Welcome to Scholar Publishing Group

Machine Learning Theory and Practice, 2020, 1(2); doi: 10.38007/ML.2020.010203.

Malicious Network Attack and Intrusion Based on Decision Tree Algorithm

Author(s)

Yupeng Sang

Corresponding Author:
Yupeng Sang
Affiliation(s)

College of Information and Technology, Wenzhou Business College, Wenzhou 325035, China

Abstract

With the development of the network, the attack methods have become diverse. Malicious attackers can steal users' personal information by mining information. Therefore, this paper intends to study the role of decision tree algorithm in malicious network attacks and intrusions. The purpose is to improve the detection and defense of network attacks through this algorithm to ensure the information security of users. This paper mainly uses the method of experimental comparison and experimental construction to deeply explore the application of decision tree algorithm and PCA feature extraction in the system. The experimental results show that the intrusion accuracy based on decision tree algorithm can reach more than 90%, and the accuracy of PCA feature extraction can increase by 3%.

Keywords

Decision Tree Algorithm, Malicious Network, Network Attack, Network Intrusion

Cite This Paper

Yupeng Sang. Malicious Network Attack and Intrusion Based on Decision Tree Algorithm. Machine Learning Theory and Practice (2020), Vol. 1, Issue 2: 19-27. https://doi.org/10.38007/ML.2020.010203.

References

[1] Maman Abdurohman, Aji Gautama Putrada, Mustafa Mat Deris: A Robust Internet of Things-Based Aquarium Control System Using Decision Tree Regression Algorithm. IEEE Access 10: 56937-56951 (2020). 

[2] Hadeer Mahmoud, Mostafa Thabet, Mohamed Helmy Khafagy, Fatma A. Omara: Multiobjective Task Scheduling in Cloud Environment Using Decision Tree Algorithm. IEEE Access 10: 36140-36151 (2020). 

[3] Marziye Narangifard, Hooman Tahayori, Hamid Reza Ghaedsharaf, Mehrdad Tirandazian: Early Diagnosis of Coronary Artery Disease by SVM, Decision Tree Algorithms and Ensemble Methods. Int. J. Medical Eng. Informatics 14(4): 295-305 (2020). 

[4] Chandrashekhar Azad, Bharat Bhushan, Rohit Sharma, Achyut Shankar, Krishna Kant Singh, Aditya Khamparia: Prediction Model Using SMOTE, Genetic Algorithm and Decision Tree (PMSGD) for Classification of Diabetes Mellitus. Multim. Syst. 28(4): 1289-1307 (2020). 

[5] Leidiane C. M. M. Fontoura, Hertz Wilton De Castro Lins, Arthur S. Bertuleza, Adaildo G. D'Assunção, Alfredo Gomes Neto: Synthesis of Multiband Frequency Selective Surfaces Using Machine Learning with the Decision Tree Algorithm. IEEE Access 9: 85785-85794 (2020). 

[6] Kumpol Saengtabtim, Natt Leelawat, Jing Tang, Wanit Treeranurat, Narunporn Wisittiwong, Anawat Suppasri, Kwanchai Pakoksung, Fumihiko Imamura, Noriyuki Takahashi, Ingrid Charvet: Predictive Analysis of the Building Damage From the 2011 Great East Japan Tsunami Using Decision Tree Classification Related Algorithms. IEEE Access 9: 31065-31077 (2020). 

[7] Ferdinand Bollwein, Stephan Westphal: A Branch & Bound Algorithm to Determine Optimal Bivariate Splits for Oblique Decision Tree Induction. Appl. Intell. 51(10): 7552-7572 (2020). 

[8] Firoozeh Karimi, Selima Sultana, Ali Shirzadi Babakan, Shan Suthaharan: Urban Expansion Modeling Using an Enhanced Decision Tree Algorithm. GeoInformatica 25(4): 715-731 (2019). https://doi.org/10.1007/s10707-019-00377-8

[9] Muhamad Hasbullah Mohd Razali, Rizauddin Saian, Yap Bee Wah, Ku Ruhana Ku-Mahamud: An Improved ACO-based Decision Tree Algorithm for Imbalanced Datasets. Int. J. Math. Model. Numer. Optimisation 11(4): 412-427 (2020). 

[10] Rajendra Mahla, Baseem Khan, Om Prakash Mahela, Anup Singh: Recognition of Complex and Multiple Power Quality Disturbances Using Wavelet Packet-Based Fast Kurtogram and Ruled Decision Tree Algorithm. Int. J. Model. Simul. Sci. Comput. 12(5): 2150032:1-2150032:23 (2020). https://doi.org/10.1142/S179396232150032X

[11] Matheus Guedes Vilas Boas, Haroldo Gambini Santos, Luiz Henrique de Campos Merschmann, Greet Vanden Berghe: Optimal Decision Trees for the Algorithm Selection Problem: Integer Programming Based Approaches. Int. Trans. Oper. Res. 28(5): 2759-2781 (2020). https://doi.org/10.1111/itor.12724

[12] Vinay Arora, Rohan Singh Leekha, Inderveer Chana: An Efficacy of Spectral Features with Boosted Decision Tree Algorithm for Automatic Heart Sound Classification. J. Medical Imaging Health Informatics 11(2): 513-528 (2020). 

[13] Neda Mehdizadeh, Nazbanoo Farzaneh: An Evidence Theory based Approach in Detecting Malicious Controller in the Multi-Controller Software-defined Internet of Things Network. Ad Hoc Sens. Wirel. Networks 51(4): 235-260 (2020).

[14] Chiara Ravazzi, Francesco Malandrino, Fabrizio Dabbene: Towards Proactive Moderation of Malicious Content via Bot Detection in Fringe Social Networks. IEEE Control. Syst. Lett. 6: 2960-2965 (2020). 

[15] Scaria Alex, T. Dhiliphan Rajkumar: An Approach for Malicious JavaScript Detection Using Adaptive Taylor Harris Hawks Optimization-Based Deep Convolutional Neural Network. Int. J. Distributed Syst. Technol. 13(5): 1-20 (2020). https://doi.org/10.4018/IJDST.300354

[16] Sivaraman Eswaran, Vakula Rani, Daniel Dominic, Jayabrabu Ramakrishnan, Sadhana Selvakumar: An Enhanced Network Intrusion Detection System for Malicious Crawler Detection and Security Event Correlations in Ubiquitous Banking Infrastructure. Int. J. Pervasive Comput. Commun. 18(1): 59-78 (2020). 

[17] Mohit Kumar, Priya Mukherjee, Kavita Verma, Sahil Verma, Danda B. Rawat: Improved Deep Convolutional Neural Network Based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks. IEEE Trans. Netw. Sci. Eng. 9(5): 3272-3281 (2020). 

[18] V. Brinda, M. Bhuvaneshwari: Identifying Malicious Secondary User Presence within Primary User Range in Cognitive Radio Networks. Wirel. Pers. Commun. 122(3): 2687-2699 (2020).