Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Protocol Random Forest Model to Enhance the Effectiveness of Intrusion Detection Identification

  • Conference paper
  • First Online:
International Conference on Innovative Computing and Communications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1166))

  • 1117 Accesses

Abstract

Nowadays, IT systems are everywhere like in an organization, enterprise, and institution. Among organizational assets, IT assets are the hardest to nail down as it requires many repetitive technical works to identify intangible things like data, software, and configurations. To protect dangerous impacts on the IT infrastructure, this research focuses on the development of a network intrusion detection model that performs accurate detection at a low false-positive rate. We consider the significant role of the standard protocols used to launch an attack, and therefore developed the detection model based on the protocol datasets. We utilized the research methods of the random forest as the classifier and genetic algorithm for feature selection. Three protocol datasets, which represent subsets of the NSL-KDD dataset, are used for the experiment. The finding is sufficient to prove that our protocol random forest (Protocol-RF) model detects the attacks with the highest precision of 0.907 and a low false-positive rate of 0.001.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. A.S. Ashoor, S. Gore, Importance of intrusion detection system (IDS). Int. J. Sci. Eng. Res. 2(1), 1–4 (2011)

    Google Scholar 

  2. L. Breiman, Random forests. Mach. Learn. 45(1), 5–32 (2001). https://doi.org/10.1023/A:1010933404324

    Article  MATH  Google Scholar 

  3. H. Gharaee, H. Hosseinvand, A new feature selection IDS based on genetic algorithm and SVM, in 2016 8th International Symposium on Telecommunications (IST), Tehran (2016), pp. 139–144. https://doi.org/10.1109/ISTEL.2016.7881798

  4. N. Farnaaz, M.A. Jabbar, Random forest modeling for network intrusion detection system. Procedia Comput. Sci. 89, 213–217 (2016). https://doi.org/10.1016/j.procs.2016.06.047

    Article  Google Scholar 

  5. J. Jiang et al., RST-RF: a hybrid model based on rough set theory and random forest for network intrusion detection, in ACM International Conference Proceeding Series (2018), pp. 77–81. https://doi.org/10.1145/3199478.3199489

  6. Z. Muda et al., Improving intrusion detection using genetic algorithm. Inf. Technol. J. 12, 11 (2013). https://doi.org/10.3923/itj.2013.2167.2173

    Article  Google Scholar 

  7. A. Navlani, Random Forests Classifiers in Python (article) - DataCamp, https://www.datacamp.com/community/tutorials/random-forests-classifier-python. Last accessed 2019/11/12

  8. Z.D.M. Seifeddine, Hybrid Intrusion Detection System by (2017)

    Google Scholar 

  9. G. Varoquaux et al., Scikit-learn. GetMobile Mobile Comput. Commun. 19(1), 29–33 (2015). https://doi.org/10.1145/2786984.2786995

    Article  Google Scholar 

  10. S. Zaman et al., Features selection approaches for intrusion detection systems based on evolution algorithms, in Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013. January 2013 (2013). https://doi.org/10.1145/2448556.2448566

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thet Thet Htwe .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Htwe, T.T., Kham, N.S.M. (2021). Protocol Random Forest Model to Enhance the Effectiveness of Intrusion Detection Identification. In: Gupta, D., Khanna, A., Bhattacharyya, S., Hassanien, A.E., Anand, S., Jaiswal, A. (eds) International Conference on Innovative Computing and Communications. Advances in Intelligent Systems and Computing, vol 1166. Springer, Singapore. https://doi.org/10.1007/978-981-15-5148-2_15

Download citation

Publish with us

Policies and ethics