2012 IEEE 14th International Conference on Communication Technology 2012
DOI: 10.1109/icct.2012.6511281
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System using decision tree algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
25
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(25 citation statements)
references
References 7 publications
0
25
0
Order By: Relevance
“…In recent decades, many machine-learning algorithms and data mining algorithms, such as C4.5 Decision Tree [7], Genetic Algorithm (GA) [8], K-means algorithm [9], back propagation (BP) neural network [10], and SVM [11], are employed to IDS. Although these algorithms can boost the detection accuracy, they still suffer from difficulties such as a high rate of false positives and false negatives, easily falling into local optimal solution [12].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent decades, many machine-learning algorithms and data mining algorithms, such as C4.5 Decision Tree [7], Genetic Algorithm (GA) [8], K-means algorithm [9], back propagation (BP) neural network [10], and SVM [11], are employed to IDS. Although these algorithms can boost the detection accuracy, they still suffer from difficulties such as a high rate of false positives and false negatives, easily falling into local optimal solution [12].…”
Section: Related Workmentioning
confidence: 99%
“…Reconstruction neighborhood search of onlooker bees phase falling into local extremum, it is necessary to search solutions in the entire population space. In (7), fit(x i ) is the original fitness value of the i th nectar source, fit(x i ) means the average of all nectar sources. We use the square value of (fit(x i )-fit(x i )) as a new fitness value of the i th nectar source, which is useful to expand the diversity of solutions and avoid precocity.…”
Section: Reconstruction Neighborhood Search Of the Onlooker Bees Phasmentioning
confidence: 99%
“…Intrusion detection is used for handling intrusions that occur in a computer environment by the aid of triggering alerts that makes analysts to take appropriate action in order to block such intrusions. Signature based intrusion detection systems fail as they are not capable in the detection of unknown attacks [5]. Intrusion varies in wired and wireless networks.…”
Section: Related Work Intrusion Detectionmentioning
confidence: 99%
“…These types of methods make the assumption that 'normal' data occurs in dense neighborhoods while anomalies happen far from these. There are of course other methods which can be of some value, such as artificial neural networks [87,69], SVM [103], Bayesian Networks [45] or Decision Trees [53]. In the case of unsupervised learning methods, outliers are considered part of no cluster, while normal instances of data are part of a cluster.…”
Section: 12mentioning
confidence: 99%