Skip to main content

Advertisement

Log in

A random-forests-based classifier using class association rules and its application to an intrusion detection system

  • Original Article
  • Published:
Artificial Life and Robotics Aims and scope Submit manuscript

Abstract

With the rapid developments of network technology, devices connected to the network in a variety of fields have increased, and then, network security has become more important. Rule-based classification for intrusion detection is useful, because it is not only easily understood by humans, but also accurate for the classification of new patterns. Genetic network programming (GNP) is one of the rule-mining techniques as well as the evolutionary-optimization techniques. It can extract rules efficiently even from an enormous database, but still needs more accuracy and stability for practical use. This paper describes a classification system with random forests, employing weighted majority vote in the classification to enhance its performance. For the performance evaluation, NSL-KDD (Network Security Laboratory-Knowledge Discovery and Data Mining) data set is used and the proposed method is compared with the conventional methods, including other machine-learning techniques (Random forests, SVM, J4.8) in terms of the accuracy and false positive rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Lee W, Stolfo SJ (1998) Data mining approaches for intrusion detection. In: Proc. of the 1998 USENIX Security Symp

  2. Bishop CM (2006) Pattern recognition and machine learning. Springer, New York

    MATH  Google Scholar 

  3. Quinlan RJ (1993) C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc, Burlington

    Google Scholar 

  4. Katagiri H, Hirasawa K, Hu J, Murata J (2001) Network structure oriented evolutionary model—genetic network programming. In: Proc. of genetic and evolutionary computation conference, pp 219–226

  5. Holland JH (1975) Adaptation in natural and artificial systems. University of Michigan Press, Ann Arbor

    Google Scholar 

  6. Koza JR (1992) Genetic programming: on the programming of computers by means of natural selection. MIT Press, Cambridge

    MATH  Google Scholar 

  7. Shimada K, Hirasawa K, Hu J (2006) Genetic network programming with acquisition mechanisms of association rules. J Adv Comput Intell Intell Inform 10(1):102–111

    Google Scholar 

  8. Mabu S, Chen C, Lu N, Shimada K, Hirasawa K (2010) An intrusion detection model based on fuzzy class association rule mining using genetic network programming. IEEE Trans Syst Man Cybern Part C Appl Rev 41(1):130–139

    Article  Google Scholar 

  9. Shimada K, Wang R, Hirasawa K, Furuzuki T (2006) Medical association rule mining using genetic network programming. IEEJ Trans EIS 126(7):849–856

    Article  Google Scholar 

  10. Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: IEEE symposium on computational intelligence for security and defense applications, CISDA, Cisda, pp 1–6

  11. Zhang C, Zhang S (2002) Association rule mining: models and algorithm. Springer, Berlin

    Book  MATH  Google Scholar 

  12. Agrawal R, Srikant R (1994) Fast algorithms for mining association rules. In: Proc. of the 20th VLDB Conf., Santiago, Chile, pp 487–499

  13. Breiman L (2001) Random forests. Mach Learn 45(1):5–32

    Article  MathSciNet  MATH  Google Scholar 

  14. Zhang J, Zulkernine M, Haque A (2008) Random-forests-based network intrusion detection systems. IEEE Trans Syst Man Cybern Part C Appl Rev 38(5):649–659

    Article  Google Scholar 

  15. KDDCup1999 Data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed 22 Dec 2015

  16. Waikato environment for knowledge analysis (Weka), open source project for machine learning. http://www.cs.waikato.ac.nz/ml/weka/. Accessed 22 Dec 2015

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shingo Mabu.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mabu, S., Gotoh, S., Obayashi, M. et al. A random-forests-based classifier using class association rules and its application to an intrusion detection system. Artif Life Robotics 21, 371–377 (2016). https://doi.org/10.1007/s10015-016-0281-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10015-016-0281-x

Keywords

Navigation