Journal of Computer and Communications

Volume 3, Issue 4 (April 2015)

ISSN Print: 2327-5219   ISSN Online: 2327-5227

Google-based Impact Factor: 1.12  Citations  

A Decision Tree Classifier for Intrusion Detection Priority Tagging

HTML  XML Download Download as PDF (Size: 254KB)  PP. 52-58  
DOI: 10.4236/jcc.2015.34006    5,597 Downloads   7,668 Views  Citations
Author(s)

ABSTRACT

Snort rule-checking is one of the most popular forms of Network Intrusion Detection Systems (NIDS). In this article, we show that Snort priorities of true positive traffic (real attacks) can be approximated in real-time, in the context of high speed networks, by a decision tree classifier, using the information of only three easily extracted features (protocol, source port, and destination port), with an accuracy of 99%. Snort issues alert priorities based on its own default set of attack classes (34 classes) that are used by the default set of rules it provides. But the decision tree model is able to predict the priorities without using this default classification. The obtained tagger can provide a useful complement to an anomaly detection intrusion detection system.

Share and Cite:

Ammar, A. (2015) A Decision Tree Classifier for Intrusion Detection Priority Tagging. Journal of Computer and Communications, 3, 52-58. doi: 10.4236/jcc.2015.34006.

Cited by

[1] Establishing the contaminating effect of metadata feature inclusion in machine-learned network intrusion detection models
… on Detection of …, 2022
[2] Intrusion detection in cyber–physical environment using hybrid Naïve Bayes—Decision table and multi-objective evolutionary feature selection
Computer …, 2022
[3] Machine Learning Models to Classify Normal and Fibrotic Mouse Liver Model using Dielectric Properties
… on Bioinformatics and …, 2022
[4] Importance of Machine Learning Techniques to Improve the Open Source Intrusion Detection Systems
Indonesian Journal of …, 2021
[5] Intrusion Alert Reduction Based on Unsupervised and Supervised Learning Algorithms
B, MMD Siraj - International Journal of Innovative …, 2021
[6] A comparative study of the performance of machine learning algorithms to detect malicious traffic in IoT networks
Journal of Digital Convergence, 2021
[7] A consolidated decision tree-based intrusion detection system for binary and multiclass imbalanced datasets
2021
[8] AI Approaches for IoT Security Analysis
2021
[9] Agrupamento e Classificação de Consumidores de Energia Rural Utilizando Random Forest e K-Nearest Neighbors
2020
[10] Cyber Threat Intelligence Using Deep Learning to Detect Abnormal Network Behavior
2020
[11] Agrupamento e Classificaçao de Consumidores de Energia Rural Utilizando Random Forest e K-Nearest Neighbors
… de Automática-CBA, 2020
[12] Bi-directional Recurrent Neural network for Intrusion Detection System (IDS) in the internet of things (IoT)
2020
[13] Detecting Stealth-based Attacks in Large Campus Networks
2020
[14] Designing an effective network forensic framework for the investigation of botnets in the Internet of Things
2020
[15] Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity
2020
[16] Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey
2019
[17] A Case Study on Using Deep Learning for Network Intrusion Detection
2019
[18] Hybrid approach to provide situational awareness for information security in computational environments
2018
[19] Intrusion Detection Techniques: A Review
2018
[20] A Hybrid Architecture to Enrich Context Awareness through Data Correlation
2018
[21] Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space
Cognitive Computation, 2018
[22] Machine Learning and Deep Learning Methods for Cybersecurity
2018
[23] Mining Anomalies in Large ISCX Dataset Using Machine Learning Algorithms in KNIME
Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018
[24] A HYBRID INTRUSION DETECTION TECHNIQUE BASED ON IRF & AODE FOR KDD-CUP 99 DATASET
International Research Journal of Engineering and Technology, 2018
[25] Network Intrusion Detection Using Flow Statistics
2018
[26] Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset
2018
[27] Anomaly-Based Intrusion Detection by Modeling Probability Distributions of Flow Characteristics
2017
[28] 2: uma abordagem consciente de situação para segurança em infraestruturas computacionais
Revista Brasileira de Computação Aplicada, 2016
[29] HYBRID INTRUSION DETECTION SYSTEM FOR PRIVATE CLOUD: AN INTEGRATED APPROACH
2016
[30] Σύγχρονα εργαλεία, τεχνικές και μεθοδολογίες για τον χαρακτηρισμό κυβερνοεπιθέσεων και κακόβουλου λογισμικού
2016

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.