Corpus ID: 6761475

Detection & Classification of Internet Intrusion Based on the Combination of Random Forest and Naïve Bayes

@inproceedings{Chihab2013DetectionC,
  title={Detection \& Classification of Internet Intrusion Based on the Combination of Random Forest and Na{\"i}ve Bayes},
  author={Younes Chihab and Abdelah Ait and Ouhman and Mohammed Erritali and Bouabid El Ouahidi},
  year={2013}
}
The Use of internet renders a network packets susceptible to attacks ranging from passive eavesdropping to active impersonation, message replay and message distortion. There is no clear description as to what packets can be considered normal or abnormal. If the intrusions are not detected at the appropriate level, the loss of system may sometimes be unimaginable. Although many intrusion detection system (IDS) methods are used to detect the existing types of attacks within the network… Expand
Hybrid Intrusion Detection System using K-Means and Random Tree Algorithms
  • Yi Yi Aung, M. Min
  • Computer Science
  • 2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
  • 2018
TLDR
The accuracy of intrusion detection with the complexity of time is shown when comparing the hybrid detection method and the only detection method using the K-means and Random Tree algorithms. Expand
An analysis of random forest algorithm based network intrusion detection system
  • Yi Yi Aung, M. Min
  • Computer Science
  • 2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
  • 2017
TLDR
Experimental results show that hybrid methods can support suitable detection rates and lower model training time than using single algorithm, and that cascading based approaches of several algorithms are much better performance than an individual algorithm. Expand
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
TLDR
According to the result of testing many procedure of data mining on KDD CUP 99, no individual procedure can reveal all attack class, with high accuracy and without false alerts, it is concluded that, various procedures should be utilized to handle several of network attacks. Expand
Mining a Ubiquitous Time and Attendance Schema Using Random Forests for Intrusion Detection
Abstract Our case study used Random Forest to measure the intrusion of unauthorized personnel to certain designated areas of the organization. Intrusions happening at high security areas could costExpand

References

SHOWING 1-10 OF 15 REFERENCES
Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols
  • F. Anjum, D. Subhadrabandhu, S. Sarkar
  • Computer Science
  • 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484)
  • 2003
TLDR
The signature detection technique is considered and the ability of various routing protocols to facilitate intrusion detection when the attack signatures are completely known is investigated, showing that reactive ad-hoc routing protocols suffer from a serious problem due to which it might be difficult to detect intrusions even in the absence of mobility. Expand
WIRELESS NODE BEHAVIOR BASED INTRUSION DETECTION USING GENETIC ALGORITHM
Ad-hoc networks are facing increased number of security threats in recent years. Despite numerous technological advancements in wireless network security, it is still very difficult to protect theExpand
A neural network component for an intrusion detection system
TLDR
The authors feel the need for alternative techniques and introduce the use of a neural network component for modeling user's behavior as a component for the intrusion detection system, and suggest the time series approach to add broader scope to the model. Expand
Comparative Analysis of Serial Decision Tree Classification Algorithms
Classification of data objects based on a predefined knowledge of the objects is a data mining and knowledge management technique used in grouping similar data objects together. It can be defined asExpand
Induction of Decision Trees
TLDR
This paper summarizes an approach to synthesizing decision trees that has been used in a variety of systems, and it describes one such system, ID3, in detail, which is described in detail. Expand
Extraction automatique des diagnostics à partir des comptes rendus médicaux textuels
Pour evaluer des actions visant a ameliorer la sante publique, les analyses s'appuient majoritairement sur les diagnostics des patients hospitalises. Si celui-ci ne pose pas de probleme au praticien,Expand
International Journal of Engineering and Technology (IJET)
  • International Journal of Engineering and Technology (IJET)
  • 2013
Comparison between ID3 and C4.5 in Contrast to IDS
  • VSRD International Journal of CS & IT Vol
  • 2012
Concepts d'exploration de données et des techniques [M] X. Meng, Pékin: Appuyez sur l'industrie mécanique
  • Younes Chihab et.al / International Journal of Engineering and Technology (IJET) ISSN
  • 2005
Kamber Concepts d'exploration de données et des techniques [M] X. Meng, Pékin: Appuyez sur l'industrie mécanique
  • Kamber Concepts d'exploration de données et des techniques [M] X. Meng, Pékin: Appuyez sur l'industrie mécanique
  • 2005
...
1
2
...