Proceedings ArticleDOI
Network intrusion detection using multi-attributed frame decision tree
Krung Sinapiromsaran,Narudom Techaval +1 more
- pp 203-207
TLDR
A new decision tree algorithm that uses multiple attributes to construct a core vector generated from two farthest records and recursively partition the dataset along this core vector using the vector projection.Citations
More filters
Dissertation
Distributed Denial of Service (DDoS) attack detection and mitigation
TL;DR: The water quality of the Mediterranean Sea has changed in recent years from being generally good to excellent, with the exception of the waters off the coast of Italy and the Black Sea, which have seen declining water quality in recent decades.
Proceedings ArticleDOI
Breast cancer diagnosis using multi-attributed lens recursive partitioning algorithm
TL;DR: A new technique, multi-attributed lens, which weighs all numeric attributes simultaneously simultaneously is proposed, which shows that relative performances of this algorithm are better than C4.5 algorithm based on this dataset.
Proceedings ArticleDOI
Farthest boundary clustering algorithm: Half-orbital extreme pole
TL;DR: This paper proposes a novel boundary approach to perform a clustering analysis and compares the algorithm with the K-means clustering algorithm using the value of K to demonstrate the effectiveness of the method.
Proceedings ArticleDOI
Weighted minimum consecutive pair of the extreme pole outlier factor
TL;DR: A new parameter-free algorithm called a weighted minimum consecutive pair of the extreme pole outlier factor (WOF) is proposed, which generates the new outlier score of an instance along the extreme poles by considering the projection of this instance and its consecutive pair.
References
More filters
Book
C4.5: Programs for Machine Learning
TL;DR: A complete guide to the C4.5 system as implemented in C for the UNIX environment, which starts from simple core learning methods and shows how they can be elaborated and extended to deal with typical problems such as missing data and over hitting.
Book ChapterDOI
Learning Efficient Classification Procedures and Their Application to Chess End Games
TL;DR: A series of experiments dealing with the discovery of efficient classification procedures from large numbers of examples is described, with a case study from the chess end game king-rook versus king-knight.
Journal ArticleDOI
Network intrusion detection
TL;DR: In this paper, a survey of host-based and network-based intrusion detection systems is presented, and the characteristics of the corresponding systems are identified, and an outline of a statistical anomaly detection algorithm employed in a typical IDS is also included.
Journal ArticleDOI
Review: Intrusion detection by machine learning: A review
TL;DR: This chapter reviews 55 related studies in the period between 2000 and 2007 focusing on developing single, hybrid, and ensemble classifiers and discusses current achievements and limitations in developing intrusion detection systems by machine learning.
Journal ArticleDOI
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
TL;DR: The principle interest of this work is to benchmark the performance of the proposed hybrid IDS architecture by using KDD Cup 99 Data Set, the benchmark dataset used by IDS researchers.