2010 International Conference on Information Retrieval &Amp; Knowledge Management (CAMP) 2010
DOI: 10.1109/infrkm.2010.5466919
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection using data mining techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
38
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 102 publications
(42 citation statements)
references
References 4 publications
0
38
0
Order By: Relevance
“…The weight is determined where the minimum depth of the decision tree at which each feature is checked inside the tree and the weights of features that do not appear in the decision tree are allocated a value of zero. Ektefa et al [19], used different data mining method for intrusion detection and they found that the decision tree classifier was performing better than the SVM learning algorithm.…”
Section: Description Of Nsl-kddmentioning
confidence: 99%
“…The weight is determined where the minimum depth of the decision tree at which each feature is checked inside the tree and the weights of features that do not appear in the decision tree are allocated a value of zero. Ektefa et al [19], used different data mining method for intrusion detection and they found that the decision tree classifier was performing better than the SVM learning algorithm.…”
Section: Description Of Nsl-kddmentioning
confidence: 99%
“…The entire KDD Cup "99 data set contains 41 features. Connections are labeled as normal or attacks fall into 4 main categories [13].…”
Section: Data Collection and Preprocessingmentioning
confidence: 99%
“…In contrast to statistical techniques, machine learning techniques are well suited to learning patterns with no apriori knowledge of what those patterns may be. Clustering and Classification are probably the two most popular machine learning problems [29], [7].…”
Section: Related Workmentioning
confidence: 99%
“…either normal or malicious. The challenge in this method is to minimize the number of false positives and false negatives [7]. Five general categories of techniques have been tried to perform classification for intrusion detection purposes [9]: a) Inductive Rule Generation: The RIPPER (rule learning program) System is the most popular representative of classification techniques.…”
Section: Related Workmentioning
confidence: 99%