DECISION TREE APPLICATION TO INTRUSION DETECTION SYSTEMS

Authors

  • Veselina Jecheva
  • Evgeniya Nikolova

Keywords:

Intrusion detection systems, anomaly-based IDS, C4.5 algorithm, decision tree, cluster analysis

Abstract

The purpose of the intrusion detection systems (IDS) is to reveal any violence of the organizations’ security policy – unauthorized access from outsiders, rising privileges of authorized users, violation of the confidentiality and/or integrity of system resources. The present paper presents an examination of the current IDS, based on the anomalies (behavioral analysis), where C4.5 algorithm is applied in a host-based scenario in order to describe the normal user activity, using decision tree. As a second step, a cluster analysis has been applied with purpose to classify current user activity as normal or malicious. With purpose of approving the proposed methodology, a number of simulation experiments have been applied and the obtained results have been analyzed.

Downloads

Download data is not yet available.

References

Published

2018-05-18

Issue

Section

Computer Science and Communications - Reviewed Publications. ISSN: 1314-7846

How to Cite

DECISION TREE APPLICATION TO INTRUSION DETECTION SYSTEMS. (2018). COMPUTER SCIENCES AND COMMUNICATIONS, 5(4), 7-11. https://csc.bfu.bg/index.php/CSC/article/view/43

Most read articles by the same author(s)

1 2 > >>