scispace - formally typeset
Proceedings ArticleDOI

Network intrusion detection using multi-attributed frame decision tree

TLDR
A new decision tree algorithm that uses multiple attributes to construct a core vector generated from two farthest records and recursively partition the dataset along this core vector using the vector projection.
Abstract
Network intrusion problem has been received more attention during the past few years due to the increase company network usages. Many network intrusion systems have been proposed and in cooperated various classifiers to identify malicious packages among all regular network packages using the past history. Decision tree algorithm is one of the popular adapted classifier. It utilizes the training records to build a decision tree model which select the best split of a single attribute among all candidate attributes that best classifies training records. To facilitate a combination of attributes, the decision tree must apply a finite number of branches which may generate a tall tree. Attributes may relate in a more complex setting that they need to be simultaneously used for branching. This paper proposes a new decision tree algorithm that uses multiple attributes to construct a core vector generated from two farthest records. Then the algorithm recursively partition the dataset along this core vector using the vector projection. The best split is identified along this core vector based on the information gain. Our results show the improvement of the network intrusion problem from UCI over the regular decision tree algorithm.

read more

Citations
More filters
Dissertation

Distributed Denial of Service (DDoS) attack detection and mitigation

Alan Saied
TL;DR: The water quality of the Mediterranean Sea has changed in recent years from being generally good to excellent, with the exception of the waters off the coast of Italy and the Black Sea, which have seen declining water quality in recent decades.
Proceedings ArticleDOI

Breast cancer diagnosis using multi-attributed lens recursive partitioning algorithm

TL;DR: A new technique, multi-attributed lens, which weighs all numeric attributes simultaneously simultaneously is proposed, which shows that relative performances of this algorithm are better than C4.5 algorithm based on this dataset.
Proceedings ArticleDOI

Farthest boundary clustering algorithm: Half-orbital extreme pole

TL;DR: This paper proposes a novel boundary approach to perform a clustering analysis and compares the algorithm with the K-means clustering algorithm using the value of K to demonstrate the effectiveness of the method.
Proceedings ArticleDOI

Weighted minimum consecutive pair of the extreme pole outlier factor

TL;DR: A new parameter-free algorithm called a weighted minimum consecutive pair of the extreme pole outlier factor (WOF) is proposed, which generates the new outlier score of an instance along the extreme poles by considering the projection of this instance and its consecutive pair.
References
More filters
Book

C4.5: Programs for Machine Learning

TL;DR: A complete guide to the C4.5 system as implemented in C for the UNIX environment, which starts from simple core learning methods and shows how they can be elaborated and extended to deal with typical problems such as missing data and over hitting.
Book ChapterDOI

Learning Efficient Classification Procedures and Their Application to Chess End Games

TL;DR: A series of experiments dealing with the discovery of efficient classification procedures from large numbers of examples is described, with a case study from the chess end game king-rook versus king-knight.
Journal ArticleDOI

Network intrusion detection

TL;DR: In this paper, a survey of host-based and network-based intrusion detection systems is presented, and the characteristics of the corresponding systems are identified, and an outline of a statistical anomaly detection algorithm employed in a typical IDS is also included.
Journal ArticleDOI

Review: Intrusion detection by machine learning: A review

TL;DR: This chapter reviews 55 related studies in the period between 2000 and 2007 focusing on developing single, hybrid, and ensemble classifiers and discusses current achievements and limitations in developing intrusion detection systems by machine learning.
Journal ArticleDOI

An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks

TL;DR: The principle interest of this work is to benchmark the performance of the proposed hybrid IDS architecture by using KDD Cup 99 Data Set, the benchmark dataset used by IDS researchers.
Related Papers (5)