2015 International Conference on Pervasive Computing (ICPC) 2015
DOI: 10.1109/pervasive.2015.7087051
|View full text |Cite
|
Sign up to set email alerts
|

Use of rule base data mining algorithm for intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0
2

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 18 publications
0
1
0
2
Order By: Relevance
“…When analyzing Table III, it possible to conclude that the best classification algorithms, at the performance level, are as follows: trees.RandomForest [16] [14], lazy.IBk [15] [13], trees.J48 [9] [12] and rules.PART [11] [18]. We have obtained figures, like the one shown in Figure 5, to the analyse the best nights resulting from the study for the selected four algorithms/models.…”
Section: Tests and Resultsmentioning
confidence: 99%
“…When analyzing Table III, it possible to conclude that the best classification algorithms, at the performance level, are as follows: trees.RandomForest [16] [14], lazy.IBk [15] [13], trees.J48 [9] [12] and rules.PART [11] [18]. We have obtained figures, like the one shown in Figure 5, to the analyse the best nights resulting from the study for the selected four algorithms/models.…”
Section: Tests and Resultsmentioning
confidence: 99%
“…Data yang digunakan untuk mengetahui kinerja dari fuzzy Sugeno dalam penelitian ini diperoleh dari pengusaha kain tenun Mlaki Wanarejan Utara Pemalang, berupa jumlah produksi kain tenun, yang dipengaruhi oleh banyaknya biaya produksi, permintaan dari pelanggan, dan stok yang tersedia. Selanjutnya, data tersebut digunakan untuk membangun sebuah rule dengan menggunakan pohon keputusan random tree yang dieksekusi oleh tools WEKA [4]. Digunakannya random tree salah satunya untuk membuat rule secara otomatis dari data yang tersedia tanpa perlu berkonsultasi dengan pakar [5], selain itu untuk memperkenalkan random tree dalam bidang penelitian karena masih sedikitnya penelitian yang menggunakan pohon keputusan tersebut.…”
Section: Pendahuluanunclassified
“…Com o objetivo de avaliar a estratégia de aprendizagem de máquina, foram utilizados os conjuntos de treinamento e teste kddcup.data 10 percent 7 e corrected 8 . A KDD Cup 99 é considerada umas das principais bases utilizadas na avaliação de mecanismos para detecção de tentativas de ataques a servidores de rede [26].…”
Section: Avaliação Da Estratégia Baseada Em Aprendizagem De Máquinaunclassified