Improved C-Fuzzy Decision Tree for Intrusion Detection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
Improved C-Fuzzy Decision Tree for Intrusion Detection

Authors: Krishnamoorthi Makkithaya, N. V. Subba Reddy, U. Dinesh Acharya

Abstract:

As the number of networked computers grows, intrusion detection is an essential component in keeping networks secure. Various approaches for intrusion detection are currently being in use with each one has its own merits and demerits. This paper presents our work to test and improve the performance of a new class of decision tree c-fuzzy decision tree to detect intrusion. The work also includes identifying best candidate feature sub set to build the efficient c-fuzzy decision tree based Intrusion Detection System (IDS). We investigated the usefulness of c-fuzzy decision tree for developing IDS with a data partition based on horizontal fragmentation. Empirical results indicate the usefulness of our approach in developing the efficient IDS.

Keywords: Data mining, Decision tree, Feature selection, Fuzzyc- means clustering, Intrusion detection.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1084490

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1531

References:


[1] Dana Elena Ilea, Paul F. Whelan, Ovidiu Ghita Vision Systems Group, School of Electronic Engineering "Characterization of Clustering Algorithms for Colour Image Segmentation", www.vsg.dcu.ie/papers/optim_2006_dana.pdf
[2] Dian-Rong Yang, Leu-Shing Lan* , and Shih-Hung Liao Department of Electronics Engineering National Yunlin University of Science and Technology, "A New Fuzzy Clustering Method with Controllable Membership Characteristics", 2006 IEEE International Conference on Fuzzy Systems , Vancouver, BC, Canada July 16-21, 2006.
[3] I.H. Witten and E.Frank. Data Mining- Practical Machine Learning Tools and Techniques with Java Implementation. Morgan Kaufman San Francisco 2000.
[4] Hsin-Wei Chiu, Chen-Sen Ouyang and Shie-Jue Leee Member IEEE, Abdul Manon Ahmed, "Improved C-Fuzzy decision Trees", 2006 IEEE International Conference on Fuzzy Systems , Vancouver, BC, Canada July 16-21, 2006.
[5] Jonatan Gomez and Dipankar Dasgupta, "Evolving Fuzzy classifiers for intrusion detection.", Proceedings of the 2002 IEEE workshop on Information Assurance, NY June 2001.
[6] KDD-Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
[7] Krishnamoorthi, N.V. Subba Reddy, U.Dinesh Acharya, CSE Department MIT Manipal A Two Stage Hybrid Model for Intrusion Detection. 14th International Conference on Advanced Computing and Communication ADCOM 2006. NITK Surathkal
[8] Norbik Bashah, Shanmugam Bnaranidharan, Abdul Manon Ahmed, "Hybrid Intelligent Intrusion detection system", Trasactions on Engineering, Computing and Technology V6 June 2005.
[9] Ramesh Agarwal, Mahesh V. Joshi, " Pnrule: A new framework for learning classifier models in data mining, A case study in network intrusion detection",. Technical report RC 21719, IBM research report, Computer Science/ Mathematics, April 2000.
[10] Witold Pedrycz, Fellow, IEEE, and Zenon A. Sosnowski, Member, IEEE, "C-Fuzzy Decision Trees", IEEE Transactions on Systems, Man, and Cybernetics ÔÇöPart C: Applications and Reviews, VOL. 35, NO. 4, November 2005.
[11] Wenke Lee and Salvatore J. Stolfo, Philip K. Chan. Real Time Data Mining- based Intrusion Detection. http://www.ncsu.edu/faculty/lee/project/id.html/
[12] Wenke Lee and Salvatore J. Stolfo, Combining Knowledge Discovery and Knowledge Engineering to build IDSs. http://www.ncsu.edu/faculty/lee/project/id.html
[13] J. C. Bezdek, Pattern Recognition with Fuzzy Objective Functions, New York: Plenum, 1981.
[14] Huan Liu, Lei Yu , " Toward Integrating Feature selection Algorithms for Classification and Clustering", IEEE Transaction on Knowledge and data Engineering VOl 17 , No 4, April 2005.