Rule-Based Decision Tree to Identify Malicious Traffic

Abstract

Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks. An IDS’s task is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. Since data mining is one of the most emerging fields, when we talk about intrusion detection systems. In this paper, decision tree technique is applied on a small set of network data to find out normal and abnormal behavior. The algorithm generates a decision tree model which differentiates the malicious traffic from normal traffic and then generates rules according to that tree, and incorporates the model’s logic into snort signatures or firewall rules.

Authors and Affiliations

Neha Jain

Keywords

Related Articles

 Performance Investigation of a two Reflector Box Type Solar Cooker with a Finned Absorber Plate : A Review

 This review paper presents the work of various researchers on the performance of solar cooker. In this research author used finned absorber plate inside bottom surface of solar cooker and The top cover (Glazing) i...

 HYBRID APPROACHES FEATURE SUBSET SELECTION: A REVIEW

To overcome the weakness of filter and wrapper approaches, many researchers combined both the methods together. The hybrid approaches are intended to be computationally more effective than wrapper approach as well as yi...

Paramount Real Estate through Android

The paper entitled “PARAMOUNT REAL ESTATE THROUGH ANDROI Android. This paper gives you the information about Paramount (Online) Real Estate. The user can easily find real estate property’s and information about real es...

Wheelchair Motion Control Guide Using Eye Movement Based on EEG Signals

The design and implementation of an Autonomous Movement Robot based on a Wheelchair based on EOG signal is to help a disable or handicapped person. These EOG electrodes are placed at right and left of eye and other pai...

FUEL CELL BASED DG INVOLVING IMPROVED POWER QUALITY CONVERTER FOR VOLTAGE CONTROL

The paper presents a model and controllers of fuel-cell -based distributed generation systems (DG) in a Grid. A dynamic model of the fuel cell is considered. To boost low-output DC voltage of the fuel cell to high DC vo...

Download PDF file
  • EP ID EP138222
  • DOI -
  • Views 68
  • Downloads 0

How To Cite

Neha Jain (30). Rule-Based Decision Tree to Identify Malicious Traffic. International Journal of Engineering Sciences & Research Technology, 2(5), 1189-1192. https://europub.co.uk/articles/-A-138222