Skip to main content

An Approximation Decision Entropy Based Decision Tree Algorithm and Its Application in Intrusion Detection

  • Conference paper
Rough Sets and Knowledge Technology (RSKT 2012)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7414))

Included in the following conference series:

Abstract

In this paper, we propose a novel decision tree algorithm DTADE within the framework of rough set theory, and apply DTADE to intrusion detection. We define a new information entropy model — approximation decision entropy (ADE) in rough sets, which combines the concept of conditional entropy in Shannon’s information theory and the concept of approximation accuracy in rough sets. In algorithm DTADE, ADE is adopted as the heuristic information for the selection of splitting attributes. Moreover, we present a method of decision tree pre-pruning based on the concept of knowledge entropy proposed by Düntsch and Gediga. Finally, the KDDCUP99 data set is used to verify the effectiveness of our algorithm in intrusion detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co., Fort Washington (1980)

    Google Scholar 

  2. Li, X.Y., Ye, N.: Decision tree classifiers for computer intrusion detection. Journal of Parallel and Distributed Computing Practices 4(2), 179–190 (2001)

    Google Scholar 

  3. Quinlan, R.: Induction of decision trees. Machine Learning 1(1), 81–106 (1986)

    Google Scholar 

  4. Quinlan, R.: C4.5: Programs for Machine Learning. Morgan Kaufmann (1993)

    Google Scholar 

  5. Shannon, C.E.: The mathematical theory of communication. Bell System Technical Journal 27(3-4), 373–423 (1948)

    MathSciNet  Google Scholar 

  6. Pawlak, Z.: Rough Sets. Int. J. Comput. Informat. Sci. 11(5), 341–356 (1982)

    Article  MathSciNet  MATH  Google Scholar 

  7. Düntsch, I., Gediga, G.: Uncertainty measures of rough set prediction. Artificial Intelligence 106, 109–137 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  8. Liang, J.Y., Shi, Z.Z.: The information entropy, rough entropy and knowledge granulation in rough set theory. Int. Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 12(1), 37–46 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  9. Miao, D.Q., Hu, G.R.: An Heuristic Algorithm of Knowledge Reduction. Computer Research and Development 36(6), 681–684 (1999)

    Google Scholar 

  10. Wang, G.Y., Yu, H., Yang, D.C.: Decision table reduction based on conditional information entropy. Chinese Journal of Computers 25(7), 759–766 (2002)

    MathSciNet  Google Scholar 

  11. Breslow, L.A., Aha, D.W.: Simplifying decision trees: a survey. Knowledge Engineering Review 12(1), 1–40 (1997)

    Article  Google Scholar 

  12. Dougherty, J., Kohavi, R., Sahami, M.: Supervised and Unsupervised Discretization of Continuous Features. In: Proc. of the 12th International Conference on Machine Learning, pp. 194–202. Morgan Kaufmann Publishers (1995)

    Google Scholar 

  13. Xu, Z.Y., Liu, Z.P., Yang, B.R., Song, W.: A Quick Attribute Reduction Algorithm with Complexity of max(O(|C| |U|),O(|C|2 |U/C|)). Chinese Journal of Computers 29(3), 391–399 (2006)

    Google Scholar 

  14. KDD Cup 99 Dataset (1999), http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  15. Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations. Morgan Kaufmann (2000)

    Google Scholar 

  16. Øhrn, A.: Rosetta Technical Reference Manual (1999), http://www.idi.ntnu.no/_aleks/rosetta

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhao, H., Jiang, F., Wang, C. (2012). An Approximation Decision Entropy Based Decision Tree Algorithm and Its Application in Intrusion Detection. In: Li, T., et al. Rough Sets and Knowledge Technology. RSKT 2012. Lecture Notes in Computer Science(), vol 7414. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31900-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31900-6_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31899-3

  • Online ISBN: 978-3-642-31900-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics