An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm

  title={An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm},
  author={L. Prema Rajeswari and Arputharaj Kannan},
Intrusion detection systems provide additional defe nse capacity to a networked information system in addition to the security measures provided by the f ir walls. This paper proposes an active rule based enhancement to the C4.5 algorithm for network intru sion detection in order to detect misuse behaviors of internal attackers through effective classification and decision making in computer networks. This enh anced C4.5 algorithm derives a set of classification rule s from network audit data… CONTINUE READING
Highly Cited
This paper has 58 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 18 extracted citations

Intrusion Detection System using Wrapper Approach

Ajit A Muzumdar
View 4 Excerpts
Highly Influenced

A short-term marginal price forecasting model based on ensemble learning

2017 International Conference on Progress in Informatics and Computing (PIC) • 2017
View 1 Excerpt

Artifical immune system using Genetic Algorithm and decision tree

2016 International Conference on Bio-engineering for Smart Technologies (BioSMART) • 2016

59 Citations

Citations per Year
Semantic Scholar estimates that this publication has 59 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 16 references


R. J. Henery
Machine Learning Neur al and Statistical Classification, 1994. • 1994
View 4 Excerpts
Highly Influenced

A hybrid network intrusion detection technique using random forests

First International Conference on Availability, Reliability and Security (ARES'06) • 2006
View 1 Excerpt

A novel adaptive intrusion detection system based on data mining

2005 International Conference on Machine Learning and Cybernetics • 2005

Design of Multiple-Level Hybrid Classifier for Intrusion Detection System

2005 IEEE Workshop on Machine Learning for Signal Processing • 2005
View 1 Excerpt

Exploiting efficient data mining techniques to enhance intrusion detection systems

IRI -2005 IEEE International Conference on Information Reuse and Integration, Conf, 2005. • 2005
View 1 Excerpt

Hierarchical Kohonenen net for anomaly detection in network security

IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) • 2005
View 2 Excerpts

Intrusion Detection Combining Multiple Decision Trees by Fuzzy logic

Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05) • 2005
View 1 Excerpt