Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

A Decision Tree Based Intrusion Detection System for Identification of Malicious Web Attacks

Version 1 : Received: 7 July 2020 / Approved: 9 July 2020 / Online: 9 July 2020 (12:23:29 CEST)

How to cite: Bandyopadhyay, S.; Chowdhury, R.; Banerjee, P.; Dey, S.D.; Saha, B. A Decision Tree Based Intrusion Detection System for Identification of Malicious Web Attacks. Preprints 2020, 2020070191 (doi: 10.20944/preprints202007.0191.v1). Bandyopadhyay, S.; Chowdhury, R.; Banerjee, P.; Dey, S.D.; Saha, B. A Decision Tree Based Intrusion Detection System for Identification of Malicious Web Attacks. Preprints 2020, 2020070191 (doi: 10.20944/preprints202007.0191.v1).

Abstract

. In today’s world, cyber attack is one of the major issues concerning the organizations that deal with technologies like cloud computing, big data, IoT etc. In the area of cyber security, intrusion detection system (IDS) plays a crucial role to identify suspicious activities in the network traffic. Over the past few years, a lot of research has been done in this area but in the current scenario, network attacks are diversifying in both volume and variety. In this regard, this research article proposes a novel IDS where a combination of information gain and decision tree algorithm has been used for the purpose of dimension reduction and classification. For experimental purpose the NSL-KDD dataset has been used. Initially out of 41 features present in the dataset only 5 high information gain valued features are selected for classification purpose. The applicability of the selected features are evaluated through various machine learning based algorithms. The experimental result shows that the decision tree based algorithm records highest recognition accuracy among all the classifiers. Based on the initial classification result a novel methodology based on decision tree has been further developed which is capable of identifying multiple attacks by analyzing the packets of various transactions in real time.

Subject Areas

Intrusion Detection System; NSL-KDD Dataset; One Hot Encoding; Information Gain; Decision Tree

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our diversity statement.

Leave a public comment
Send a private comment to the author(s)
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.