Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Evaluation of black-marker and bilateral classification with J48 decision tree in anomaly based intrusion detection system

Full metadata record
DC Field Value Language
dc.contributor.authorChew, Yee Jian-
dc.contributor.authorOoi, Shih Yin-
dc.contributor.authorWong, Kok-Seng-
dc.contributor.authorPang, Ying Han-
dc.contributor.authorHwang, Seong Oun-
dc.date.available2020-10-20T06:45:03Z-
dc.date.created2020-06-10-
dc.date.issued2018-12-
dc.identifier.issn1064-1246-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/78610-
dc.description.abstractAnomaly-based intrusion detection system (IDS) is gaining wide attention from the research community, due to its robustness in detecting and profiling the newly discovered network attacks. Unlike signature-based IDS which solely relying on a set of pre-defined rules through some massive human efforts, anomaly-based IDS utilises the collected network traces in building its own classification model. The classification model can optimised when a large set of network traces is available. The ideal way of pooling the network traces is through database sharing. However, not many organisations are willing to release or share their network databases due to some privacy concerns, i.e. to avoid some kinds of internet traffic behaviour profiling. To address this issue, a number of anonymisation techniques was developed. The main usage of anonymisation techniques is to conceal the potentially sensitive information in the network traces. However, it is also important to ensure the anonymisation techniques are not over abusing the performances of IDS. To do so, the convention way is by using a Snort IDS to measure the number of alarms generated before-and-after an anonymisation solution is applied. However, this approach is infeasible for Anomaly-Based IDS. Thus, an alternative way of using machine learning approach is proposed and explored in this manuscript. Instead of manual evaluation through the usage of Snort IDS, a J48 decision tree (Weka package of C4.5 algorithm) is used. In this manuscript, two anonymisation techniques, (1) black-marker, and (2) bilateral classification are used to hide the value of port numbers; and their before-and-after performances are evaluated through a J48 decision tree.-
dc.language영어-
dc.language.isoen-
dc.publisherIOS PRESS-
dc.relation.isPartOfJOURNAL OF INTELLIGENT & FUZZY SYSTEMS-
dc.titleEvaluation of black-marker and bilateral classification with J48 decision tree in anomaly based intrusion detection system-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000459214900013-
dc.identifier.doi10.3233/JIFS-169834-
dc.identifier.bibliographicCitationJOURNAL OF INTELLIGENT & FUZZY SYSTEMS, v.35, no.6, pp.5927 - 5937-
dc.description.isOpenAccessN-
dc.citation.endPage5937-
dc.citation.startPage5927-
dc.citation.titleJOURNAL OF INTELLIGENT & FUZZY SYSTEMS-
dc.citation.volume35-
dc.citation.number6-
dc.contributor.affiliatedAuthorHwang, Seong Oun-
dc.type.docTypeArticle; Proceedings Paper-
dc.subject.keywordAuthorNetwork packet traces-
dc.subject.keywordAuthorintrusion detection system (IDS)-
dc.subject.keywordAuthorJ48 decision tree-
dc.subject.keywordAuthoranonymisation-
dc.subject.keywordAuthorblack-marker-
dc.subject.keywordAuthorbilateral classification-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hwang, Seong Oun photo

Hwang, Seong Oun
College of IT Convergence (컴퓨터공학부(컴퓨터공학전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE