Proceedings of the 2001 SIAM International Conference on Data Mining 2001
DOI: 10.1137/1.9781611972719.29
|View full text |Cite
|
Sign up to set email alerts
|

PNrule: A New Framework for Learning Classifier Models in Data Mining (A Case-Study in Network Intrusion Detection)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
54
0

Year Published

2004
2004
2018
2018

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 103 publications
(54 citation statements)
references
References 8 publications
0
54
0
Order By: Relevance
“…The first three places were occupied by entries that used variants of decision trees and showed only marginal differences in performance [13,14,15]. In ninth place in the challenge, was the 1-nearest neighbour classifier.…”
Section: Related Workmentioning
confidence: 99%
“…The first three places were occupied by entries that used variants of decision trees and showed only marginal differences in performance [13,14,15]. In ninth place in the challenge, was the 1-nearest neighbour classifier.…”
Section: Related Workmentioning
confidence: 99%
“…For the evaluation results, we made use of about 10% of the full huge data set which amounted to about 27000 data points. The performance evaluation was made for both testing 0 50 100 KDD 99 Winner [36] PNrule [37] Class SVM [38] Layered conditional random fields [39] Columbia Model [40] Decision tree [41] BPNN [42] Our Technique U2R Attacks 0 50 100 KDD 99 Winner [36] PNrule [37] Class SVM [38] Layered conditional random fields [39] Columbia Model [40] Decision tree [41] BPNN [42] Our Technique…”
Section: U2r Attacksmentioning
confidence: 99%
“…In general, intrusion detection method is divided into signature-based intrusion detection or anomaly-based intrusion detection system (ads). SD is a known process comparison signature pattern attack or threat to capture events to identify possible invasion [1][2]. Found in the process of advertising from a known behavior, behavior and construct summary on behalf of the normal or expected from monitoring routine activities, network connection, the host or the user for a period of time.…”
Section: Introductionmentioning
confidence: 99%