SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4



  The Role of Decision Tree Technique for Automating Intrusion Detection
                                 System
                                              Neha Jain, Shikha Sharma
                            Department of Software Engineering, Suresh Gyan Vihar University, Jaipur
                            Department of Computer Science & Information Technology, ECA, Ajmer

                                                                        A. Anomaly detection: This technique is based on the
Abstract-Security of computers and the networks that
                                                                        detection of traffic anomalies. The deviation of the
connect them is increasingly becoming of great significance.
                                                                        monitored traffic from the normal profile is measured.
Intrusion detection is a mechanism of providing security to
                                                                        Various different implementations of this technique have
computer networks. Although there are some existing
                                                                        been proposed, based on the metrics used for measuring
mechanisms for Intrusion detection, there is need to improve
                                                                        traffic profile deviation.
the performance. Data mining techniques, such as decision
                                                                        B. Misuse/Signature detection: This technique looks for
tree analysis, offers a semi-automated approach to detect
                                                                        patterns and signatures of already known attacks in the
threats. In this paper, decision tree technique is applied on a
                                                                        network traffic [12]. A constantly updated database is
small set of network data. Then build a decision tree model,
                                                                        usually used to store the signatures of known attacks. The
and incorporates the model’s logic into snort signatures or
                                                                        way this technique deals with intrusion detection resembles
firewall rules.
                                                                        the way that anti-virus software operates. [3][4][5][6][7].
Keywords: Denial of Service, Data mining, IDS, Network                  III. DRAWBACKS OF IDS
security, decision tree                                                 Intrusion Detection Systems (IDS) have become a standard
I. INTRODUCTION                                                         component in security infrastructures as they allow network
One of the main challenges in the security management of                administrators to detect policy violations.
large-scale high-speed networks is the detection of                     Current IDS have a number of significant drawbacks:
suspicious anomalies in network traffic patterns due to                 1. Current IDS are usually tuned to detect known service
Distributed Denial of Service (DDoS) attacks or worm                    level network attacks. This leaves them vulnerable to
propagation [1][2] A secure network must provide the                    original and novel malicious attacks.
following:                                                              2. Data overload: Another aspect which does not relate
1. Data confidentiality: Data that are being transferred                directly to misuse detection but is extremely important is
through the network should be accessible only to those that             how much data an analyst can efficiently analyze. That
have been properly authorized.                                          amount of data he needs to look at seems to be growing
2. Data integrity: Data should maintain their integrity from            rapidly. Depending on the intrusion detection tools
the moment they are transmitted to the moment they are                  employed by a company and its size there is the possibility
actually received. No corruption or data loss is accepted               for logs to reach millions of records per day.
either from random events or malicious activity.                        3. False positives: A common complaint is the amount of
                                                                        false positives a IDS will generate. A false positive occurs
3. Data availability: The network should be resilient to                when normal attack is mistakenly classified as malicious
Denial of Service attacks.                                              and treated accordingly.
                                                                        4. False negatives: This is the case where an IDS does not
An intrusion detection system (IDS) inspects all inbound                generate an alert when an intrusion is actually taking place.
and outbound network activity and identifies suspicious                 (Classification of malicious traffic as normal)
patterns that may indicate a network or system attack from              Data mining can help improve intrusion detection by
someone attempting to break into or compromise a system.                addressing each and every one of the above mentioned
When a potential attack is detected the IDS logs the                    problems.
information and sends an alert to the console. IDS try to find
data packets that contain any known intrusion-related                               IV. DATA MINING: DEFINITION
signatures or anomalies related to Internet protocols.                  Data mining is, at its core, pattern finding. Data miners are
                                                                        experts at using specialized software to find regularities
II IDS TAXONOMY                                                         (and irregularities) in large data sets. Here are a few specific
The goal of IDS is to detect malicious traffic. In order to             things that data mining might contribute to an intrusion
accomplish this, the IDS monitor all incoming and outgoing              detection project:
traffic. There are several approaches on the implementation             ď‚· Remove normal activity from alarm data to allow
of IDS. Among those, two are the most popular [11]:                          analysts to focus on real attacks


