2015 International Conference on Computer, Communication and Control (IC4) 2015
DOI: 10.1109/ic4.2015.7375727
|View full text |Cite
|
Sign up to set email alerts
|

Combination of data mining techniques for intrusion detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…In particular, they identified that data feature reduction contributes to improve classification performance and reduce memory and CPU time. Elekar [28] discussed combinations of machine learning techniques in order to improve an attack detection rate and reduce a false attack detection rate for IDSs. C4.5 with random tree, C4.5 with random forest, and random forest with random tree are considered as possible combination candidates and it is identified that the performance of C4.5 with random tree is better than others for both improving an attack detection rate and reducing a false attack detection rate.…”
Section: Mapping Selected Studies By Ensemble Methodsmentioning
confidence: 99%
“…In particular, they identified that data feature reduction contributes to improve classification performance and reduce memory and CPU time. Elekar [28] discussed combinations of machine learning techniques in order to improve an attack detection rate and reduce a false attack detection rate for IDSs. C4.5 with random tree, C4.5 with random forest, and random forest with random tree are considered as possible combination candidates and it is identified that the performance of C4.5 with random tree is better than others for both improving an attack detection rate and reducing a false attack detection rate.…”
Section: Mapping Selected Studies By Ensemble Methodsmentioning
confidence: 99%
“…This method reduced error rates more than traditional pruning algorithms. In turn, combining two or more algorithms with the DT to overcome the detection rate problem was proposed by Elekar, 74 where different categories of attack detection are performed using different combinations of algorithms, such as J48 DT with a combination of Random Forest, J48 with the Random Tree, and the Random Tree with collaboration of the Random Forest. The results showed that J48 combined with the Random Forest improved the detection rate (92.62%) for DoS, U2R, and R2L attacks with a low false positive rate for probe attacks.…”
Section: Decision Treementioning
confidence: 99%
“…With the development of technology and the further popularization of computer, the use of network has become more extensive [1], which not only changes the way people study and work, but also creates great values for economic development. However, the network security problem is becoming more and more prominent [2], means of intrusion attack is becoming more complex and diverse [3], which means greater and stronger harms, and the difficulty of intrusion prevention is becoming higher.…”
Section: Introductionmentioning
confidence: 99%