Abstract
In the recent time a huge number of public and commercial service is used through internet so that the vulnerabilities of current security systems have become the most important issue in the society and threats from hackers have also increased. Many researchers feel intrusion detection systems can be a fundamental line of defense. Intrusion Detection System (IDS) is used against network attacks for protecting computer networks. On another hand, data mining techniques can also contribute to intrusion detection. The intrusion detection has two fundamental classes, Anomaly based and Misuse based. One of the biggest problem with the anomaly base intrusion detection is detecting a high numbers of false alarms. In this paper a solution is provided to increase the attack recognition rate and a minimal false alarm generation is achieved with the study of different Tree-based data mining techniques. KDD cup dataset is used for research purpose by using WEKA tool.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
https://www.sans.org/reading-room/whitepapers/detection/history-evolution-intrusion-detection344
Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. SE-13(2), 222–232 (1987)
Denning, D.E., Neumann, P.E.: Requirements and model for IDES-A real-time intrusion detection system. Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA, USA (1985)
Hodge, V.J., Austin, J.: A survey of outlier detection methodologies. J. Artif. Intell. Rev. 22, 85–126 (2004)
Markou, M., Singh, S.: Novelty detection: a review-part 1: statistical approaches
Patcha, A., Park, J.: An overview of anomaly detection techniques. Existing solutions and latest technological trends
Bakar, Z., Mohemad, R., Ahmad, A., Deris, M.: A comparative study for outlier detection techniques in data mining
Hawkins, D.: Identification of Outliers. Monographs on Applied Probability and Statistics. Springer, Heidelberg (1980). https://doi.org/10.1007/978-94-015-3994-4
Barnett, V., Lewis, T.: Outliers in Statistical Data. Wiley, Hoboken (1994)
Javits, H., Valdes, A.: “The NIDES statistical component” Description and justification. Technical report, SRI International, Computer Science Laboratory (1993)
Mahoney, M.: Network traffic anomaly detection based on packet bytes. In: Proceedings of ACMSAC (2003)
Mahoney, M., Chan, P.K.: Learning non stationary models of normal network traffic for detecting novel attacks. In: Proceedings of SIGKDD (2002)
Zhang, W., Yang, Q., Geng, Y.: A survey of anomaly detection methods in networks. In: Proceedings of International Symposium on Computer Network and Multimedia Technology, pp. 1–3, January 2009
Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review (2010)
Dong, Y., Hsu, S., Rajput, S., Wu, B.: Experimental analysis of application level intrusion detection algorithms. Int. J. Secur. Netw. 5, 198–205 (2010)
Yassin, W., Udzir, N., Abdullah, A.: Signature-based anomaly intrusion detection using integrated data mining classifiers. In: International Symposium on Biometrics and Security Technologies (ISBAST) (2014)
Liu, H., Motoda, H., Setiono, R.: Feature selection: an ever evolving frontier in data mining (2010)
Harbola, A., Harbola, J.: Improved intrusion detection in DDOS applying feature selection using rank & score of attributes in KDD-99 data set (2014)
Tavallaee, M., Baghe, E.: A detailed analysis of the KDD cup 99 data set (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Khudadad, M., Huang, Z. (2018). Intrusion Detection with Tree-Based Data Mining Classification Techniques by Using KDD. In: Gu, X., Liu, G., Li, B. (eds) Machine Learning and Intelligent Communications. MLICOM 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 227. Springer, Cham. https://doi.org/10.1007/978-3-319-73447-7_33
Download citation
DOI: https://doi.org/10.1007/978-3-319-73447-7_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-73446-0
Online ISBN: 978-3-319-73447-7
eBook Packages: Computer ScienceComputer Science (R0)