کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
388266 | 660921 | 2012 | 13 صفحه PDF | دانلود رایگان |
![عکس صفحه اول مقاله: Decision tree based light weight intrusion detection using a wrapper approach Decision tree based light weight intrusion detection using a wrapper approach](/preview/png/388266.png)
The objective of this paper is to construct a lightweight Intrusion Detection System (IDS) aimed at detecting anomalies in networks. The crucial part of building lightweight IDS depends on preprocessing of network data, identifying important features and in the design of efficient learning algorithm that classify normal and anomalous patterns. Therefore in this work, the design of IDS is investigated from these three perspectives. The goals of this paper are (i) removing redundant instances that causes the learning algorithm to be unbiased (ii) identifying suitable subset of features by employing a wrapper based feature selection algorithm (iii) realizing proposed IDS with neurotree to achieve better detection accuracy. The lightweight IDS has been developed by using a wrapper based feature selection algorithm that maximizes the specificity and sensitivity of the IDS as well as by employing a neural ensemble decision tree iterative procedure to evolve optimal features. An extensive experimental evaluation of the proposed approach with a family of six decision tree classifiers namely Decision Stump, C4.5, Naive Baye’s Tree, Random Forest, Random Tree and Representative Tree model to perform the detection of anomalous network pattern has been introduced.
► A lightweight wrapper based IDS proposed achieves three goals.
► Firstly, 75% redundant instances are removed avoiding unbiased classification.
► Next, 16 features are identified based on feature count, sensitivity and specificity.
► Finally, neurotree designed uses FP and FN rate in the error function of neural.
► Proposed IDS classifies specific attack types with a classification rate of 98.4%.
Journal: Expert Systems with Applications - Volume 39, Issue 1, January 2012, Pages 129–141