2008
DOI: 10.1109/icact.2008.4493974
|View full text |Cite
|
Sign up to set email alerts
|

Effective Value of Decision Tree with KDD 99 Intrusion Detection Datasets for Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0
2

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 61 publications
(36 citation statements)
references
References 7 publications
0
34
0
2
Order By: Relevance
“…They showed that the frequent patterns mined from audit data can be used as reliable user anomaly detection models, and as guidelines for selecting temporal statistical features to build effective classification models. Ye Changguo, et al(2009), adopted fuzzy associate rules mining method and apriori algorithm to abnormal detecting experiment based on network, and improved the support and credit, and compared and analyzing the experiment result Joong-Hee Leet, et al(2008),they generate the decision trees for DoS attack,R2L attack, U2R attack, and Scan attack. The ID3 algorithm is used as the learning algorithm to generate the decision tree automatically, and the DARPA Set is adopted for the training data.…”
Section: Literature Reviewedmentioning
confidence: 99%
“…They showed that the frequent patterns mined from audit data can be used as reliable user anomaly detection models, and as guidelines for selecting temporal statistical features to build effective classification models. Ye Changguo, et al(2009), adopted fuzzy associate rules mining method and apriori algorithm to abnormal detecting experiment based on network, and improved the support and credit, and compared and analyzing the experiment result Joong-Hee Leet, et al(2008),they generate the decision trees for DoS attack,R2L attack, U2R attack, and Scan attack. The ID3 algorithm is used as the learning algorithm to generate the decision tree automatically, and the DARPA Set is adopted for the training data.…”
Section: Literature Reviewedmentioning
confidence: 99%
“…For the evaluation results, we made use of about 10% of the full huge data set which amounted to about 27000 data points. The performance evaluation was made for both testing KDD 99 Winner [36] Multi-Class SVM [38] Layered conditional random fields [39] Columbia Model [40] Decision tree [41] Our Technique…”
Section: Discussionmentioning
confidence: 99%
“…with the other state of art both the neural the table-11, it is apparent that the our technique has obtained a reliable peak scores for all types of intrusions attained 98.94% R2L and U2R attacks we when compared for all 4 types of attacks . We have received the best results as we have employed fuzzythe number of attributes of the data and by the utilization of radial Multi-Class SVM [38] Layered conditional random fields [39] Columbia Model [40] Decision tree [41] Our Technique…”
Section: Comparative Analysismentioning
confidence: 99%
See 2 more Smart Citations