International Journal of Communications, Network and System Sciences

Volume 1, Issue 4 (November 2008)

ISSN Print: 1913-3715   ISSN Online: 1913-3723

Google-based Impact Factor: 0.66  Citations  h5-index & Ranking

An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm

HTML  Download Download as PDF (Size: 580KB)  PP. 314-321  
DOI: 10.4236/ijcns.2008.14039    8,550 Downloads   14,691 Views  Citations

Affiliation(s)

.

ABSTRACT

Intrusion detection systems provide additional defense capacity to a networked information system in addition to the security measures provided by the firewalls. This paper proposes an active rule based enhancement to the C4.5 algorithm for network intrusion detection in order to detect misuse behaviors of internal attackers through effective classification and decision making in computer networks. This enhanced C4.5 algorithm derives a set of classification rules from network audit data and then the generated rules are used to detect network intrusions in a real-time environment. Unlike most existing decision tree based approaches, the spawned rules generated and fired in this work are more effective because the information-theoretic approach minimizes the expected number of tests needed to classify an object and guarantees that a simple (but not necessarily the simplest) tree is found. The main advantage of this proposed algorithm is that the generalization ability of enhanced C4.5 decision trees is better than that of C4.5 decision trees. We have employed data from the third international knowledge discovery and data mining tools competition (KDDcup’99) to train and test the feasibility of this proposed model. By applying the enhanced C4.5 algorithm an average detection rate of 93.28 percent and a false positive rate of 0.7 percent have respectively been obtained in this work.

Share and Cite:

L. RAJESWARI and K. ARPUTHARAJ, "An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm," International Journal of Communications, Network and System Sciences, Vol. 1 No. 4, 2008, pp. 314-321. doi: 10.4236/ijcns.2008.14039.

Cited by

[1] Hybrid Cloud Data Protection Using Machine Learning Approach
… Techniques in Data …, 2021
[2] Building an Effective Intrusion Detection System using combined Signature and Anomaly Detection Techniques
International Journal of Innovative Technology and Exploring Engineering, 2019
[3] Towards Efficient Intrusion Detection using Hybrid Data Mining Techniques
2019
[4] Sentiment analysis in data of twitter using machine learning algorithms
2019
[5] Decision Tree and Genetic Algorithm Based Intrusion Detection System
Proceeding of the Second International Conference on Microelectronics, Computing & Communication Systems (MCCS 2017), 2019
[6] Wise intrusion detection system using fuzzy rough set-based feature extraction and classification algorithms
2019
[7] Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs
2019
[8] Evolutionary Decision Tree-Based Intrusion Detection System
2019
[9] Intrusion Detection System using Fuzzy Rough Set Feature Selection and Modified KNN Classifier
2019
[10] Network anomaly detection based on logistic regression of nonlinear chaotic invariants
2019
[11] Building an Effective Intrusion Detection System using Genetic Algorithm based Feature Selection
2018
[12] Developing an intrusion finding model using a search based feature selection algorithm
International Journal of Innovative Research & Studies, 2018
[13] Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review
2018
[14] A machine learning application for reducing the security risks in hybrid cloud networks
Multimedia Tools and Applications, 2018
[15] Network Traffic Classification Using Multiclass Classifier
Advances in Computing and Data Sciences, 2018
[16] Construction of Recognition Methodology using Genetic Algorithm
2017
[17] IMPLEMENTING AN INTRUSION DETECTION METHOD USING A FILTER BASED FEATURE SELECTION ALGORITHM
International Journal for Innovative Engineering and Management Research, 2017
[18] A C4. 5 algorithm for english emotional classification
Evolving Systems, 2017
[19] PRODUCTIVITY INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
2017
[20] A short-term marginal price forecasting model based on ensemble learning
2017
[21] Anomaly based Malicious Traic Identification using Kernel Extreme Machine Learning (KELM) Classifier and Kernel Principal Component Analysis (KPCA)
2016
[22] Artifical immune system using Genetic Algorithm and decision tree
2016
[23] Never Ignore the Significance of Different Anomalies: A Cost-Sensitive Algorithm Based on Loss Function for Anomaly Detection
2015
[24] A Novel Cloud Intrusion Detection System Using Feature Selection and Classification
International Journal of Intelligent Information Technologies (IJIIT), 2015
[25] Genetic Algorithm to Solve the Problem of Small Disjunct In the Decision Tree Based Intrusion Detection System
International Journal of Computer Network and Information Security (IJCNIS), 2015
[26] Anomaly Detection Through Comparison of Heterogeneous Machine Learning Classifiers vs KPCA
Security in Computing and Communications, 2015
[27] INTELLIGENT NETWORK-MISUSE-DETECTION-SYSTEM USING NEUROTREE CLASSIFIER
Neural Network World, 2015
[28] RBDT: The Cascading of Machine Learning Classifiers for Anomaly Detection with Case Study of Two Datasets
Advances in Intelligent Informatics, 2015
[29] Application of Intelligent Systems in Network Security: Intrusion Detection Systems and Firewalls
M Culhane, 2014
[30] Intelligent access control and intrusion detection techniques For web database security
2014
[31] Data mining approach for hybrid intrusion detection system
2014
[32] Applying non-negative matrix factorization methods to discover user; s resource access patterns for computer security tasks
Hybrid Intelligent Systems (HIS), 2014 14th International Conference on, 2014
[33] Anomaly detection using machine learning with a case study
Advanced Communication Control and Computing Technologies (ICACCCT), 2014 International Conference on, 2014
[34] Enhancing the precision of phishing classification accuracy using reduced feature set and boosting algorithm
Advanced Computing (ICoAC), 2014 Sixth International Conference on, 2014
[35] Intrusion Detection-A Comparative Analysis using Classification Algorithms
Networking and Communication Engineering, 2013
[36] An Intelligent CRF Based Feature Selection for Effective Intrusion Detection
2013
[37] An intelligent intrusion detection system using genetic based feature selection and Modified J48 decision tree classifier
Advanced Computing (ICoAC), 2013 Fifth International Conference on, 2013
[38] Experiments on detection of Denial of Service attacks using REPTree
Green Computing, Communication and Conservation of Energy (ICGCE), 2013 International Conference on. IEEE, 2013., 2013
[39] Intelligent algorithms for effective network intrusion detection
2013
[40] Implementation of Intelligent Multi-Layer Intrusion Detection Systems (IMLIDS)
International Journal of Computer Applications, 2013
[41] Decision tree based light weight intrusion detection using a wrapper approach
Expert Systems with applications, 2012
[42] Evolving optimised decision rules for intrusion detection using particle swarm paradigm
International Journal of Systems Science, 2012
[43] Adaptive Layered Approach using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems
arXiv preprint arXiv:1210.7650, 2012
[44] Identifying Intrusion Patterns using a Decision Tree.
International Journal of Computer Applications?, 2012
[45] Identifying Intrusion Patterns using a Decision Tree
International Journal of Computer Applications, 2012
[46] Analisis Dan Implementasi Random Forest dan Classification dan Regression Tree (CART) untuk Klasifikasi pada Misuse Intrusion Detection System
2011
[47] Designing a Hybrid Classifier for Network Intrusion Detection System
Thesis, 2011
[48] Hybrid Multi-level Intrusion Detection System
International J. Computer Science and Information Security?, 2011
[49] Implementation of Intelligent Techniques for Intrusion Detection Systems
2011
[50] INTRUSION DETECTION SYSTEM USING CONDITIONAL RANDOM FIELD ALGORITHM
BV RAMUDU, M INAYATHULLA, MP RAO

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.