Proceedings of the 2004 ACM Symposium on Applied Computing 2004
DOI: 10.1145/967900.967989
|View full text |Cite
|
Sign up to set email alerts
|

Naive Bayes vs decision trees in intrusion detection systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
162
0
6

Year Published

2006
2006
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 355 publications
(185 citation statements)
references
References 3 publications
1
162
0
6
Order By: Relevance
“…We treat shilling attack detection as the problem of classification, which is to make a classification between normal users and attacker. Therefore, in this paper, we exploit classification algorithms [31] as the basic model and get the final detection method called Pop-SAD. Pop-SAD is trained on both collected normal user profiles and attacker profiles, and it is able to classify a new user as a normal user or attacker.…”
Section: Detection Of Attackersmentioning
confidence: 99%
“…We treat shilling attack detection as the problem of classification, which is to make a classification between normal users and attacker. Therefore, in this paper, we exploit classification algorithms [31] as the basic model and get the final detection method called Pop-SAD. Pop-SAD is trained on both collected normal user profiles and attacker profiles, and it is able to classify a new user as a normal user or attacker.…”
Section: Detection Of Attackersmentioning
confidence: 99%
“…On the other hand, the clustering methods consider the features independently and are unable to capture the relationship between different features of single record, which further degrades attack detection accuracy. Amor et al [6] used Naïve Bayes classifiers for intrusion detection. The authors make strict independence assumption between the features in an observation resulting in lower attack detection accuracy when the features are correlated, which is often the case for intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
“…The idea of decision trees have also used for intrusion detection [6]. It generally has high speed of operation and high attack detection accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…A social event of estimations and recognitions are enhanced circumstances and the nearness of data in a collection. A few bundling computations are: k-Means [6], Agglomerative Hierarchical gathering &request and DBSCAN [7]. k-implies has been utilized in the proposed study.…”
Section: Module 2: Clusteringmentioning
confidence: 99%