A Two-Stage Classifier Approach using RepTree Algorithm for Network Intrusion Detection
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 6
Abstract
In this paper, we present a two-stage classifier based on RepTree algorithm and protocols subset for network intrusion detection system. To evaluate the performance of our approach, we used the UNSW-NB15 data set and the NSL-KDD data set. In first phase our approach divides the incoming network traffics into three type of protocols TCP, UDP or Other, then classifies into normal or anomaly. In second stage a multiclass algorithm classify the anomaly detected in the first phase to identify the attacks class in order to choose the appropriate intervention. The number of features is reduced from over 40 to less than 20 features, according to the protocol, using feature selection techniques. The detection accuracy of 88,95% and 89,85% was achieved on the complete UNSW-NB15 and NSL-KDD data set, respectively using individual classifier, results are better as compared to the recent work on these data sets.
Authors and Affiliations
Mustapha Belouch, Salah El Hadaj, Mohamed Idhammad
RECOMMENDER SYSTEM FOR PERSONALISED WELLNESS THERAPY
Rising costs and risks in health care have shifted the preference of individuals from health treatment to disease prevention. This prevention treatment is known as wellness. In recent years, the Internet has become a pop...
How to Model a Likely Behavior of a Pedagogical Agent from a Real Situation
The aim of this work is to model the behavior verbal and nonverbal behavior of a Pedagogical Agent (PA) can be integrated into an Intelligent Tutoring System. The following research questions were posed: what is the nonv...
Efficient Feature Selection for Product Labeling over Unstructured Data
The paper introduces a novel feature selection algorithm for labeling identical products collected from online web resources. Product labeling is important for clustering similar or same products. Products blindly crawle...
Study of Routing Protocols on CBR and VBR Applications in VANET Scenario
Vehicular Adhoc Networks (VANETs) are special type of Mobile Adhoc networks (MANETs) where node movement is in pre ordered fashion but with high velocity in comparison to MANETs where nodes move in random manner. Due to...
A Comparative Study of various Secure Routing Protocols based on AODV
The paper surveyed and compared various secure routing protocols for the mobile ad hoc networks (MANETs). MANETs are vulnerable to various security threats because of its dynamic topology and selfconfigurable nature. Sec...