CFP last date
20 May 2024
Reseach Article

Effective Framework of J48 Algorithm using Semi-Supervised Approach for Intrusion Detection

by Sharmila Wagh, Anagha Khati, Auzita Irani, Naba Inamdar, Rashmi Soni
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 94 - Number 12
Year of Publication: 2014
Authors: Sharmila Wagh, Anagha Khati, Auzita Irani, Naba Inamdar, Rashmi Soni
10.5120/16396-6015

Sharmila Wagh, Anagha Khati, Auzita Irani, Naba Inamdar, Rashmi Soni . Effective Framework of J48 Algorithm using Semi-Supervised Approach for Intrusion Detection. International Journal of Computer Applications. 94, 12 ( May 2014), 23-27. DOI=10.5120/16396-6015

@article{ 10.5120/16396-6015,
author = { Sharmila Wagh, Anagha Khati, Auzita Irani, Naba Inamdar, Rashmi Soni },
title = { Effective Framework of J48 Algorithm using Semi-Supervised Approach for Intrusion Detection },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 94 },
number = { 12 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume94/number12/16396-6015/ },
doi = { 10.5120/16396-6015 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:17:28.580389+05:30
%A Sharmila Wagh
%A Anagha Khati
%A Auzita Irani
%A Naba Inamdar
%A Rashmi Soni
%T Effective Framework of J48 Algorithm using Semi-Supervised Approach for Intrusion Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 94
%N 12
%P 23-27
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Network security is a very important aspect for internet enabled systems. As the internet keeps developing the number of security attacks as well as their severity has shown a significant increase. The Intrusion Detection System (IDS) plays a very important role in discovering anomalies and attacks in the network. The aim of an intrusion detection system is to identify those entities that attempt to destabilize security controls that have been put in place. The field of machine learning is rapidly gaining more attention in the development of these intrusion detection systems. Machine learning techniques can be broadly classified into three broad categories: Supervised, Un-supervised and semi-supervised. The supervised learning method displays good classification accuracy for those attacks that are aready known to us. But this method requires a large amount of training data. The availability of labelled data is not only time consuming but also very expensive. The evolving field of semi-supervised learning offers a promising direction for supplementary research. Hence, in this paper we propose a semi-supervised approach for a pattern based IDS to improve performance and to reduce the false alarm rate. The experimentation is performed on KDD CUP99 dataset and we use the J48 Algorithm in order to implement the semi-supervised learning.

References
  1. Sharmila Kishor Wagh, Vinod K Pachghare and Satish R Kolhe. "Survey on Intrusion Detection System using Machine Learning Techniques. " International Journal of Computer Applications 78(16): 30-37, September 2013. Published by Foundation of Computer Science, New York, USA
  2. Sharmila Kishor Wagh, Gaurav Nilwarna, S. R. Kolhe, "A Comprehensive Analysis and Study in Intrusion Detection System Using KNN Algorithm", the 6th multidisciplinary workshop on Artificial Intelligence 2012 (MIWAI 2012), organized at Ho Chi Minh city, Vietnam.
  3. Abd Jalil, K, , Shah Alam, Kamarudin, M. H. , Masrek, M. N. , "Comparison of Machine Learning algorithms performance in detecting network intrusion ",Published in: Networking and Information Technology (ICNIT), 2010 International Conference, Date of Conference: 11-12 June 2010, Print ISBN: 978-1-4244-7579-7
  4. Sandip Sonawane, Shailendra Pardeshi, Ganesh Prasad, "A survey on intrusion detection techniques", World journal of science and technology, vol. 2, pp. 127-133, 21st April 2012.
  5. Dorothy E. Denning, "An Intrusion-Detection Model," IEEE transactions on software engineering, vol. SE-13, no. 2, pp. 222-232, Feb 1987
  6. G. V. Nadiammai, S. Krishnaveni, M. Hemalatha, "A Comprehensive Analysis and study in Intrusion Detection System using Data Mining Techniques", International Journal of Computer Applications, Volume 35 - Number 8, Year of Publication: 2011
  7. Phurivit Sangkatsanee, Naruemon Wattanapongsakorn, Chalermpol Charnsripinyo , "Practical real-time intrusion detection using machine learning approaches", Computer Communications 01/2011; 34:2227-2235. DOI: 10. 1016/j. comcom. 2011. 07. 001
  8. Charles Elkan, "Results of the KDD'99 Classifier Learning", SIGKDD Explorations 1(2): 63-64 (2000)
  9. S Stolfo et al, "The third international knowledge discovery and data mining tools competition" [online]. Available:http://kdd. ics. uci. eduidatabases/kddCup99/kddCup99. html, 2002 .
  10. Yuanqing Li *, Cuntai Guan, Huiqi Li, Zhengyang Chin, "A self-training semi-supervised SVM algorithm and its application in an EEG-based brain computer interface speller system", Pattern Recognition Letters 29 (2008) 1285–1294
Index Terms

Computer Science
Information Sciences

Keywords

Network security KDD CUP99 intrusion detection semi-supervised learning supervised learning J48 Algorithm.