Network Intrusion Detection System Using Decision Tree

Year : 2024 | Volume :12 | Issue : 02 | Page : –
By

Ashwini Garole

Yash Jadhav

Aman Patil

Harsh Deshpande

Komal Sawant

  1. Assistant Professor Computer science and engineering, Vishwaniket’s iMEET, Khalapur Maharashtra India
  2. Student Computer science and engineering (Artificial Intelligence and Machine Learning) Vishwaniketan’s iMEET Khalapur Maharashtra India
  3. Student Computer science and engineering (Artificial Intelligence and Machine Learning) Vishwaniketan’s iMEET Khalapur Maharashtra India
  4. Student Computer science and engineering (Artificial Intelligence and Machine Learning) Vishwaniketan’s iMEET Khalapur Maharashtra India
  5. Student Computer science and engineering (Artificial Intelligence and Machine Learning) Vishwaniketan’s iMEET Khalapur Maharashtra India

Abstract

This paper presents a novel approach to Network Intrusion Detection Systems (NIDS) using advanced decision tree algorithms to address critical limitations in existing IDS solutions. Traditional IDSs often struggle with high false positive and negative rates, lack of scalability, and poor interpretability. Our proposed IDS leverages decision trees to enhance detection accuracy, interpretability, and scalability, thereby improving network security. Decision trees are chosen for their adaptive learning capabilities, transparent decision-making processes, and efficiency in real-time threat detection. The system architecture includes key components such as a data collection module for capturing network traffic, a preprocessing module for data cleansing and feature extraction, and a decision tree classifier for classifying traffic into benign and malicious categories. The classifier’s performance is rigorously evaluated using metrics like accuracy, precision, recall, and F1-score, demonstrating superior performance with a 100% accuracy rate in model evaluation. The IDS’s effectiveness is compared against other machine learning techniques like K-Nearest Neighbors, Logistic Regression, and Naive Bayes, with decision trees showing the highest accuracy and efficiency. The paper also highlights future directions, including enhanced machine learning integration, behavioral analysis, cloud-based deployment, IoT security monitoring, and integration with threat hunting and incident response tools. This research underscores the potential of decision tree-based NIDS in providing robust, scalable, and comprehensible intrusion detection, crucial for protecting large-scale, dynamic network environments from diverse cyber threats.”

Keywords: Machine Learning Algorithms, Deep Learning, Classification Techniques, Decision, Tree, Logistic Regression, K-Nearest Neighbour (KNN), Artificial Neural Network (ANN), Supervised Learning, Anomaly Detection, Support Vector Machine, Feature Selection, Data Preprocessing, Accuracy, Precision, Real-Time Intrusion Detection.

[This article belongs to Journal Of Network security(jons)]

How to cite this article: Ashwini Garole, Yash Jadhav, Aman Patil, Harsh Deshpande, Komal Sawant. Network Intrusion Detection System Using Decision Tree. Journal Of Network security. 2024; 12(02):-.
How to cite this URL: Ashwini Garole, Yash Jadhav, Aman Patil, Harsh Deshpande, Komal Sawant. Network Intrusion Detection System Using Decision Tree. Journal Of Network security. 2024; 12(02):-. Available from: https://journals.stmjournals.com/jons/article=2024/view=152713

References

  1. Mukherjee B, Heberlein LT, Levitt KN. Network intrusion detection. IEEE network. 1994 May;8(3):26-41.
  2. Soofi AA, Awan A. Classification techniques in machine learning: applications and issues. J. Basic Appl. Sci. 2017 Aug 29;13(1):459-65.
  3. Shafiq M, Yu X, Laghari AA, Yao L, Karn NK, Abdessamia F. Network traffic classification techniques and comparative analysis using machine learning algorithms. In2016 2nd IEEE International Conference on Computer and Communications (ICCC) 2016 Oct 14 (pp. 2451-2455). IEEE.
  4. Sangkatsanee P, Wattanapongsakorn N, Charnsripinyo C. Practical real-time intrusion detection using machine learning approaches. Computer Communications. 2011 Dec 1;34(18):2227-35.
  5. Brownlee J. What is Deep Learning? – MachineLearningMastery.com. 2019. Available from: https://machinelearningmastery.com/what-is-deep-learning/ ‌
  6. Machine Learning Glossary — ML Glossary documentation. Readthedocs.io. 2022. Available from: https://ml-cheatsheet.readthedocs.io/en/latest/
  7. Conrad E, Misenar S, Feldman J. Chapter 7-domain 7: Security operations. Eleventh Hour CISSP R (Third Edition). Ed. by Eric Conrad, Seth Misenar, and Joshua Feldman. Third Edition. Syngress. 2017 Jan 1:145-83.
  8. Ojha Y. A Beginners guide to Machine Learning — Data Preprocessing. Medium. Medium; 2019. Available from: https://medium.com/@yogeshojha/data-preprocessing-75485c7188c4
  9. Dong B, Wang X. Comparison deep learning method to traditional methods using for network intrusion detection. In2016 8th IEEE international conference on communication software and networks (ICCSN) 2016 Jun 4 (pp. 581-585). IEEE.
  10. Machine Learning Algorithms: Types and Popular Algorithms. EDUCBA. 2019. Available from: https://www.educba.com/machine-learning-algorithms/
  11. Farnaaz N, Jabbar MA. Random forest modeling for network intrusion detection system. Procedia Computer Science. 2016 Jan 1;89:213-7.
  12. Ganapathy S, Yogesh P, Kannan A. An intelligent intrusion detection system for mobile ad-hoc networks using classification techniques. InAdvances in Power Electronics and Instrumentation Engineering: Second International Conference, PEIE 2011, Nagpur, Maharashtra, India, April 21-22, 2011. Proceedings 2011 (pp. 117-122). Springer Berlin Heidelberg.
  13. Harrison O. Machine learning basics with the k-nearest neighbors algorithm. Towards data science. 2018 Sep 11;11.
  14. Hussain J, Lalmuanawma S, Chhakchhuak L. A two-stage hybrid classification technique for network intrusion detection system. International journal of computational intelligence systems. 2016 Sep 2;9(5):863-875.
  15. Chapter 4: Decision Trees Algorithms – Deep Math Machine learning.ai – Medium. Medium. Deep Math Machine learning.ai; 2017. Available from: https://medium.com/deep-math-machine-learning-ai/chapter-4-decision-trees-algorithms-b93975f7a1f1 ‌
  16. Javaid, Ahmad et al. (2016). A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONET-ICS), pp. 21-26.
  17. Ahmim A, Maglaras L, Ferrag MA, Derdour M, Janicke H. A novel hierarchical intrusion detection system based on decision tree and rules-based models. In2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS) 2019 May 29 (pp. 228-233). IEEE.
  18. LeCun, Yann, Yoshua Bengio, and Geoffrey Hinton (2015). Deep learning. In: Nature 521.7553, pp. 436-444.
  19. Li, Wei (2004). Using genetic algorithm for network intrusion detection. In: Proceedings of the United States department of energy cyber security group 1, pp. 1-8.
  20. Taulli T. Deep Learning: What You Need To Know. Forbes. 2023 Oct 5. Available from: https://www.forbes.com/sites/tomtaulli/2020/03/27/deep-learning-what-you-need-to-know/

Regular Issue Subscription Review Article
Volume 12
Issue 02
Received May 21, 2024
Accepted June 23, 2024
Published July 2, 2024