Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Adaptive Layered Approach using C5. 0 Decision Tree for Intrusion Detection Systems (ALIDS)

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 66 - Number 22
Year of Publication: 2013
Authors:
Sherif M. Badr
10.5120/11247-5956

Sherif M Badr. Article: Adaptive Layered Approach using C5.0 Decision Tree for Intrusion Detection Systems (ALIDS). International Journal of Computer Applications 66(22):18-22, March 2013. Full text available. BibTeX

@article{key:article,
	author = {Sherif M. Badr},
	title = {Article: Adaptive Layered Approach using C5.0 Decision Tree for Intrusion Detection Systems (ALIDS)},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {66},
	number = {22},
	pages = {18-22},
	month = {March},
	note = {Full text available}
}

Abstract

Intrusion Detection System (IDS) is one of a crucial issue and a major research problem in network security. This work, An Adaptive multi-Layer Intrusion Detection System (ALIDS) is designed and developed to achieve high efficiency, scalability, flexibility and improve the detection and classification rate accuracy. We apply C5 decision tree on our model. Our experimental results showed that the proposed ALIDS model with different order of training classes enhances the accuracy of U2R and R2L.

References

  • Naelah okasha, Abd El Fatah Hegazy, Sherif M. Badr, 2010. "Towards Ontology-Based Adaptive Multilevel Model for Intrusion Detection and Prevention System (AMIDPS)", Egyptian science journal (ESC), Vol. 34, No. 5, September 2010.
  • R. Bace and P. Mell, Intrusion Detection Systems, Computer Security Division, Information Technology Laboratory, Nat'l Inst. of Standards and Technology, 2001.
  • Kapil Kumar Gupta, BaikunthNath, and RamamohanaraoKotagiri "Layered Approach Using Conditional Random Fields for Intrusion Detection" IEEE Transactions on dependable and secure Computing, vol. 5, no. 4, october-december 2008.
  • Asmaa Shaker Ashoor, Prof. Sharad Gore,"Importance of Intrusion Detection System (IDS)", International Journal of Scientific & Engineering Research (IJSER), Volume 2, Issue 1, January-2011.
  • M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, "A Detailed Analysis of the KDD CUP 99 Data Set," Submitted to Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), 2009.
  • N. B. Amor, S. Benferhat, and Z. Elouedi, "Naive Bayes vs. Decision Trees in Intrusion Detection Systems," Proc. ACM Symp. Applied Computing (SAC '04), pp. 420-424, and 2004.
  • T. M. Mitchell. Machine Learning. McGraw Hill, 1997.
  • Quinlan JR. "C4. 5: programs for machine learning," Log Altos, CA: Morgan Kaufmann; 1993. SPSS. Clementine 12. 0 modeling nodes. Chicago: SPSS; 2007.
  • SPSS. Clementine 12. 0 modeling nodes. Chicago: SPSS; 2007.
  • Heba Ezzat Ibrahim, Sherif M. Badr and Mohamed A. Shaheen," Adaptive Layered Approach using Machine Learning Techniques with Gain ratio for Intrusion Detection Systems," International Journal of Computer Applications(IJCA), pp. 10-16 ,Volume 56, No. 7, October 2012.
  • KDD Cup 1999. Available on: http://kdd. ics. uci. edu/databases/kddcup 99/kddcup99. html, October 7002
  • "NSL-KDD data set for network-based intrusion detection systems, "Available on: http://nsl. cs. unb. ca/NSL-KDD/, March 2009.
  • Heba Ezzat Ibrahim, "Adaptive Layered Approach using Machine Learning Techniques for Intrusion Detection Systems", master thesis, Arab Academy for Science and Technology & Maritime Transport, Cairo, Jan 2013.