2000
DOI: 10.1145/846183.846201
|View full text |Cite
|
Sign up to set email alerts
|

KDD-99 classifier learning contest LLSoft's results overview

Abstract: Kernel Miner is a new data-mining tool based on building the optimal decision forest. The tool won second place in the KDD99 Classifier Learning Contest, August 1999. We describe the Kernel Miner's approach and method used for solving the contest task. The received results are analyzed and explained.Kernel Miner is a data-mining tool for the description, classification and generalization of data, and for predicting the new cases. Kernel Miner is a fully automated tool that provides solutions to database users.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
67
0

Year Published

2003
2003
2021
2021

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 139 publications
(72 citation statements)
references
References 0 publications
1
67
0
Order By: Relevance
“…The performance metrics of our proposed IDS are compared with other methods that are presented on other research papers (Table 19 and Table 20). We would like to note that there are some papers that used the KDD Test set with their proposed method [2], [39]- [41], but they included the http-tunnel attack into the U2R class [39], [40]. In fact, the http-tunnel attack is a Remoteto-Local (R2L) attack [26], which intends to gain local access from a remote machine.…”
Section: Hybrid Model and Experimental Resultsmentioning
confidence: 99%
“…The performance metrics of our proposed IDS are compared with other methods that are presented on other research papers (Table 19 and Table 20). We would like to note that there are some papers that used the KDD Test set with their proposed method [2], [39]- [41], but they included the http-tunnel attack into the U2R class [39], [40]. In fact, the http-tunnel attack is a Remoteto-Local (R2L) attack [26], which intends to gain local access from a remote machine.…”
Section: Hybrid Model and Experimental Resultsmentioning
confidence: 99%
“…The colossal increase of attacks on network and is the key reason for the data mining based intrusion detection techniques which is enormously beneficial in detecting the attacks [19], [20] . This paper describes a system which gives idea about network data mining that is the usage of data mining method which helps in capturing flow data and data packet in a network together with comparative study of other methods.…”
Section: Intrusion Detection Using Clustering-mentioning
confidence: 99%
“…[7] 69.60 98.00 100.00 71.40 99.20 C.L.C. [15] 73.95 99.88 87.83 61.36 98.50 Multi-PD [16] 97.30 88.70 29.80 09.60 ADWICE [4] 98.30 96.00 81.10 70.80 Our method 97.375 97.357 90.548 100.00 100.00…”
Section: Applicationmentioning
confidence: 99%