An Improved Perceptron Tree Learning Model Based Intrusion Detection Approach

作者: Qinzhen Xu , Zhimao Bai , Luxi Yang

DOI: 10.1109/AICI.2009.176

关键词: PerceptronArtificial intelligenceFeature extractionIntrusion detection systemDecision treeMachine learningPattern recognitionComputer scienceTree (data structure)Gray box testingArtificial neural networkBinary tree

摘要: This paper dedicates to develop an improved perceptron tree (PT) learning model based intrusion detection approach. The binary structure of a PT enables the divide problem into sub-problems and solve them in decreased complexity different levels. expert neural networks (ENNs) embedded internal nodes can be simplified by limiting number inputs hidden neurons. potential advantage is that trained actually “gray box” since each ENN interpreted explicit rules easily. However, whole likely high complex, i.e., probably composed large nodes. In this case, disjunctive description learned extracted from such too complex understand. generalization ability approach may depressed as well. view situation, needs fine pruned. experimental results demonstrate proposed achieve competitive accuracy well refined structure.

参考文章(15)
Qiangfu Zhao, Evolutionary design of neural network tree-integration of decision tree, neural network and GA congress on evolutionary computation. ,vol. 1, pp. 240- 244 ,(2001) , 10.1109/CEC.2001.934395
Rachid Beghdad, Critical study of neural networks in detecting intrusions Computers & Security. ,vol. 27, pp. 168- 175 ,(2008) , 10.1016/J.COSE.2008.06.001
Guy Helmer, Johnny Wong, Subhasri Madaka, Anomalous intrusion detection system for hostile Java applets Journal of Systems and Software. ,vol. 55, pp. 273- 286 ,(2001) , 10.1016/S0164-1212(00)00076-5
Cheng Xiang, Png Chin Yong, Lim Swee Meng, Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees Pattern Recognition Letters. ,vol. 29, pp. 918- 924 ,(2008) , 10.1016/J.PATREC.2008.01.008
Joong-Hee Lee, Jong-Hyouk Lee, Seon-Gyoung Sohn, Jong-Ho Ryu, Tai-Myoung Chung, Effective Value of Decision Tree with KDD 99 Intrusion Detection Datasets for Intrusion Detection System international conference on advanced communication technology. ,vol. 2, pp. 1170- 1175 ,(2008) , 10.1109/ICACT.2008.4493974
Zhi-Hua Zhou, Zhao-Qian Chen, Hybrid decision tree Knowledge Based Systems. ,vol. 15, pp. 515- 528 ,(2002) , 10.1016/S0950-7051(02)00038-2
Qinzhen Xu, Pinzheng Zhang, Wenjiang Pei, Luxi Yang, Zhenya He, An Automatic Facial Expression Recognition Approach Based on Confusion-Crossed Support Vector Machine Tree international conference on acoustics, speech, and signal processing. ,vol. 1, pp. 625- 628 ,(2007) , 10.1109/ICASSP.2007.365985
Guisong Liu, Xiaobin Wang, An integrated intrusion detection system by using multiple neural networks ieee conference on cybernetics and intelligent systems. pp. 22- 27 ,(2008) , 10.1109/ICCIS.2008.4670871
J. Ross Quinlan, C4.5: Programs for Machine Learning ,(1992)
S.T. Sarasamma, Q.A. Zhu, J. Huff, Hierarchical Kohonenen net for anomaly detection in network security systems man and cybernetics. ,vol. 35, pp. 302- 312 ,(2005) , 10.1109/TSMCB.2005.843274