Issn 2250-3005(online)                                            August| 2012                                     Page 1076
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4



   Identify false alarm generators and “bad” sensor
    signatures
ď‚·   Find anomalous activity that uncovers a real attack
ď‚·   Identify long, ongoing patterns (different IP address,
    same activity)
    To accomplish these tasks, data miners use one or more
    of the following techniques [8][9][10]:
ď‚·   Data summarization with statistics, including finding
    outliers
ď‚·   Visualization: presenting a graphical summary of the
    data
ď‚·   Clustering of the data into natural categories
ď‚·   Association rule discovery: defining normal activity and
    enabling the discovery of anomalies
                                                                            Fig 1: Process to implement decision tree for Intrusion
ď‚·   Classification: predicting the category to which a
                                                                                                  Detection
    particular record belongs
                                                                           VIII. IMPLEMENTATION
      V. DECISION TREE: A CLASSIFICATION                              1.  Implementing decision trees can require some network
                                                                          data.      Download        the    following     files from
                  TECHNIQUE
                                                                          http://www.openpacket.org/
A decision tree is defined as “a predictive modeling
                                                                           example.com-3.pcap
technique from the fields of machine learning and statistics
                                                                           example.com-4.pcap
that builds a simple tree-like structure to model the
                                                                           example.com-5.pcap
underlying pattern [of data]”.
                                                                           zeus-sample-3.pcap (botnet traffic)
Decision trees are one example of a classification algorithm.
                                                                      2. Implementing decision trees can require various tools:
Classification is a data mining technique that assigns objects
to one of several predefined categories. From an intrusion            ď‚· Feature extraction tools: used during the data pre-
detection perspective, classification algorithms can                      processing phase. For this we use tcptrace tool to
characterize network data as malicious, benign, scanning, or              perform feature extraction from pcap files.
any other category of interest using information like                     Download           and        install     tcptrace    from
source/destination ports, IP addresses, and the number of                 http://www.tcptrace.org/
bytes sent during a connection.                                       ď‚· Data mining analysis tool: Weka is used for this
                                                                          purpose. Of all the open-source tools, Weka has been
VI. WHY USE DECISION TREE                                                 described as “perhaps the best-known open-source
Decision trees is a viable tool in the intrusion detection                machine learning and data mining environment”
toolkit, the technique needs to satisfy a minimum set of                  Download           and         install      Weka      from
requirements. The technique needs to be beneficial to the                 http://www.cs.waikato.ac.nz/ml/weka/
intrusion analysis mission and produce real results for an             3. Now the Feature Extraction tool is used to collect and
organization.                                                             structure the features from a dataset in a format that can
In addition, decision trees must be unique among existing                 be used for training the decision tree.
tools. If other tools exist with the same functionality                  Steps:
provided by decision trees, then decision trees may be                     i) For each pcap file, run the command:
redundant and unnecessary.                                                       tcptrace --csv -l filename1.pcap > filename1.csv
                                                                                 (where filename is the name of the pcap file)
VII. USING DECISION TREE FOR INTRUSION                                     ii) From each csv file, remove rows 1-8 (the          row
               DETECTION                                                           before conn #)
Two prerequisites for the analysis are data collection (i.e.               iii) From each csv file, delete the following columns
identifying and collecting data of interest) and tool                              EXCEPT
acquisition and selection (i.e. identifying and deploying data             ď‚· port_a
mining tools). The gathered data requires a pre-processing                 ď‚· port_b
phase to move it into the form necessary for decision tree                 ď‚· total_packets_a2b
algorithms. After the data is processed, decision trees can be             ď‚·      total_packets_b2a
trained using the processed data and tools. Running and                    ď‚· unique_bytes_sent_a2b
analyzing the result of this data is an important next step to             ď‚·      unique_bytes_sent_b2a
understand the resulting model and its rule sets. The final
step is using the results of the analysis to run the decision
rules in real-time.

