Detailed Information

Cited 0 time in webofscience Cited 1 time in scopus
Metadata Downloads

Evaluation of black-marker and bilateral classification with J48 decision tree in anomaly based intrusion detection system

Full metadata record
DC Field Value Language
dc.contributor.authorChew, Yee Jian-
dc.contributor.authorOoi, Shih Yin-
dc.contributor.authorWong, Kok-Seng-
dc.contributor.authorPang, Ying Han-
dc.contributor.authorHwang, Seong Oun-
dc.date.available2020-07-10T04:40:32Z-
dc.date.created2020-07-06-
dc.date.issued2018-
dc.identifier.issn1064-1246-
dc.identifier.urihttps://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/4751-
dc.description.abstractAnomaly-based intrusion detection system (IDS) is gaining wide attention from the research community, due to its robustness in detecting and profiling the newly discovered network attacks. Unlike signature-based IDS which solely relying on a set of pre-defined rules through some massive human efforts, anomaly-based IDS utilises the collected network traces in building its own classification model. The classification model can optimised when a large set of network traces is available. The ideal way of pooling the network traces is through database sharing. However, not many organisations are willing to release or share their network databases due to some privacy concerns, i.e. to avoid some kinds of internet traffic behaviour profiling. To address this issue, a number of anonymisation techniques was developed. The main usage of anonymisation techniques is to conceal the potentially sensitive information in the network traces. However, it is also important to ensure the anonymisation techniques are not over abusing the performances of IDS. To do so, the convention way is by using a Snort IDS to measure the number of alarms generated before-and-after an anonymisation solution is applied. However, this approach is infeasible for Anomaly-Based IDS. Thus, an alternative way of using machine learning approach is proposed and explored in this manuscript. Instead of manual evaluation through the usage of Snort IDS, a J48 decision tree (Weka package of C4.5 algorithm) is used. In this manuscript, two anonymisation techniques, (1) black-marker, and (2) bilateral classification are used to hide the value of port numbers; and their before-and-after performances are evaluated through a J48 decision tree.-
dc.language영어-
dc.language.isoen-
dc.publisherIOS PRESS-
dc.titleEvaluation of black-marker and bilateral classification with J48 decision tree in anomaly based intrusion detection system-
dc.typeArticle-
dc.contributor.affiliatedAuthorHwang, Seong Oun-
dc.identifier.doi10.3233/JIFS-169834-
dc.identifier.scopusid2-s2.0-85059485433-
dc.identifier.wosid000459214900013-
dc.identifier.bibliographicCitationJOURNAL OF INTELLIGENT & FUZZY SYSTEMS, v.35, no.6, pp.5927 - 5937-
dc.relation.isPartOfJOURNAL OF INTELLIGENT & FUZZY SYSTEMS-
dc.citation.titleJOURNAL OF INTELLIGENT & FUZZY SYSTEMS-
dc.citation.volume35-
dc.citation.number6-
dc.citation.startPage5927-
dc.citation.endPage5937-
dc.type.rimsART-
dc.type.docTypeArticle; Proceedings Paper-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.subject.keywordAuthorNetwork packet traces-
dc.subject.keywordAuthorintrusion detection system (IDS)-
dc.subject.keywordAuthorJ48 decision tree-
dc.subject.keywordAuthoranonymisation-
dc.subject.keywordAuthorblack-marker-
dc.subject.keywordAuthorbilateral classification-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of Computer and Information Communications Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE