CFP last date
20 May 2024
Reseach Article

Gain Ratio and Decision Tree Classifier for Intrusion Detection

by Mabayoje Modinat A., Akintola Abimbola G., Balogun Abdullateef O., Ayilara Opeyemi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 126 - Number 1
Year of Publication: 2015
Authors: Mabayoje Modinat A., Akintola Abimbola G., Balogun Abdullateef O., Ayilara Opeyemi
10.5120/ijca2015905983

Mabayoje Modinat A., Akintola Abimbola G., Balogun Abdullateef O., Ayilara Opeyemi . Gain Ratio and Decision Tree Classifier for Intrusion Detection. International Journal of Computer Applications. 126, 1 ( September 2015), 56-59. DOI=10.5120/ijca2015905983

@article{ 10.5120/ijca2015905983,
author = { Mabayoje Modinat A., Akintola Abimbola G., Balogun Abdullateef O., Ayilara Opeyemi },
title = { Gain Ratio and Decision Tree Classifier for Intrusion Detection },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 126 },
number = { 1 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 56-59 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume126/number1/22520-2015905983/ },
doi = { 10.5120/ijca2015905983 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:16:21.298348+05:30
%A Mabayoje Modinat A.
%A Akintola Abimbola G.
%A Balogun Abdullateef O.
%A Ayilara Opeyemi
%T Gain Ratio and Decision Tree Classifier for Intrusion Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 126
%N 1
%P 56-59
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the evident need for accuracy in the performance of intrusion detection system, it is expedient that in addition to the algorithms used, more activities should be carried out to improve accuracy and reduce real time used in detection. This paper reviews how data mining relates to IDS, feature selection and classification. This paper proposes architecture of IDS where GainRatio is used for feature selection and decision tree for classification using NSL-KDD99 dataset, It also includes the evaluation of the performance of the Decision tree on the dataset and also on the reduced dataset.

References
  1. Ajayi, A, Idowu, S.A., Anyaehie A., (2013).Comparative study of selected data mining algorithms used for intrusion detection. International Journal of Soft computing Engineering (IJSCE).
  2. Eitel J.M. Lauria and Giri K. Tayi, (2008) “A Comparative Study Of Data Mining Algorithms For Network Intrusion Detection In The Presence Of Poor Quality Data”. ICIQ-03, 2008.
  3. G.V.Nadiammai, S.Krishaveni, M.Hemalatha (2011). “A comprehensive Analysis and study in intrusion detection system using data mining Techniques”. IJCA, Volume 35 –No.8, December 2011.
  4. Heba Ezzat Ibrahim, Sherif M. Badr, and Mohamed A. Shaheen, (2012) “Adaptive Layered Approach using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems”. IJCA, Volume 56 – No.7, October 2012
  5. J. Han and M. Kamber, “Data Mining Concepts and Techniques”, Morgan Kaufmann, 2001.
  6. Megha Aggarwal, Amrita ,” Performance Analysis Of Different Feature Selection Methods In Intrusion Detection ”,International Journal Of Scientific & Technology research volume 2, issue 6, June 2013 ISSN 2277-8616 225 IJSTR©2013 www.ijstr.org
  7. Mitchell D’silva, Deepali Vora (2013) “Comparative Study of Data Mining Techniques to Enhance Intrusion Detection”. IJERA, Vol. 3, Issue 1, January – February 2013.
  8. Mohammed J. Zaki, Wagner Meira JR.,”Data mining and analysis : Fundamental Concepts and Algorithms”
  9. Neha Maharaj and Pooja Khanna (2014), “A Comparative Analysis of Different Classification Techniques for Intrusion Detection System”, IJCA, Vol. 95 –No.17, June 2014.
  10. Patel Hemant, Bharat Sarkhedi, and Hiren Vaghamshi (2013) “Intrusion Detection in Data Mining with Classification Algorithm”. IJAREEIE, Vol. 2, Issue7, July 2013.
  11. Reema Patel, Amit Thakkar, Amit Ganatra (2012) “ A Survey and Comparative Analysis of Data Mining Techniques for Network Intrusion Detection Systems”.IJSCE, Volume-2, Issue-1, March 2012.
  12. Sang-Hyun C. and Hee-Su C. (2014). Feature Selection using Attribute Ratio in NSL-KDD data. International Conference Data Mining, Civil and Mechanical Engineering (ICDMCME’2014), Feb 4-5, 2014 Bali (Indonesia).
  13. Trilok Chand Sharma and Manoj Jain (2013), “WEKA Approach for Comparative Study of Classification Algorithm”, IJARCCE, Vol. 2, Issue 4, April 2013.
  14. V. Jaiganesh, Dr. P. Sumathi, and A.Vinitha “Classification Algorithms in Intrusion Detection System: A Survey” IJCTA, Vol 4(5), September – October, 2013.
  15. V. Jaiganesh, S. Mangayarkarasi, and Dr. P. Sumathi (2013). “Intrusion Detection Systems: A Survey and Analysis of Classification Techniques”. IJARCCE, Vol. 2, Issue 4, April 2013.
  16. Yogendra Kumar Jain and Upendra (2012), “An efficient Intrusion Detection Based on Decision Tree Classifier Using Feature Reduction”. IJSRP, Vol. 2, Issue 1, January 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Decision tree IDS Data Mining Feature selection data mining and algorithms.