Issn 2250-3005(online)                                           August| 2012                                     Page 1077
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4


 iv) Add new column called “class” to each spreadsheet.                  IX. CONCLUSIONS
      Fill in each cell of the new column with either “normal”           This paper has presented a decision tree technique that
      or “malicious”.                                                    categorize new piece of information into a number of
 v) Copy and paste all cells from the spreadsheets into a                predefined categories. Decision tree uses a pre-classified
      single csv file called analysis_of_traffic.csv                     dataset to learn to categorize data based on existing trends
4. Run Weka                                                              and patterns. After the tree is created, the logic from the
  i) From the Weka GUI Chooser, click on the Explorer                    decision tree can be incorporated into number of intrusion
       button                                                            detection technologies including firewalls and IDS
  ii) From the Weka Explorer GUI, click on Open File.                    signatures.
  iii) Using the explorer, open the traffic_analysis.csv file            With the increasing incidents of cyber attacks, building an
  iv)     Click on the Classify tab at the top of the Weka               effective intrusion detection models with good accuracy and
       Explorer GUI                                                      real-time performance are essential. Data mining is
       Click on the “choose” button to select a classifier               relatively new approach for intrusion detection. More data
       From the menu, expand the trees icon                              mining techniques should be investigated and their
       Click on the J48 Tree classifier                                  efficiency should be evaluated as intrusion detection
  v) On the Classify GUI, click on the Start button to start             models.
       the classifier
5. Weka Output                                                           REFERENCES
       This decision tree in the output listed above states that         [1]  Christos Douligeris, Aikaterini Mitrokotsa, ”DDoS
       connections with port_a <= 1049 and port_b <= 445 are                  attacks and defense mechanisms: classification and
       malicious, otherwise the connection is normal.                         state-of-the-art”      ,Computer       Networks:    The
       For reference, tcptrace defines port_a as the port of the              International       Journal      of     Computer    and
       machine initiating the connection and port_b as the port               Telecommunications Networking,Vol. 44, Issue 5 , pp:
       of the machine receiving the connection.                               643 - 666, 2004.
                                                                         [2] Z. Chen, L. Gao, K. Kwiat, Modeling the spread of
                                                                              active worms,Twenty- Second Annual Joint
                                                                              Conference       of     the     IEEE     Computer   and
                                                                              Communications Societies (INFOCOM), Vol. 3, pp.
                                                                              1890 1900, 2003.
                                                                         [3] Mithcell      Rowton,        Introduction   to   Network
                                                                              SecurityIntrusion Detection,December 2005.
                                                                         [4] Biswanath Mukherjee, L.Todd Heberlein, Karl
                                                                              N.Levitt, ”Network Intrusion Detection”,IEEE, June
                                                                              1994.
                                                                         [5] Presentation on Intrusion Detection Systems, Arian
                                                                              Mavriqi.
                                                                         [6] Intrusion Detection Methodologies Demystified,
                                                                              Enterasys Networks TM.
                                                                         [7] Protocol Analysis VS Pattern matching in Network
                                                                              and Host IDS, 3rd Generation Intrusion Detection
                                                                              Technology from Network ICE
                                                                         [8] Han, J. and Kamber, M. (2000). Data Mining:
                       Fig 2: Weka output                                     Concepts and
                                                                              Techniques, Morgan Kaufmann Publisher.
                                                                         [9] Mannila, H., Smyth, P., and Hand, D. J. (2001).
                                                                              Principles of Data Mining. MIT Press. Mannila, H.,
                                                                              Toivonen, H., and Verkamo, A. I. (1997)
                                                                         [10] Berry, M. J. A. and Lino_,G. (1997). Data Mining
                                                                              Techniques. John Wiley and Sons, Inc
                                                                         [11] Mithcell Rowton, Introduction to Network Security
                                                                              Intrusion
                                                                              Detection, December 2005.
                                                                         [12] Mounji, A. (1997). Languages and Tools for Rule-
                                                                              Based Distributed Intrusion Detection. PhD thesis,
                                                                              Faculties Universitaires Notre-Dame dela Paix Namur
                                                                              (Belgium).
                        Fig 3: Tree view
  Issn 2250-3005(online)                                           August| 2012                                  Page 1078

