Improving Attack Detection of C4.5 using an Evolutionary Algorithm

Javier Maldonado, Maria Cristina Riff, Elizabeth Montero

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Intrusion detection is a major research problem in network security. Intrusion Detection Systems (IDS), analyses information from the network trying to identify suspicious behaviors and detect intentions to attack the system. Intrusion attempts are nonlinear with an unpredictable behavior on the network traffic. The process of selecting the key features that allows discriminate attacks from normal traffic, is a crucial task in information security to obtain an effective IDS. We propose in this paper to use an Evolutionary Algorithm and an evaluation function from a classifier, to automatically select key features from a data set before defining a Decision Tree that can be used to discriminate among the network data type. The purpose of this study, is to propose an intrusion detection technique that selects key features using a specially designed evolutionary algorithm with individual evaluations done using C4.5, a wellknown classifier that discriminate data using decision trees. We report very encouraging results of our approach using NSL-KDD intrusion detection benchmark data sets.

Original languageEnglish
Title of host publication2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2229-2235
Number of pages7
ISBN (Electronic)9781728121536
DOIs
Publication statusPublished - 1 Jun 2019
Event2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Wellington, New Zealand
Duration: 10 Jun 201913 Jun 2019

Publication series

Name2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings

Conference

Conference2019 IEEE Congress on Evolutionary Computation, CEC 2019
Country/TerritoryNew Zealand
CityWellington
Period10/06/1913/06/19

ASJC Scopus subject areas

  • Computational Mathematics
  • Modelling and Simulation

Fingerprint

Dive into the research topics of 'Improving Attack Detection of C4.5 using an Evolutionary Algorithm'. Together they form a unique fingerprint.

Cite this