2020
DOI: 10.1007/978-981-15-0058-9_1
|View full text |Cite
|
Sign up to set email alerts
|

Decision Tree with Sensitive Pruning in Network-based Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…Decision Tree [101], [102], [103], [132], [133] Advantages: Few resources in both training and prediction. Widely used in existing IDS.…”
Section: Discussionmentioning
confidence: 99%
“…Decision Tree [101], [102], [103], [132], [133] Advantages: Few resources in both training and prediction. Widely used in existing IDS.…”
Section: Discussionmentioning
confidence: 99%
“…The proposed method was able to completely detect four types of attacks and enabled the detection of twenty-two other kinds of attacks. Another study [ 22 ] combined a DT with sensitive pruning to tackle the privacy issue by modifying the C4.8 decision tree on the 6% GureKDDCup NIDS dataset.…”
Section: Related Workmentioning
confidence: 99%
“…A high-level view of the deployment of IDS in SDN architecture. [75]. Researchers have explored a great deal in the possibility of robust NBM-based IDS development using ML, and DL approaches in the last decade [63], [76]- [81].…”
Section: Ids Taxonomymentioning
confidence: 99%