More Related Content

What's hot

An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...Editor IJMTER
 
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack DetectionA Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detectionijsrd.com
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...IJNSA Journal
 
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETIJNSA Journal
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
 
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONCOMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONIJNSA Journal
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IJNSA Journal
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964IJERA Editor
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logicijdpsjournal
 
IDS - Analysis of SVM and decision trees
IDS - Analysis of SVM and decision treesIDS - Analysis of SVM and decision trees
IDS - Analysis of SVM and decision treesVahid Farrahi
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...ijcsit
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSieijjournal
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013ijcsbi
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...IJCSIS Research Publications
 
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET Journal
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
 

What's hot (18)

An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
 
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack DetectionA Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
 
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONCOMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
 
IDS - Analysis of SVM and decision trees
IDS - Analysis of SVM and decision treesIDS - Analysis of SVM and decision trees
IDS - Analysis of SVM and decision trees
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
 
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
 
N44096972
N44096972N44096972
N44096972
 

Similar to IJCER (www.ijceronline.com) International Journal of computational Engineering research

A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...IJORCS
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectioncsandit
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber securityPsychoCryGaming
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217ijceronline
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...ClaraZara1
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxvoversbyobersby
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...IJMER
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithmijtsrd
 
D0261019025
D0261019025D0261019025
D0261019025theijes
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical HackingJennifer Wood
 
Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
Layered approach
Layered approachLayered approach
Layered approachingenioustech
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...IJCSIS Research Publications
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 

Similar to IJCER (www.ijceronline.com) International Journal of computational Engineering research (20)

A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detection
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber security
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
145 148
145 148145 148
145 148
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docx
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
D0261019025
D0261019025D0261019025
D0261019025
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)
 
Layered approach
Layered approachLayered approach
Layered approach
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

IJCER (www.ijceronline.com) International Journal of computational Engineering research

