Intrusion Detection System Based on Decision Tree and Clustered Continuous Inputs
With the rapid expansion of computer networks during the past decade, security has become a crucial issue for computer systems. Different soft-computing based methods have been proposed in recent years for the development of intrusion detection systems (IDSs). The purpose of this paper is to use ID3...
Saved in:
| Main Author: | |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Mosul University
2011-07-01
|
| Series: | Al-Rafidain Journal of Computer Sciences and Mathematics |
| Subjects: | |
| Online Access: | https://csmj.mosuljournals.com/article_163610_ae9b3b4daf227df4cd257e416ac7d6b9.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849322648835719168 |
|---|---|
| author | Adel Issa |
| author_facet | Adel Issa |
| author_sort | Adel Issa |
| collection | DOAJ |
| description | With the rapid expansion of computer networks during the past decade, security has become a crucial issue for computer systems. Different soft-computing based methods have been proposed in recent years for the development of intrusion detection systems (IDSs). The purpose of this paper is to use ID3 algorithm for IDS and extend it to deal not only with discreet values, but also with continuous ones, by using K_mean algorithm to partition each continuous attribute values to three clusters. The full 10% KDD Cup 99 train dataset and the full Correct test dataset are used. The results of the proposed method show an improvement in the performance as compared to standard ID3 using classical partition method. |
| format | Article |
| id | doaj-art-ed47a91aa6e6468ba74a6f3f957f0860 |
| institution | Kabale University |
| issn | 1815-4816 2311-7990 |
| language | English |
| publishDate | 2011-07-01 |
| publisher | Mosul University |
| record_format | Article |
| series | Al-Rafidain Journal of Computer Sciences and Mathematics |
| spelling | doaj-art-ed47a91aa6e6468ba74a6f3f957f08602025-08-20T03:49:17ZengMosul UniversityAl-Rafidain Journal of Computer Sciences and Mathematics1815-48162311-79902011-07-0181798710.33899/csmj.2011.163610163610Intrusion Detection System Based on Decision Tree and Clustered Continuous InputsAdel Issa0College of Education University of Duhok, IraqWith the rapid expansion of computer networks during the past decade, security has become a crucial issue for computer systems. Different soft-computing based methods have been proposed in recent years for the development of intrusion detection systems (IDSs). The purpose of this paper is to use ID3 algorithm for IDS and extend it to deal not only with discreet values, but also with continuous ones, by using K_mean algorithm to partition each continuous attribute values to three clusters. The full 10% KDD Cup 99 train dataset and the full Correct test dataset are used. The results of the proposed method show an improvement in the performance as compared to standard ID3 using classical partition method.https://csmj.mosuljournals.com/article_163610_ae9b3b4daf227df4cd257e416ac7d6b9.pdfintrusion detection systemdecision treeclustered continuous inputs |
| spellingShingle | Adel Issa Intrusion Detection System Based on Decision Tree and Clustered Continuous Inputs Al-Rafidain Journal of Computer Sciences and Mathematics intrusion detection system decision tree clustered continuous inputs |
| title | Intrusion Detection System Based on Decision Tree and Clustered Continuous Inputs |
| title_full | Intrusion Detection System Based on Decision Tree and Clustered Continuous Inputs |
| title_fullStr | Intrusion Detection System Based on Decision Tree and Clustered Continuous Inputs |
| title_full_unstemmed | Intrusion Detection System Based on Decision Tree and Clustered Continuous Inputs |
| title_short | Intrusion Detection System Based on Decision Tree and Clustered Continuous Inputs |
| title_sort | intrusion detection system based on decision tree and clustered continuous inputs |
| topic | intrusion detection system decision tree clustered continuous inputs |
| url | https://csmj.mosuljournals.com/article_163610_ae9b3b4daf227df4cd257e416ac7d6b9.pdf |
| work_keys_str_mv | AT adelissa intrusiondetectionsystembasedondecisiontreeandclusteredcontinuousinputs |