing Services

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 August 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. fuzzy rough sets
  2. intelligent agent
  3. intrusion detection system
  4. spatial outlier detection

Qualifiers

  • Research-article

Conference

ICACCI '12
Sponsor:
  • ISCA
  • RPS

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2022)An Integrated IDS Using ICA-Based Feature Selection and SVM Classification MethodIllumination of Artificial Intelligence in Cybersecurity and Forensics10.1007/978-3-030-93453-8_11(255-271)Online publication date: 1-Jan-2022
  • (2021)An adapting soft computing model for intrusion detection systemComputational Intelligence10.1111/coin.1243338:3(855-875)Online publication date: 26-Jan-2021
  • (2018)Detection of phishing websites using a novel twofold ensemble modelJournal of Systems and Information Technology10.1108/JSIT-09-2017-0074Online publication date: 18-Oct-2018
  • (2018)A novel machine learning framework for diagnosing the type 2 diabetics using temporal fuzzy ant miner decision tree classifier with temporal weighted genetic algorithmComputing10.1007/s00607-018-0599-4100:8(759-772)Online publication date: 1-Aug-2018

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media