  • 1. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4 The Role of Decision Tree Technique for Automating Intrusion Detection System Neha Jain, Shikha Sharma Department of Software Engineering, Suresh Gyan Vihar University, Jaipur Department of Computer Science & Information Technology, ECA, Ajmer A. Anomaly detection: This technique is based on the Abstract-Security of computers and the networks that detection of traffic anomalies. The deviation of the connect them is increasingly becoming of great significance. monitored traffic from the normal profile is measured. Intrusion detection is a mechanism of providing security to Various different implementations of this technique have computer networks. Although there are some existing been proposed, based on the metrics used for measuring mechanisms for Intrusion detection, there is need to improve traffic profile deviation. the performance. Data mining techniques, such as decision B. Misuse/Signature detection: This technique looks for tree analysis, offers a semi-automated approach to detect patterns and signatures of already known attacks in the threats. In this paper, decision tree technique is applied on a network traffic [12]. A constantly updated database is small set of network data. Then build a decision tree model, usually used to store the signatures of known attacks. The and incorporates the model’s logic into snort signatures or way this technique deals with intrusion detection resembles firewall rules. the way that anti-virus software operates. [3][4][5][6][7]. Keywords: Denial of Service, Data mining, IDS, Network III. DRAWBACKS OF IDS security, decision tree Intrusion Detection Systems (IDS) have become a standard I. INTRODUCTION component in security infrastructures as they allow network One of the main challenges in the security management of administrators to detect policy violations. large-scale high-speed networks is the detection of Current IDS have a number of significant drawbacks: suspicious anomalies in network traffic patterns due to 1. Current IDS are usually tuned to detect known service Distributed Denial of Service (DDoS) attacks or worm level network attacks. This leaves them vulnerable to propagation [1][2] A secure network must provide the original and novel malicious attacks. following: 2. Data overload: Another aspect which does not relate 1. Data confidentiality: Data that are being transferred directly to misuse detection but is extremely important is through the network should be accessible only to those that how much data an analyst can efficiently analyze. That have been properly authorized. amount of data he needs to look at seems to be growing 2. Data integrity: Data should maintain their integrity from rapidly. Depending on the intrusion detection tools the moment they are transmitted to the moment they are employed by a company and its size there is the possibility actually received. No corruption or data loss is accepted for logs to reach millions of records per day. either from random events or malicious activity. 3. False positives: A common complaint is the amount of false positives a IDS will generate. A false positive occurs 3. Data availability: The network should be resilient to when normal attack is mistakenly classified as malicious Denial of Service attacks. and treated accordingly. 4. False negatives: This is the case where an IDS does not An intrusion detection system (IDS) inspects all inbound generate an alert when an intrusion is actually taking place. and outbound network activity and identifies suspicious (Classification of malicious traffic as normal) patterns that may indicate a network or system attack from Data mining can help improve intrusion detection by someone attempting to break into or compromise a system. addressing each and every one of the above mentioned When a potential attack is detected the IDS logs the problems. information and sends an alert to the console. IDS try to find data packets that contain any known intrusion-related IV. DATA MINING: DEFINITION signatures or anomalies related to Internet protocols. Data mining is, at its core, pattern finding. Data miners are experts at using specialized software to find regularities II IDS TAXONOMY (and irregularities) in large data sets. Here are a few specific The goal of IDS is to detect malicious traffic. In order to things that data mining might contribute to an intrusion accomplish this, the IDS monitor all incoming and outgoing detection project: traffic. There are several approaches on the implementation ď‚· Remove normal activity from alarm data to allow of IDS. Among those, two are the most popular [11]: analysts to focus on real attacks Issn 2250-3005(online) August| 2012 Page 1076
  • 2. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4 ď‚· Identify false alarm generators and “bad” sensor signatures ď‚· Find anomalous activity that uncovers a real attack ď‚· Identify long, ongoing patterns (different IP address, same activity) To accomplish these tasks, data miners use one or more of the following techniques [8][9][10]: ď‚· Data summarization with statistics, including finding outliers ď‚· Visualization: presenting a graphical summary of the data ď‚· Clustering of the data into natural categories ď‚· Association rule discovery: defining normal activity and enabling the discovery of anomalies Fig 1: Process to implement decision tree for Intrusion ď‚· Classification: predicting the category to which a Detection particular record belongs VIII. IMPLEMENTATION V. DECISION TREE: A CLASSIFICATION 1. Implementing decision trees can require some network data. Download the following files from TECHNIQUE http://www.openpacket.org/ A decision tree is defined as “a predictive modeling example.com-3.pcap technique from the fields of machine learning and statistics example.com-4.pcap that builds a simple tree-like structure to model the example.com-5.pcap underlying pattern [of data]”. zeus-sample-3.pcap (botnet traffic) Decision trees are one example of a classification algorithm. 