• DocumentCode
    840001
  • Title

    Random-Forests-Based Network Intrusion Detection Systems

  • Author

    Zhang, Jiong ; Zulkernine, Mohammad ; Haque, Anwar

  • Author_Institution
    TELUS, Toronto, ON
  • Volume
    38
  • Issue
    5
  • fYear
    2008
  • Firstpage
    649
  • Lastpage
    659
  • Abstract
    Prevention of security breaches completely using the existing security technologies is unrealistic. As a result, intrusion detection is an important component in network security. However, many current intrusion detection systems (IDSs) are rule-based systems, which have limitations to detect novel intrusions. Moreover, encoding rules is time-consuming and highly depends on the knowledge of known intrusions. Therefore, we propose new systematic frameworks that apply a data mining algorithm called random forests in misuse, anomaly, and hybrid-network-based IDSs. In misuse detection, patterns of intrusions are built automatically by the random forests algorithm over training data. After that, intrusions are detected by matching network activities against the patterns. In anomaly detection, novel intrusions are detected by the outlier detection mechanism of the random forests algorithm. After building the patterns of network services by the random forests algorithm, outliers related to the patterns are determined by the outlier detection algorithm. The hybrid detection system improves the detection performance by combining the advantages of the misuse and anomaly detection. We evaluate our approaches over the knowledge discovery and data mining 1999 (KDDpsila99) dataset. The experimental results demonstrate that the performance provided by the proposed misuse approach is better than the best KDDpsila99 result; compared to other reported unsupervised anomaly detection approaches, our anomaly detection approach achieves higher detection rate when the false positive rate is low; and the presented hybrid system can improve the overall performance of the aforementioned IDSs.
  • Keywords
    computer networks; data mining; knowledge based systems; security of data; IDSs; NIDSs; anomaly detection; computer network security; data mining algorithm; intrusion detection systems; knowledge discovery; misuse detection; network activities; network intrusion detection systems; outlier detection mechanism; random forests algorithm; rule-based systems; security breaches; Cryptography; Data mining; Data security; Detection algorithms; Encoding; Information security; Intrusion detection; Knowledge based systems; Pattern matching; Training data; Computer network security; data mining; intrusion detection; random forests;
  • fLanguage
    English
  • Journal_Title
    Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1094-6977
  • Type

    jour

  • DOI
    10.1109/TSMCC.2008.923876
  • Filename
    4603103