Publication:
Intrusion Detection Model Based on TF.IDF and C4.5 Algorithms

cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.orcid#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.orcid#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtualsource.department0330422c-6dad-4f8c-aa94-4a191880a26a
cris.virtualsource.department56d1e19e-c9ee-4637-b0e6-5c3f4281de97
cris.virtualsource.orcid0330422c-6dad-4f8c-aa94-4a191880a26a
cris.virtualsource.orcid56d1e19e-c9ee-4637-b0e6-5c3f4281de97
dc.contributor.authorKhaldoon AWADH
dc.contributor.authorAyhan AKBAŞ
dc.date.accessioned2024-05-24T12:25:55Z
dc.date.available2024-05-24T12:25:55Z
dc.date.issued2021-12-01
dc.description.abstract<jats:p xml:lang="en">In recent years, the use of machine learning and data mining technologies has drawn researchers’ attention to new ways to improve the performance of Intrusion Detection Systems (IDS). These techniques have proven to be an effective method in distinguishing malicious network packets. One of the most challenging problems that researchers are faced with is the transformation of data into a form that can be handled effectively by Machine Learning Algorithms (MLA). In this paper, we present an IDS model based on the decision tree C4.5 algorithm with transforming simulated UNSW-NB15 dataset as a pre-processing operation. Our model uses Term Frequency.Inverse Document Frequency (TF.IDF) to convert data types to an acceptable and efficient form for machine learning to achieve high detection performance. The model has been tested with randomly selected 250000 records of the UNSW-NB15 dataset. Selected records have been grouped into various segment sizes, like 50, 500, 1000, and 5000 items. Each segment has been, further, grouped into two subsets of multi and binary class datasets. The performance of the Decision Tree C4.5 algorithm with Multilayer Perceptron (MLP) and Naive Bayes (NB) has been compared in Weka software. Our proposed method significantly has improved the accuracy of classifiers and decreased incorrectly detected instances. The increase in accuracy reflects the efficiency of transforming the dataset with TF.IDF of various segment sizes.</jats:p>
dc.identifier.doi10.2339/politeknik.693221
dc.identifier.urihttps://acikarsiv.thk.edu.tr/handle/123456789/287
dc.publisherPoliteknik Dergisi
dc.relation.ispartofPoliteknik Dergisi
dc.relation.issn2147-9429
dc.titleIntrusion Detection Model Based on TF.IDF and C4.5 Algorithms
dc.typejournal-article
dspace.entity.typePublication
oaire.citation.issue4
oaire.citation.volume24

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
10.2339-politeknik.693221-1198940.pdf
Size:
546.86 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: