Improving Attack Detection of C4.5 using an Evolutionary Algorithm

Javier Maldonado, Maria Cristina Riff, Elizabeth Montero

Resultado de la investigación: Conference contribution

Resumen

Intrusion detection is a major research problem in network security. Intrusion Detection Systems (IDS), analyses information from the network trying to identify suspicious behaviors and detect intentions to attack the system. Intrusion attempts are nonlinear with an unpredictable behavior on the network traffic. The process of selecting the key features that allows discriminate attacks from normal traffic, is a crucial task in information security to obtain an effective IDS. We propose in this paper to use an Evolutionary Algorithm and an evaluation function from a classifier, to automatically select key features from a data set before defining a Decision Tree that can be used to discriminate among the network data type. The purpose of this study, is to propose an intrusion detection technique that selects key features using a specially designed evolutionary algorithm with individual evaluations done using C4.5, a wellknown classifier that discriminate data using decision trees. We report very encouraging results of our approach using NSL-KDD intrusion detection benchmark data sets.

Idioma originalEnglish
Título de la publicación alojada2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings
EditorialInstitute of Electrical and Electronics Engineers Inc.
Páginas2229-2235
Número de páginas7
ISBN (versión digital)9781728121536
DOI
EstadoPublished - 1 jun 2019
Evento2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Wellington, New Zealand
Duración: 10 jun 201913 jun 2019

Serie de la publicación

Nombre2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings

Conference

Conference2019 IEEE Congress on Evolutionary Computation, CEC 2019
PaísNew Zealand
CiudadWellington
Período10/06/1913/06/19

Huella dactilar

Intrusion detection
Intrusion Detection
Evolutionary algorithms
Evolutionary Algorithms
Attack
Decision trees
Decision tree
Classifiers
Classifier
Function evaluation
Network Security
Information Security
Network security
Evaluation Function
Network Traffic
Security of data
Information systems
Traffic
Benchmark
Evaluation

ASJC Scopus subject areas

  • Computational Mathematics
  • Modelling and Simulation

Citar esto

Maldonado, J., Riff, M. C., & Montero, E. (2019). Improving Attack Detection of C4.5 using an Evolutionary Algorithm. En 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings (pp. 2229-2235). [8790199] (2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CEC.2019.8790199
Maldonado, Javier ; Riff, Maria Cristina ; Montero, Elizabeth. / Improving Attack Detection of C4.5 using an Evolutionary Algorithm. 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2019. pp. 2229-2235 (2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings).
@inproceedings{bafc94bdde9b426ba621b29751ae236a,
title = "Improving Attack Detection of C4.5 using an Evolutionary Algorithm",
abstract = "Intrusion detection is a major research problem in network security. Intrusion Detection Systems (IDS), analyses information from the network trying to identify suspicious behaviors and detect intentions to attack the system. Intrusion attempts are nonlinear with an unpredictable behavior on the network traffic. The process of selecting the key features that allows discriminate attacks from normal traffic, is a crucial task in information security to obtain an effective IDS. We propose in this paper to use an Evolutionary Algorithm and an evaluation function from a classifier, to automatically select key features from a data set before defining a Decision Tree that can be used to discriminate among the network data type. The purpose of this study, is to propose an intrusion detection technique that selects key features using a specially designed evolutionary algorithm with individual evaluations done using C4.5, a wellknown classifier that discriminate data using decision trees. We report very encouraging results of our approach using NSL-KDD intrusion detection benchmark data sets.",
author = "Javier Maldonado and Riff, {Maria Cristina} and Elizabeth Montero",
year = "2019",
month = "6",
day = "1",
doi = "10.1109/CEC.2019.8790199",
language = "English",
series = "2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "2229--2235",
booktitle = "2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings",
address = "United States",

}

Maldonado, J, Riff, MC & Montero, E 2019, Improving Attack Detection of C4.5 using an Evolutionary Algorithm. En 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings., 8790199, 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings, Institute of Electrical and Electronics Engineers Inc., pp. 2229-2235, 2019 IEEE Congress on Evolutionary Computation, CEC 2019, Wellington, New Zealand, 10/06/19. https://doi.org/10.1109/CEC.2019.8790199

Improving Attack Detection of C4.5 using an Evolutionary Algorithm. / Maldonado, Javier; Riff, Maria Cristina; Montero, Elizabeth.

2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2019. p. 2229-2235 8790199 (2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings).

Resultado de la investigación: Conference contribution

TY - GEN

T1 - Improving Attack Detection of C4.5 using an Evolutionary Algorithm

AU - Maldonado, Javier

AU - Riff, Maria Cristina

AU - Montero, Elizabeth

PY - 2019/6/1

Y1 - 2019/6/1

N2 - Intrusion detection is a major research problem in network security. Intrusion Detection Systems (IDS), analyses information from the network trying to identify suspicious behaviors and detect intentions to attack the system. Intrusion attempts are nonlinear with an unpredictable behavior on the network traffic. The process of selecting the key features that allows discriminate attacks from normal traffic, is a crucial task in information security to obtain an effective IDS. We propose in this paper to use an Evolutionary Algorithm and an evaluation function from a classifier, to automatically select key features from a data set before defining a Decision Tree that can be used to discriminate among the network data type. The purpose of this study, is to propose an intrusion detection technique that selects key features using a specially designed evolutionary algorithm with individual evaluations done using C4.5, a wellknown classifier that discriminate data using decision trees. We report very encouraging results of our approach using NSL-KDD intrusion detection benchmark data sets.

AB - Intrusion detection is a major research problem in network security. Intrusion Detection Systems (IDS), analyses information from the network trying to identify suspicious behaviors and detect intentions to attack the system. Intrusion attempts are nonlinear with an unpredictable behavior on the network traffic. The process of selecting the key features that allows discriminate attacks from normal traffic, is a crucial task in information security to obtain an effective IDS. We propose in this paper to use an Evolutionary Algorithm and an evaluation function from a classifier, to automatically select key features from a data set before defining a Decision Tree that can be used to discriminate among the network data type. The purpose of this study, is to propose an intrusion detection technique that selects key features using a specially designed evolutionary algorithm with individual evaluations done using C4.5, a wellknown classifier that discriminate data using decision trees. We report very encouraging results of our approach using NSL-KDD intrusion detection benchmark data sets.

UR - http://www.scopus.com/inward/record.url?scp=85071305308&partnerID=8YFLogxK

U2 - 10.1109/CEC.2019.8790199

DO - 10.1109/CEC.2019.8790199

M3 - Conference contribution

T3 - 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings

SP - 2229

EP - 2235

BT - 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Maldonado J, Riff MC, Montero E. Improving Attack Detection of C4.5 using an Evolutionary Algorithm. En 2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc. 2019. p. 2229-2235. 8790199. (2019 IEEE Congress on Evolutionary Computation, CEC 2019 - Proceedings). https://doi.org/10.1109/CEC.2019.8790199