A Comparative Analysis of Decision Tree and Bayesian Model for Network Intrusion Detection System
نویسندگان
چکیده
منابع مشابه
Implementing an Intrusion Detection System using a Decision Tree
As the Internet becomes more and more accessible to people the world over, the realm of network security faces increasingly daunting problems. From the point of view of a defender, we now have to thwart the attempts of an increased number of malicious users; in the face of an attack, a larger consumer base left unserved turns out to be a larger margin of lost revenue. The value of being able to...
متن کاملa comparative pragmatic analysis of the speech act of “disagreement” across english and persian
the speech act of disagreement has been one of the speech acts that has received the least attention in the field of pragmatics. this study investigates the ways power relations, social distance, formality of the context, gender, and language proficiency (for efl learners) influence disagreement and politeness strategies. the participants of the study were 200 male and female native persian s...
15 صفحه اولDecision Tree Based Algorithm for Intrusion Detection
Kajal Rai Research Scholar, Department of Computer Science and Applications, Panjab University, Chandigarh, India Email: [email protected] M. Syamala Devi Professor, Department of Computer Science and Applications, Panjab University, Chandigarh, India Email: [email protected] Ajay Guleria System Manager, Computer Center, Panjab University, Chandigarh, India Email: [email protected] -------------------...
متن کاملa comparative analysis of the marginal microleakages of two pit and fissure sealans, conseal-f and conseal clear
چکیده ندارد.
15 صفحه اولNetwork Intrusion Detection Using Improved Decision Tree Algorithm
Intrusion detection involves a lot of tools that are used to identify different types of attacks against computer systems and networks. With the development of network technologies and applications network attacks are greatly increasing both in number and severe. Open source and commercial network intrusion detection tools are not able to predict new type of attacks based on the previous attack...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: FUOYE Journal of Engineering and Technology
سال: 2019
ISSN: 2579-0625,2579-0617
DOI: 10.46792/fuoyejet.v4i2.362