2008 International Symposium on Electronic Commerce and Security 2008
DOI: 10.1109/isecs.2008.107
|View full text |Cite
|
Sign up to set email alerts
|

Entropy Weight Coefficient Method for Evaluating Intrusion Detection Systems

Abstract: In an effort to analyze and solve evaluation of intrusion detection system, evaluation methods such as ROC curve, the Bayesian Detection Rate, the Expected Cost and the Intrusion Detection Capability had been established. The evaluation methods which only involved few evaluation metrics (such as false positive rate, false negative rate) had their own weaknesses, because the complexity of intrusion detection system is the main cause and evaluation of intrusion detection system must involve many performance inde… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…Zou et al [19] used an entropy approach to calculate weights for water quality assessment indicators, whereas Malekian and Azarnivand [37] integrated Shannon's entropy with the Vlsekriterijumska Optimizacija I Kompromisno Resenje (VIKOR) technique to prioritize the flood risk in the Shemshak Watershed of Iran. Tian et al [38] have used an entropy method to calculate factor weights and reduce the influence of subjective judgments on the weight coefficients.…”
Section: Entropy Methodsmentioning
confidence: 99%
“…Zou et al [19] used an entropy approach to calculate weights for water quality assessment indicators, whereas Malekian and Azarnivand [37] integrated Shannon's entropy with the Vlsekriterijumska Optimizacija I Kompromisno Resenje (VIKOR) technique to prioritize the flood risk in the Shemshak Watershed of Iran. Tian et al [38] have used an entropy method to calculate factor weights and reduce the influence of subjective judgments on the weight coefficients.…”
Section: Entropy Methodsmentioning
confidence: 99%
“…Each cluster includes one Cluster Head (CH) and several Cluster Members (CM) [4]. The multi-hop routing used in clustering topology to forward the sensed data from source to destination results in the x∈X p(x)log 2 p(x) for 0 ≤ H(X) ≤ 1 [14][15][16]. As we want to utilize the functionality of information entropy in clustering WSN, it should be kept in focus that CH or BS should not be hesitant or irresolute about any of their decisions regarding cluster formation and data fusion.…”
Section: Introductionmentioning
confidence: 99%
“…Keeping in view the opportunistic connection between sensor nodes in heterogeneous clustering, we selected multiple parameters including an asynchronous working-sleeping cycle, status transition frequencies, residual energy, link quality factor in terms of signal-to-noise ratio, distance between sensor node and BS, and number of supported sensor nodes by a potential CH as our attributes of hesitant fuzzy set. Furthermore, we need Multi-Attribute Decision Modeling (MADM) to efficiently utilize our hesitant fuzzy set to generate hesitant fuzzy entropy matrix and determine our entropy weight coefficients [14,15,17,18].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations