Intrusion Detection System using Ensemble of Decision Trees and Genetic Search Algorithm as a Feature Selector

Intrusion Detection System using Ensemble of Decision Trees and Genetic Search Algorithm as a Feature Selector

In the middle of this wonderful Internet technology, the rise and growth of Internet misuse is shocking which compromises the security of the computers in network. In doing so, the use of the Internet becomes very destructive for one and all. Any unauthorized person can steal private information by hacking computer. Anonymous attack has many causes, such as viruses, malware, misuse of privileges on the computer and unauthorized access to information systems. To reduce the exposure to such types of threats, organizations need a reliable, robust and fast computer network security mechanism. Intrusion detection is a mechanism which detects and prevents different intruders in internet. There are many techniques of machine learning which can to apply intrusion detection systems. Current, many researcher are using ensemble methof to implement IDS. The selection of base classifeirs In ensemble method, the selection of suitable selection of base classifiers is a very key process. This paper propose a novel intrusion detection systems using ensemble of two well-known decision trees. C4.5 decision tree and Random Forest have selected as a base classifiers. Intrusion detection system is framed by combining the gains of both C4.5 and Random Forest decision trees. The working of the proposed ensemble for intrusion detection system has estimated in terms of classification accuracy, true positives and false positives. The experimental results show that the offered ensemble classifier for intrusion detection performs well in classification accuracy, true positive than individual decision trees on testing dataset. Other aspects of performance of classifiers are described in the paper.

___

  • E. Bauer and R. Kohavi, “An empirical comparison of voting classification algorithms: Bagging, boosting, and variants,” Ma- chine learning, vol. 36, no. 1-2, pp. 105–139, 1999.
  • T. G. Dietterich, “An experimental comparison of three methods for constructing ensembles of decision trees: Bagging, boosting, and randomization,” Machine learning, vol. 40, no. 2, pp. 139– 157, 2000.
  • H. Yao, D. Fu, P. Zhang, M. Li, and Y. Liu, “Msml: A novel multilevel semi-supervised machine learning framework for intrusion detection system,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1949–1959, 2018.
  • Y. Xiao, C. Xing, T. Zhang, and Z. Zhao, “An intrusion detection model based on feature reduction and convolutional neural networks,” IEEE Access, vol. 7, pp. 42 210–42 219, 2019.
  • W. Alhakami, A. ALharbi, S. Bourouis, R. Alroobaea, and N. Bouguila, “Network anomaly intrusion detection using a nonparametric bayesian approach and feature selection,” IEEE Access, vol. 7, pp. 52 181–52 190, 2019.
  • J. Jingping, C. Kehua, C. Jia, Z. Dengwen, and M. Wei, “Detection and recognition of atomic evasions against network intrusion detection/prevention systems,” IEEE Access, vol. 7, pp. 87 816–87 826, 2019.
  • P. Wei, Y. Li, Z. Zhang, T. Hu, Z. Li, and D. Liu, “An optimization method for intrusion detection classification model based on deep belief network,” IEEE Access, vol. 7, pp. 87 593– 87 605, 2019.
  • N. Sengupta, J. Sen, J. Sil, and M. Saha, “Designing of on line intrusion detection system using rough set theory and q-learning algorithm,” Neurocomputing, vol. 111, pp. 161–168, 2013.
  • G. Kim, S. Lee, and S. Kim, “A novel hybrid intrusion detection method integrating anomaly detection with misuse detection,” Expert Systems with Applications, vol. 41, no. 4, pp. 1690–1700, 2014.
  • W. Feng, Q. Zhang, G. Hu, and J. X. Huang, “Mining net- work data for intrusion detection through combining svms with ant colony networks,” Future Generation Computer Systems, vol. 37, pp. 127–140, 2014.
  • F. Kuang, W. Xu, and S. Zhang, “A novel hybrid kpca and svm with ga model for intrusion detection,” Applied Soft Computing, vol. 18, pp. 178–184, 2014.
  • H. E. Ibrahim, S. M. Badr, and M. A. Shaheen, “Adap- tive layered approach using machine learning techniques with gain ratio for intrusion detection systems,” arXiv preprint arXiv:1210.7650, 2012.
  • S. Zander, T. Nguyen, and G. Armitage, “Automated traffic clas- sification and application identification using machine learning,” in The IEEE Conference on Local Computer Networks 30th Anniversary (LCN’05) l.
  • G. Creech and J. Hu, “A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns,” IEEE Transactions on Computers, vol. 63, no. 4, pp. 807–819, 2013.
  • M. N. Mohammad, N. Sulaiman, and O. A. Muhsin, “A novel intrusion detection system by using intelligent data mining in weka environment,” Procedia Computer Science, vol. 3, pp. 1237–1242, 2011.
  • J. Hu, X. Yu, D. Qiu, and H.-H. Chen, “A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection,” IEEE network, vol. 23, no. 1, pp. 42–47, 2009.
  • M. Panda, A. Abraham, and M. R. Patra, “A hybrid intelligent approach for network intrusion detection,” Procedia Engineer- ing, vol. 30, pp. 1–9, 2012.
  • C.-J. Chung, P. Khatkar, T. Xing, J. Lee, and D. Huang, “Nice: Network intrusion detection and countermeasure selection in virtual network systems,” IEEE transactions on dependable and secure computing, vol. 10, no. 4, pp. 198–211, 2013.
  • L. I. Kuncheva, Combining pattern classifiers: methods and algorithms.
  • B. Lakshmi, T. Indumathi, and N. Ravi, “A study on c. 5 decision tree classification algorithm for risk predictions during pregnancy,” Procedia Technology, vol. 24, pp. 1542–1549, 2016.
  • R. Quinlan and R. Kohavi, “Decision tree discovery.” Data Mining, 1999.
  • U. Bashir and M. Chachoo, “Performance evaluation of j48 and bayes algorithms for intrusion detection system,” International Journal of Network Security & Its Applications (IJNSA), vol. 9, no. 4, 2017.
  • G. Biau, “Analysis of a random forests model,” Journal of Machine Learning Research, vol. 13, no. Apr, pp. 1063–1095, 2012.
  • L. Breiman, “Random forests,” Machine learning, vol. 45, no. 1, pp. 5–32, 2001.
  • L. Breiman, J. Friedman, C. J. Stone, and R. A. Olshen, Classification and regression trees.