IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v10y2022i23p4460-d984909.html
   My bibliography  Save this article

Three-Branch Random Forest Intrusion Detection Model

Author

Listed:
  • Chunying Zhang

    (College of Science, North China University of Science and Technology, Tangshan 063210, China
    Key Laboratory of Data Science and Application of Hebei Province, Tangshan 063210, China)

  • Wenjie Wang

    (College of Science, North China University of Science and Technology, Tangshan 063210, China)

  • Lu Liu

    (College of Science, North China University of Science and Technology, Tangshan 063210, China
    Key Laboratory of Data Science and Application of Hebei Province, Tangshan 063210, China)

  • Jing Ren

    (College of Science, North China University of Science and Technology, Tangshan 063210, China)

  • Liya Wang

    (College of Science, North China University of Science and Technology, Tangshan 063210, China
    Key Laboratory of Data Science and Application of Hebei Province, Tangshan 063210, China)

Abstract

Network intrusion detection has the problems of large amounts of data, numerous attributes, and different levels of importance for each attribute in detection. However, in random forests, the detection results have large deviations due to the random selection of attributes. Therefore, aiming at the current problems, considering increasing the probability of essential features being selected, a network intrusion detection model based on three-way selected random forest (IDTSRF) is proposed, which integrates three decision branches and random forest. Firstly, according to the characteristics of attributes, it is proposed to evaluate the importance of attributes by combining decision boundary entropy, and using three decision rules to divide attributes; secondly, to keep the randomness of attributes, three attribute random selection rules based on attribute randomness are established, and a certain number of attributes are randomly selected from three candidate fields according to conditions; finally, the training sample set is formed by using autonomous sampling method to select samples and combining three randomly selected attribute sets randomly, and multiple decision trees are trained to form a random forest. The experimental results show that the model has high precision and recall.

Suggested Citation

  • Chunying Zhang & Wenjie Wang & Lu Liu & Jing Ren & Liya Wang, 2022. "Three-Branch Random Forest Intrusion Detection Model," Mathematics, MDPI, vol. 10(23), pages 1-21, November.
  • Handle: RePEc:gam:jmathe:v:10:y:2022:i:23:p:4460-:d:984909
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/10/23/4460/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/10/23/4460/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Mahesh Kumar Prasath & Balasubramani Perumal, 2019. "A meta‐heuristic Bayesian network classification for intrusion detection," International Journal of Network Management, John Wiley & Sons, vol. 29(3), May.
    2. Musavir Hassan & Muheet Ahmed Butt & Majid Zaman, 2021. "An Ensemble Random Forest Algorithm for Privacy Preserving Distributed Medical Data Mining," International Journal of E-Health and Medical Communications (IJEHMC), IGI Global, vol. 12(6), pages 1-23, November.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.

      Corrections

      All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:10:y:2022:i:23:p:4460-:d:984909. See general information about how to correct material in RePEc.

      If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

      If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

      If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

      For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

      Please note that corrections may take a couple of weeks to filter through the various RePEc services.

      IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.