Improved C-Fuzzy Decision Tree for Intrusion Detection

As the number of networked computers grows, intrusion detection is an essential component in keeping networks secure. Various approaches for intrusion detection are currently being in use with each one has its own merits and demerits. This paper presents our work to test and improve the performance of a new class of decision tree c-fuzzy decision tree to detect intrusion. The work also includes identifying best candidate feature sub set to build the efficient c-fuzzy decision tree based Intrusion Detection System (IDS). We investigated the usefulness of c-fuzzy decision tree for developing IDS with a data partition based on horizontal fragmentation. Empirical results indicate the usefulness of our approach in developing the efficient IDS.




References:
[1] Dana Elena Ilea, Paul F. Whelan, Ovidiu Ghita Vision Systems Group,
School of Electronic Engineering "Characterization of Clustering
Algorithms for Colour Image Segmentation",
www.vsg.dcu.ie/papers/optim_2006_dana.pdf
[2] Dian-Rong Yang, Leu-Shing Lan* , and Shih-Hung Liao Department of
Electronics Engineering National Yunlin University of Science and
Technology, "A New Fuzzy Clustering Method with Controllable
Membership Characteristics", 2006 IEEE International Conference on
Fuzzy Systems , Vancouver, BC, Canada July 16-21, 2006.
[3] I.H. Witten and E.Frank. Data Mining- Practical Machine Learning
Tools and Techniques with Java Implementation. Morgan Kaufman San
Francisco 2000.
[4] Hsin-Wei Chiu, Chen-Sen Ouyang and Shie-Jue Leee Member IEEE,
Abdul Manon Ahmed, "Improved C-Fuzzy decision Trees", 2006 IEEE
International Conference on Fuzzy Systems , Vancouver, BC, Canada
July 16-21, 2006.
[5] Jonatan Gomez and Dipankar Dasgupta, "Evolving Fuzzy classifiers for
intrusion detection.", Proceedings of the 2002 IEEE workshop on
Information Assurance, NY June 2001.
[6] KDD-Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
[7] Krishnamoorthi, N.V. Subba Reddy, U.Dinesh Acharya, CSE
Department MIT Manipal A Two Stage Hybrid Model for Intrusion
Detection. 14th International Conference on Advanced Computing and
Communication ADCOM 2006. NITK Surathkal
[8] Norbik Bashah, Shanmugam Bnaranidharan, Abdul Manon Ahmed,
"Hybrid Intelligent Intrusion detection system", Trasactions on
Engineering, Computing and Technology V6 June 2005.
[9] Ramesh Agarwal, Mahesh V. Joshi, " Pnrule: A new framework for
learning classifier models in data mining, A case study in network
intrusion detection",. Technical report RC 21719, IBM research report,
Computer Science/ Mathematics, April 2000.
[10] Witold Pedrycz, Fellow, IEEE, and Zenon A. Sosnowski, Member,
IEEE, "C-Fuzzy Decision Trees", IEEE Transactions on Systems, Man,
and Cybernetics ÔÇöPart C: Applications and Reviews, VOL. 35, NO. 4,
November 2005.
[11] Wenke Lee and Salvatore J. Stolfo, Philip K. Chan. Real Time Data
Mining- based Intrusion Detection.
http://www.ncsu.edu/faculty/lee/project/id.html/
[12] Wenke Lee and Salvatore J. Stolfo, Combining Knowledge Discovery
and Knowledge Engineering to build IDSs.
http://www.ncsu.edu/faculty/lee/project/id.html
[13] J. C. Bezdek, Pattern Recognition with Fuzzy Objective Functions, New
York: Plenum, 1981.
[14] Huan Liu, Lei Yu , " Toward Integrating Feature selection Algorithms
for Classification and Clustering", IEEE Transaction on Knowledge and
data Engineering VOl 17 , No 4, April 2005.