2. Implementing decision trees can require various tools: Classification is a data mining technique that assigns objects to one of several predefined categories. From an intrusion ď‚· Feature extraction tools: used during the data pre- detection perspective, classification algorithms can processing phase. For this we use tcptrace tool to characterize network data as malicious, benign, scanning, or perform feature extraction from pcap files. any other category of interest using information like Download and install tcptrace from source/destination ports, IP addresses, and the number of http://www.tcptrace.org/ bytes sent during a connection. ď‚· Data mining analysis tool: Weka is used for this purpose. Of all the open-source tools, Weka has been VI. WHY USE DECISION TREE described as “perhaps the best-known open-source Decision trees is a viable tool in the intrusion detection machine learning and data mining environment” toolkit, the technique needs to satisfy a minimum set of Download and install Weka from requirements. The technique needs to be beneficial to the http://www.cs.waikato.ac.nz/ml/weka/ intrusion analysis mission and produce real results for an 3. Now the Feature Extraction tool is used to collect and organization. structure the features from a dataset in a format that can In addition, decision trees must be unique among existing be used for training the decision tree. tools. If other tools exist with the same functionality Steps: provided by decision trees, then decision trees may be i) For each pcap file, run the command: redundant and unnecessary. tcptrace --csv -l filename1.pcap > filename1.csv (where filename is the name of the pcap file) VII. USING DECISION TREE FOR INTRUSION ii) From each csv file, remove rows 1-8 (the row DETECTION before conn #) Two prerequisites for the analysis are data collection (i.e. iii) From each csv file, delete the following columns identifying and collecting data of interest) and tool EXCEPT acquisition and selection (i.e. identifying and deploying data ď‚· port_a mining tools). The gathered data requires a pre-processing ď‚· port_b phase to move it into the form necessary for decision tree ď‚· total_packets_a2b algorithms. After the data is processed, decision trees can be ď‚· total_packets_b2a trained using the processed data and tools. Running and ď‚· unique_bytes_sent_a2b analyzing the result of this data is an important next step to ď‚· unique_bytes_sent_b2a understand the resulting model and its rule sets. The final step is using the results of the analysis to run the decision rules in real-time. Issn 2250-3005(online) August| 2012 Page 1077
  • 3. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4 iv) Add new column called “class” to each spreadsheet. IX. CONCLUSIONS Fill in each cell of the new column with either “normal” This paper has presented a decision tree technique that or “malicious”. categorize new piece of information into a number of v) Copy and paste all cells from the spreadsheets into a predefined categories. Decision tree uses a pre-classified single csv file called analysis_of_traffic.csv dataset to learn to categorize data based on existing trends 4. Run Weka and patterns. After the tree is created, the logic from the i) From the Weka GUI Chooser, click on the Explorer decision tree can be incorporated into number of intrusion button detection technologies including firewalls and IDS ii) From the Weka Explorer GUI, click on Open File. signatures. iii) Using the explorer, open the traffic_analysis.csv file With the increasing incidents of cyber attacks, building an iv) Click on the Classify tab at the top of the Weka effective intrusion detection models with good accuracy and Explorer GUI real-time performance are essential. Data mining is Click on the “choose” button to select a classifier relatively new approach for intrusion detection. More data From the menu, expand the trees icon mining techniques should be investigated and their Click on the J48 Tree classifier efficiency should be evaluated as intrusion detection v) On the Classify GUI, click on the Start button to start models. the classifier 5. Weka Output REFERENCES This decision tree in the output listed above states that [1] Christos Douligeris, Aikaterini Mitrokotsa, ”DDoS connections with port_a <= 1049 and port_b <= 445 are attacks and defense mechanisms: classification and malicious, otherwise the connection is normal. state-of-the-art” ,Computer Networks: The For reference, tcptrace defines port_a as the port of the International Journal of Computer and machine initiating the connection and port_b as the port Telecommunications Networking,Vol. 44, Issue 5 , pp: of the machine receiving the connection. 643 - 666, 2004. [2] Z. Chen, L. Gao, K. Kwiat, Modeling the spread of active worms,Twenty- Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), Vol. 3, pp. 1890 1900, 2003. [3] Mithcell Rowton, Introduction to Network SecurityIntrusion Detection,December 2005. [4] Biswanath Mukherjee, L.Todd Heberlein, Karl N.Levitt, ”Network Intrusion Detection”,IEEE, June 1994. [5] Presentation on Intrusion Detection Systems, Arian Mavriqi. [6] Intrusion Detection Methodologies Demystified, Enterasys Networks TM. [7] Protocol Analysis VS Pattern matching in Network and Host IDS, 3rd Generation Intrusion Detection Technology from Network ICE [8] Han, J. and Kamber, M. (2000). Data Mining: Fig 2: Weka output Concepts and Techniques, Morgan Kaufmann Publisher. [9] Mannila, H., Smyth, P., and Hand, D. J. (2001). Principles of Data Mining. MIT Press. Mannila, H., Toivonen, H., and Verkamo, A. I. (1997) [10] Berry, M. J. A. and Lino_,G. (1997). Data Mining Techniques. John Wiley and Sons, Inc [11] Mithcell Rowton, Introduction to Network Security Intrusion Detection, December 2005. [12] Mounji, A. (1997). Languages and Tools for Rule- Based Distributed Intrusion Detection. PhD thesis, Faculties Universitaires Notre-Dame dela Paix Namur (Belgium). Fig 3: Tree view Issn 2250-3005(online) August| 2012 Page 1078