Paper Title:
An Effective Intrusion Detection Model Based on Random Forest and Neural Networks
  Abstract

This document explains and demonstrates how to prepare your camera-ready manuscript for Trans Tech Publications. The best is to read these instructions and follow the outline of this text. The text area for your manuscript must be 17 cm wide and 25 cm high (6.7 and 9.8 inches, resp.). Do not place any text outside this area. Use good quality, white paper of approximately 21 x 29 cm or 8 x 11 inches (please do not change the document setting from A4 to letter). Your manuscript will be reduced by approximately 20% by the publisher. Please keep this in mind when designing your figures and tables etc.Intrusion detection is a very important research domain in network security. Current intrusion detection systems (IDS) especially NIDS (Network Intrusion Detection System) examine all data features to detect intrusions. Also, many machine learning and data mining methods are utilized to fulfill intrusion detection tasks. This paper proposes an effective intrusion detection model that is computationally efficient and effective based on Random Forest based feature selection approach and Neural Networks (NN) model. We firstly utilize random forest method to select the most important features to eliminate the insignificant and/or useless inputs leads to a simplification of the problem, in order to faster and more accurate detection; Secondly, classic NN model is used to learn and detect intrusions using the selected important features. Experimental results on the well-known KDD 1999 dataset demonstrate the proposed hybrid model is actually effective.

  Info
Periodical
Edited by
Yanwen Wu
Pages
308-313
DOI
10.4028/www.scientific.net/AMR.267.308
Citation
S. H. Zhong, H. J. Huang, A. B. Chen, "An Effective Intrusion Detection Model Based on Random Forest and Neural Networks", Advanced Materials Research, Vol. 267, pp. 308-313, 2011
Online since
June 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Jie Yu, Guo Xiang Yao, Wei Wei Zhang
Abstract:As the surging development of the information technology, Intrusion Detection System has been devised for the safety of computer network....
1751
Authors: Jie Liang, Jian Wei Sun
Abstract:Application layer vulnerabilities represent a substantial portion of the security exposures of computer networks. In this paper, we explore...
1253
Authors: Chi Xu, Jin Chen
Chapter 8: Nanomaterials and Nanomanufacturing
Abstract:This paper describes in Using Self-Organizing Map (SOM) neural networks and its auto-clustering ability to study intrusion detection. The...
1479
Authors: Bo Chen, Yu Le Deng, Tie Ming Chen
Chapter 10: Applied Computing and Information Technologies
Abstract:The aim of dimensionality reduction is to construct a low-dimensional representation of high dimensional input data in such a way, that...
2412
Authors: Suppatoomsin Chompoo, Srikaew Arthit
Chapter 6: Techniques of Measuring and Modeling
Abstract:This paper presents a hybrid method for vehicle detection from CCTV captured image. In order to overwhelm such complex details of the color...
412