Intrusion detection system using decision tree-based attribute weighted AODE
نویسندگان
چکیده
منابع مشابه
Implementing an Intrusion Detection System using a Decision Tree
As the Internet becomes more and more accessible to people the world over, the realm of network security faces increasingly daunting problems. From the point of view of a defender, we now have to thwart the attempts of an increased number of malicious users; in the face of an attack, a larger consumer base left unserved turns out to be a larger margin of lost revenue. The value of being able to...
متن کاملIntrusion Detection System using Modified C-Fuzzy Decision Tree Classifier
As the number of networked computers grows, intrusion detection becomes an essential component in keeping networks secure. Various approaches for intrusion detection are currently being in use with each one has its own merits and demerits. This paper presents the work to test and improve the performance of an intrusion detection system based on C-fuzzy decision tree, a new class of decision tre...
متن کاملDecision Tree Based Algorithm for Intrusion Detection
Kajal Rai Research Scholar, Department of Computer Science and Applications, Panjab University, Chandigarh, India Email: [email protected] M. Syamala Devi Professor, Department of Computer Science and Applications, Panjab University, Chandigarh, India Email: [email protected] Ajay Guleria System Manager, Computer Center, Panjab University, Chandigarh, India Email: [email protected] -------------------...
متن کاملAn Attribute-weighted Clustering Intrusion Detection Method
Intrusion detection system is automatic system which recognize intrusions of computers or computer network systems. The existing security detection systems have many problems such as wrong detection of intrusions, false intrusions, poor real-time performance. To solve these problems, this paper improves the particle swarm optimization algorithm and presents an attribute-weighted distance calcul...
متن کاملintrusion detection system in computer networks using decision tree and svm algorithms
internet applications spreading and its high usage popularity result insignificant increasing of cyber-attacks. consequently, network security has becomea matter of importance and several methods have been developed for these attacks.for this purpose, intrusion detection systems (ids) are being used to monitor theattacks occurred on computer networks. data mining techniques, machinelearning, ne...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJARCCE
سال: 2014
ISSN: 2278-1021
DOI: 10.17148/ijarcce.2014.31217