2022
DOI: 10.3390/electronics11050805
|View full text |Cite
|
Sign up to set email alerts
|

Adoption of IP Truncation in a Privacy-Based Decision Tree Pruning Design: A Case Study in Network Intrusion Detection System

Abstract: A decision tree is a transparent model where the rules are visible and can represent the logic of classification. However, this structure might allow attackers to infer confidential information if the rules carry some sensitive information. Thus, a tree pruning methodology based on an IP truncation anonymisation scheme is proposed in this paper to prune the real IP addresses. However, the possible drawback of carelessly designed tree pruning might degrade the performance of the original tree as some informatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…Different intrusion detection models based on machine learning and deep learning are being improved more and more as artificial intelligence technology advances quickly [5,6], but both have disadvantages. SVM, decision trees, and other common algorithms [7][8][9] are used frequently in traditional machine learning. Their main issue is that they frequently lose sight of the connections between features when extracting features because they rely too heavily on expert experience.…”
Section: Introductionmentioning
confidence: 99%
“…Different intrusion detection models based on machine learning and deep learning are being improved more and more as artificial intelligence technology advances quickly [5,6], but both have disadvantages. SVM, decision trees, and other common algorithms [7][8][9] are used frequently in traditional machine learning. Their main issue is that they frequently lose sight of the connections between features when extracting features because they rely too heavily on expert experience.…”
Section: Introductionmentioning
confidence: 99%
“…Machine learning methods were used to train learners. Some typical machine learning methods: k-means (KNN), decision tree, naive bayes, support vector machines (SVM) had been successfully applied in this field [2][3][4]. The intrusion detection methods based on machine learning had their own advantages and disadvantages due to the different selection of learning (classifier).…”
Section: Introductionmentioning
confidence: 99%