Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.7.6

Hybridized Decision Tree methods for Detecting Generic Attack on Ciphertext  

Alsariera, Yazan Ahmad (Department of Computer Science, Collage of Science, Northern Border University)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.7, 2021 , pp. 56-62 More about this Journal
Abstract
The surge in generic attacks execution against cipher text on the computer network has led to the continuous advancement of the mechanisms to protect information integrity and confidentiality. The implementation of explicit decision tree machine learning algorithm is reported to accurately classifier generic attacks better than some multi-classification algorithms as the multi-classification method suffers from detection oversight. However, there is a need to improve the accuracy and reduce the false alarm rate. Therefore, this study aims to improve generic attack classification by implementing two hybridized decision tree algorithms namely Naïve Bayes Decision tree (NBTree) and Logistic Model tree (LMT). The proposed hybridized methods were developed using the 10-fold cross-validation technique to avoid overfitting. The generic attack detector produced a 99.8% accuracy, an FPR score of 0.002 and an MCC score of 0.995. The performances of the proposed methods were better than the existing decision tree method. Similarly, the proposed method outperformed multi-classification methods for detecting generic attacks. Hence, it is recommended to implement hybridized decision tree method for detecting generic attacks on a computer network.
Keywords
Generic attack; machine learning; hybridized decision tree; cybersecurity;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. V. Elijah, A. Abdullah, N. Z. JhanJhi, M. Supramaniam, B. A. O, and O. Balogun Abdullateef, "Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: An empirical study," Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 9, pp. 520-528, 2019.
2 N. Moustafa and J. Slay, "UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in 2015 Military Communications and Information Systems Conference, MilCIS 2015 - Proceedings IEEE, 2015, pp. 1-6.
3 T. D. Pham, D. T. Bui, K. Yoshino, and N. N. Le, "Optimized rule-based logistic model tree algorithm for mapping mangrove species using ALOS PALSAR imagery and GIS in the tropical region," Environ. Earth Sci., vol. 77, no. 5, p. 159, 2018.   DOI
4 Y. A. Alsariera, V. E. Adeyemo, A. O. Balogun, and A. K. Alazzawi, "AI Meta-Learners and Extra-Trees Algorithm for the Detection of Phishing Websites," IEEE Access, vol. 8, no. August, pp. 142532-142542, 2020.   DOI
5 R. Kohavi, "Scaling Up the Accuracy of Naive-Bayes Classi ers : a Decision-Tree Hybrid Accuracy Scale-Up : the Learning," Kdd, vol. 96, pp. 202-207, 1996.
6 Y. A. Alsariera, A. V. Elijah, and A. O. Balogun, "Phishing Website Detection: Forest by Penalizing Attributes Algorithm and Its Enhanced Variations," Arab. J. Sci. Eng., vol. 45, no. 12, pp. 10459-10470, 2020.   DOI
7 Y. A. Alsariera, "Detecting Generic Network Intrusion Attacks using Tree-based Machine Learning Methods," Inter. J. of Adv. Comp. & Science and Applications., vol. 12, no. 2, pp. 597-603, 2021.
8 Y. A. Alsariera, "Detecting Generic Network Intrusion Attacks using Tree-based Machine Learning Methods," Int. J. Adv. Comput. Sci. Appl., vol. 12, no. 2, pp. 597-603, 2021.
9 J. Li, Z. Zhao, R. Li, and H. Zhang, "AI-based two-stage intrusion detection for software defined IoT networks," IEEE Internet Things J., vol. 6, no. 2, pp. 2093-2102, 2019.   DOI
10 S. Anindita, S. R. Chatterjee, and M. Chakraborty, "Role of Cryptography in Network Security," in The "Essence" of Network Security: An End-to-End Panorama, 2021, pp. 103-143.
11 A. Alsadhan et al., "Locally weighted classifiers for detection of neighbor discovery protocol distributed denial-of-service and replayed attacks," Trans. Emerg. Telecommun. Technol., no. June, pp. 1-15, 2019.
12 Y. Xin et al., "Machine Learning and Deep Learning Methods for Cybersecurity," IEEE Access, vol. 6, pp. 35365-35381, 2018.   DOI
13 S. Lee and C. H. Jun, "Fast incremental learning of logistic model tree using least angle regression," Expert Syst. Appl., vol. 97, pp. 137-145, 2018.   DOI
14 M. Nawir, A. Amir, N. Yaakob, and O. N. G. B. I. Lynn, "Multi-Classification of Unsw-Nb15 Dataset for Network Anomaly Detection System," J. Theor. Appl. Inf. Technol., vol. 96, no. 15, pp. 5094-5104, 2018.
15 A. Verma and V. Ranga, "Machine Learning Based Intrusion Detection Systems for IoT Applications," Wirel. Pers. Commun., vol. 111, no. 4, pp. 2287-2310, 2020.   DOI
16 V. Kumar, D. Sinha, A. K. Das, S. C. Pandey, and R. T. Goswami, "An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset," Cluster Comput., vol. 23, no. 2, pp. 1397-1418, 2020.   DOI
17 O. O. Olasehinde, "A Stacked Ensemble Intrusion Detection Approach for the Protection of Information System," Int. J. Infomation Secur. Res., vol. 10, no. 1, pp. 910-923, 2020.   DOI
18 T. Hamed, J. B. Ernst, and S. C. Kremer, "A Survey and Taxonomy of Classifiers of Intrusion Detection Systems," 2018, pp. 21-39.
19 F. Feng, X. Liu, B. Yong, R. Zhou, and Q. Zhou, "Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device," Ad Hoc Networks, vol. 84, pp. 82-89, 2019.   DOI
20 T. Salman, D. Bhamare, A. Erbad, R. Jain, and M. Samaka, "Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments," Proc. - 4th IEEE Int. Conf. Cyber Secur. Cloud Comput. CSCloud 2017 3rd IEEE Int. Conf. Scalable Smart Cloud, SSC 2017, pp. 97-103, 2017.
21 N. Landwehr, M. Hall, and E. Frank, "Logistic model trees," Mach. Learn., vol. 59, no. 1-2, pp. 161-205, 2005.   DOI