Publication:
Reaching a Consensus on Access Detection by a Decision System

Loading...
Thumbnail Image
Official URL
Full text at PDC
Publication Date
2014-12-02
Authors
Guevara Maldonado, César Byron
Martín, José Antonio
Advisors (or tutors)
Editors
Journal Title
Journal ISSN
Volume Title
Publisher
Citations
Google Scholar
Research Projects
Organizational Units
Journal Issue
Abstract
Classification techniques based on Artificial Intelligence are computational tools that have been applied to detection of intrusions (IDS) with encouraging results. They are able to solve problems related to information security in an efficient way. The intrusion detection implies the use of huge amount of information. For this reason heuristic methodologies have been proposed. In this paper, decision trees, Naive Bayes, and supervised classifying systems UCS, are combined to improve the performance of a classifier. In order to validate the system, a scenario based on real data of the NSL-KDD99 dataset is used.
Description
Unesco subjects
Keywords
Citation
[1] H. Debar and J. Viinikka, "Introduction to Intrusion Detection and Security Information Management", in Foundations of Security Analysis and Design III FOSAD 2005. LNCS, 3655, pp. 207-236. Springer (2005). [2] R.G. Bace and P. Mell. "Intrusion detection systems. Gaithersburg", in U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2001. [3] M. Esposito , C. Mazzariello, F. Oliviero, S.P. Romano, and C. Sansone “Evaluating pattern recognition techniques in intrusion detection systems.” in Proceedings of the 5th Interna-tional Workshop on Pattern Recognition in Information Systems (PRIS) 2005, May 2005, pp. 144 - 153. [4] W. Lee , S.J. Stolfo, and K. Mok, "Data Mining in work flow environments: Experiments in intrusion detection." in Proceedings of the 1999 Conference on Knowledge Dis-covery and Data Mining. [5] V. Jaiganesh, S. Mangayarkarasi and P. Sumathi, "Intrusion Detection Systems: A Survey and Analysis of Classification Techniques." vol, 2, 1629-1635. [6] A. Mitrokotsa and C. Dimitrakakis, "Intrusion detection in MANET using classification algorithms: The effects of cost and model selection.", Ad Hoc Networks, 11(1), 226-237. [7] C. Guevara, M. Santos, and J.A. Martín-H, "Identification of Computer Information System Intruders by Decision Trees and Artificial Neural Networks" in International Conference on Intelligent Systems and Knowledge Engineering ISKE 2013. [8] W. Wang, X. Zhang, S. Gombault, and S.J. Knapskog, "Attribute Normalization in Network Intrusion Detection", IEEE, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks. 978-0-7695-3908-9/09, pp-448-453. [9] S. Haykin, "Neural networks: a comprehensive foundation.", New York: Macmillan, 2004. [10] J.R. Quinlan, "Induction of Decision Trees. Machine Learning 1", (1986) 81-106. [11] C. X. Ling, Q. Yang, J. Wang, and S. Zhang, "Decision trees with minimal costs." in Proceedings of the twenty-first international conference on Machine learning, (2004, July), (p. 69). ACM. [12] S. Abe, "Support vector machines for pattern classification.", London: Springer, 2005. [13] E. Bernadó-Mansilla and J.M. Garrell., "Accuracy-Based Learning Classifier Systems: Models, Analysis and Applications to Classification Tasks." in Evolutionary Computation 11:3 (2003) 209-238. [14] P. Domingos and M. Pazzani, "On the optimality of the simple Bayesian classifier under zero-one loss." in Machine Learning 29 (1997) 103-137. [15] "NSL-KDD data set for network-based intrusion detection systems.” Available: http://nsl.cs.unb.ca/NSL-KDD/, March 2014. [16] A.W. Moore and M.S. Lee, "Efficient Algorithms for Minimizing Cross Validation Error.", in Machine Learning: Proceedings of the Eleventh International Conference, Morgan Kaufmann, 1993. [17] M. Santos , J. A. Martín H, V. López and G. Botella, "Dyna-H: A heuristic planning reinforcement learning algorithm applied to roleplaying game strategy decision systems", Knowledge-Based Systems (2012), 32, 28-36.
Collections