2015
DOI: 10.1007/978-81-322-2674-1_60
|View full text |Cite
|
Sign up to set email alerts
|

Identification of Attacks Using Proficient Data Interested Decision Tree Algorithm in Data Mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
7
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(7 citation statements)
references
References 1 publication
0
7
0
Order By: Relevance
“…In today's age, intelligence wars are waged mostly on the computer in the form of intrusion, or the process of accessing a network without leaving a trace of a foreign presence [7]. To fight this, governments use different forms of Intrusion Detection Systems, or IDS's, to identify if an intrusion is threatening.…”
Section: Decision Trees and Intelligencementioning
confidence: 99%
See 4 more Smart Citations
“…In today's age, intelligence wars are waged mostly on the computer in the form of intrusion, or the process of accessing a network without leaving a trace of a foreign presence [7]. To fight this, governments use different forms of Intrusion Detection Systems, or IDS's, to identify if an intrusion is threatening.…”
Section: Decision Trees and Intelligencementioning
confidence: 99%
“…Signature detection programs analyze known attacks to develop unique characteristics, or signatures, to compare to new intrusions in order to help identify if the attack is malicious or harmless [7]. However, this method does not work well with unknown attack methods.…”
Section: Decision Trees and Intelligencementioning
confidence: 99%
See 3 more Smart Citations