2012
DOI: 10.1016/j.eswa.2011.06.013
|View full text |Cite
|
Sign up to set email alerts
|

Decision tree based light weight intrusion detection using a wrapper approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 258 publications
(30 citation statements)
references
References 14 publications
0
30
0
Order By: Relevance
“…Voting combiner is adopted in [11] to fuse two base classifiers, i.e. neural network and decision tree.…”
Section: Related Workmentioning
confidence: 99%
“…Voting combiner is adopted in [11] to fuse two base classifiers, i.e. neural network and decision tree.…”
Section: Related Workmentioning
confidence: 99%
“…Sindhu et al [12] introduced a new intrusion detection model which was the combination of the following: (1) removing redundant instances in order to make the learning algorithm to be unbiased, (2) identifying suitable subset of features by employing a wrapper-based feature selection algorithm, (3) realizing proposed IDS with neuro tree to achieve better detection accuracy. The lightweight IDS has been developed using a wrapper-based feature selection algorithm that maximizes the specificity and sensitivity of the IDS as well as by employing a neural ensemble decision tree iterative procedure to evolve optimal features.…”
Section: Genetic-based Feature Selectionmentioning
confidence: 99%
“…A decision tree [12] is a tree where each non-terminal node represents a test or decision on the considered data item. Choice of a certain branch depends upon the outcome of the test.…”
Section: Decision Treesmentioning
confidence: 99%
See 1 more Smart Citation
“…According to Tsai and Chiou (2009), integrating the ANN and decision tree models provides not only higher rate of prediction accuracy but also important decision rules compared with using the ANN model alone. Sivatha Sindhu et al (2012) provided a Intrusion Detection System (IDS) for detecting anomalies in networks. The essential part of building lightweight IDS depends on preprocessing of network data, detecting important features and in the design of efficient learning algorithm that classify normal and anomalous patterns.…”
Section: Introductionmentioning
confidence: 99%