Intrusion Detection and Forensics based on decision tree and Association rule mining for Probe attack detection

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2015, Vol 5, Issue 4

Abstract

This paper present an approach based on the combination of, two techniques using decision tree and Association rule mining for Probe attack detection. This approach proves to be better than the traditional approach of generating rules for fuzzy expert system by clustering methods. Association rule mining for selecting the best attributes together and decision tree for identifying the best parameters together to create the rules for fuzzy expert system. After that rules for fuzzy expert system are generated using association rule mining and decision trees. Decision trees is generated for dataset and to find the basic parameters for creating the membership functions of fuzzy inference system. Membership functions are generated for the probe attack. Based on these rules we have created the fuzzy inference system that is used as an input to neuro-fuzzy system. Fuzzy inference system is loaded to neuro-fuzzy toolbox as an input and the final ANFIS structure is generated for outcome of neuro-fuzzy approach. The experiments and evaluations of the proposed method were done with NSL-KDD intrusion detection dataset. As the experimental results, the proposed approach based on the combination of, two techniques using decision tree and Association rule mining efficiently detected probe attacks. Exp

Authors and Affiliations

Harishchandra Maurya , Swati Sharma

Keywords

Related Articles

 Ontology Extraction from Heterogeneous Documents

 Abstract: Ontology Extraction play an important role in the Semantic Web as well as in knowledge management. The emergence of Semantic Web and the related technologies promise to make the Web a meaningful experienc...

 A User-Friendly Image Sharing Scheme Using JPEG-LS Prediction and LSB Matching Function

 Abstract: User-friendly secret sharing encrypts a secret image into n meaningful image shares or shadows first proposed by Thien and Lin in 2003. Their scheme can achieve the goal of secret image sharing with the a...

Prediction of Phishing Websites Using Optimization Techniques

 Phishing website is a fraudulent attempt usually made through email, to steal personal information. Phishing emails usually appear to come from a well-known organization and ask for personal information such as c...

 A review of Carbon Nanotube Reinforced Aluminium Composite and Functionally Graded composites as a Future material for Aerospace

 Material selection is a very critical issue when it comes to aerospace engineering. Materials should have good qualities like light weight, high strength and corrosion resistance with economic viability. Over the p...

 SEGMENTATION AND COUNTING OF PEOPLE THROUGH COLLABORATIVE AUGMENTED

 In this System counting of people is done with the help of computer vision. The reason behind this is that  computer vision is the field which is concerned with the automated processing of images from the real...

Download PDF file
  • EP ID EP89367
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

Harishchandra Maurya, Swati Sharma (2015). Intrusion Detection and Forensics based on decision tree and Association rule mining for Probe attack detection. International Journal of Modern Engineering Research (IJMER), 5(4), 31-37. https://europub.co.uk/articles/-A-89367