CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Adaptive Layered Approach using C5.0 Decision Tree for Intrusion Detection Systems (ALIDS)

by Sherif M. Badr
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 66 - Number 22
Year of Publication: 2013
Authors: Sherif M. Badr
10.5120/11247-5956

Sherif M. Badr . Adaptive Layered Approach using C5.0 Decision Tree for Intrusion Detection Systems (ALIDS). International Journal of Computer Applications. 66, 22 ( March 2013), 18-22. DOI=10.5120/11247-5956

@article{ 10.5120/11247-5956,
author = { Sherif M. Badr },
title = { Adaptive Layered Approach using C5.0 Decision Tree for Intrusion Detection Systems (ALIDS) },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 66 },
number = { 22 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 18-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume66/number22/11247-5956/ },
doi = { 10.5120/11247-5956 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:23:06.559471+05:30
%A Sherif M. Badr
%T Adaptive Layered Approach using C5.0 Decision Tree for Intrusion Detection Systems (ALIDS)
%J International Journal of Computer Applications
%@ 0975-8887
%V 66
%N 22
%P 18-22
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Intrusion Detection System (IDS) is one of a crucial issue and a major research problem in network security. This work, An Adaptive multi-Layer Intrusion Detection System (ALIDS) is designed and developed to achieve high efficiency, scalability, flexibility and improve the detection and classification rate accuracy. We apply C5 decision tree on our model. Our experimental results showed that the proposed ALIDS model with different order of training classes enhances the accuracy of U2R and R2L.

References
  1. Naelah okasha, Abd El Fatah Hegazy, Sherif M. Badr, 2010. "Towards Ontology-Based Adaptive Multilevel Model for Intrusion Detection and Prevention System (AMIDPS)", Egyptian science journal (ESC), Vol. 34, No. 5, September 2010.
  2. R. Bace and P. Mell, Intrusion Detection Systems, Computer Security Division, Information Technology Laboratory, Nat'l Inst. of Standards and Technology, 2001.
  3. Kapil Kumar Gupta, BaikunthNath, and RamamohanaraoKotagiri "Layered Approach Using Conditional Random Fields for Intrusion Detection" IEEE Transactions on dependable and secure Computing, vol. 5, no. 4, october-december 2008.
  4. Asmaa Shaker Ashoor, Prof. Sharad Gore,"Importance of Intrusion Detection System (IDS)", International Journal of Scientific & Engineering Research (IJSER), Volume 2, Issue 1, January-2011.
  5. M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, "A Detailed Analysis of the KDD CUP 99 Data Set," Submitted to Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), 2009.
  6. N. B. Amor, S. Benferhat, and Z. Elouedi, "Naive Bayes vs. Decision Trees in Intrusion Detection Systems," Proc. ACM Symp. Applied Computing (SAC '04), pp. 420-424, and 2004.
  7. T. M. Mitchell. Machine Learning. McGraw Hill, 1997.
  8. Quinlan JR. "C4. 5: programs for machine learning," Log Altos, CA: Morgan Kaufmann; 1993. SPSS. Clementine 12. 0 modeling nodes. Chicago: SPSS; 2007.
  9. SPSS. Clementine 12. 0 modeling nodes. Chicago: SPSS; 2007.
  10. Heba Ezzat Ibrahim, Sherif M. Badr and Mohamed A. Shaheen," Adaptive Layered Approach using Machine Learning Techniques with Gain ratio for Intrusion Detection Systems," International Journal of Computer Applications(IJCA), pp. 10-16 ,Volume 56, No. 7, October 2012.
  11. KDD Cup 1999. Available on: http://kdd. ics. uci. edu/databases/kddcup 99/kddcup99. html, October 7002
  12. "NSL-KDD data set for network-based intrusion detection systems, "Available on: http://nsl. cs. unb. ca/NSL-KDD/, March 2009.
  13. Heba Ezzat Ibrahim, "Adaptive Layered Approach using Machine Learning Techniques for Intrusion Detection Systems", master thesis, Arab Academy for Science and Technology & Maritime Transport, Cairo, Jan 2013.
Index Terms

Computer Science
Information Sciences

Keywords

component network intrusion detection Decision Tree