A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models

被引:127
作者
Ahmim, Ahmed [1 ]
Maglaras, Leandros [2 ]
Ferrag, Mohamed Amine [3 ]
Derdour, Makhlouf [1 ]
Janicke, Helge [2 ]
机构
[1] Univ Larbi Tebessi, Dept Math & Comp Sci, Tebessa, Algeria
[2] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[3] Guelma Univ, Dept Comp Sci, BP 401, Guelma 24000, Algeria
来源
2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS) | 2019年
关键词
DETECTION FRAMEWORK;
D O I
10.1109/DCOSS.2019.00059
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a novel intrusion detection system (IDS) that combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip algorithm and Forest PA. Specifically, the first and second method take as inputs features of the data set, and classify the network traffic as Attack/Benign. The third classifier uses features of the initial data set in addition to the outputs of the first and the second classifier as inputs. The experimental results obtained by analyzing the proposed IDS using the CICIDS2017 dataset, attest their superiority in terms of accuracy, detection rate, false alarm rate and time overhead as compared to state of the art existing schemes.
引用
收藏
页码:228 / 233
页数:6
相关论文
共 25 条
[1]   Forest PA: Constructing a decision forest by penalizing attributes used in previous trees [J].
Adnan, Md Nasim ;
Islam, Md Zahidul .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 89 :389-403
[2]   An intrusion detection system based on combining probability predictions of a tree of classifiers [J].
Ahmim, Ahmed ;
Derdour, Makhlouf ;
Ferrag, Mohamed Amine .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (09)
[3]   Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system [J].
Al-Yaseen, Wathiq Laftah ;
Othman, Zulaiha Ali ;
Nazri, Mohd Zakree Ahmad .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 :296-303
[4]   Critical infrastructure protection: Requirements and challenges for the 21st century [J].
Alcaraz, Cristina ;
Zeadally, Sherali .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 8 :53-66
[5]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[6]  
[Anonymous], REDUCED ERROR PRUNIN
[7]  
[Anonymous], DATA MINING KNOWLEDG
[8]  
[Anonymous], NEURAL COMPUT APPL
[9]   A hybrid intrusion detection system design for computer network security [J].
Aydin, M. Ali ;
Zaim, A. Halim ;
Ceylan, K. Goekhan .
COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (03) :517-526
[10]  
Chang C. C., 2011, ACM T INTEL SYST TEC, V2, P1, DOI DOI 10.1145/1961189.1961199