[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/PDCAT.2005.157guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Intrusion Detection Combining Multiple Decision Trees by Fuzzy logic

Published: 05 December 2005 Publication History

Abstract

In order to improve detection performance of data mining-based intrusion detection system, this paper presents a method of combining multiple decision trees based on fuzzy logic, especially the fuzzy integral. The main idea of this method is to divide a great large dataset into several sub-datasets, mine on sub-datasets separately to construct different sub-decision trees, detect TCP data by different sub-decision trees, and then nonlinearly combine the results from multiple sub-decision trees by fuzzy integral. The experiment results show that this technique is superior to individual decision trees for intrusion detection in terms of classification accuracy.

Cited By

View all
  • (2018)Secure software engineering requirements in cloud environment by using anticipating learning classifier systemInternational Journal of Internet Technology and Secured Transactions10.1504/IJITST.2015.0739146:1(1-8)Online publication date: 13-Dec-2018
  • (2015)Application of artificial bee colony for intrusion detection systemsSecurity and Communication Networks10.1002/sec.5888:16(2730-2740)Online publication date: 10-Nov-2015
  • (2011)Design and analysis of genetic fuzzy systems for intrusion detection in computer networksExpert Systems with Applications: An International Journal10.1016/j.eswa.2010.12.00638:6(7067-7075)Online publication date: 1-Jun-2011
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
PDCAT '05: Proceedings of the Sixth International Conference on Parallel and Distributed Computing Applications and Technologies
December 2005
1086 pages
ISBN:0769524052

Publisher

IEEE Computer Society

United States

Publication History

Published: 05 December 2005

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Secure software engineering requirements in cloud environment by using anticipating learning classifier systemInternational Journal of Internet Technology and Secured Transactions10.1504/IJITST.2015.0739146:1(1-8)Online publication date: 13-Dec-2018
  • (2015)Application of artificial bee colony for intrusion detection systemsSecurity and Communication Networks10.1002/sec.5888:16(2730-2740)Online publication date: 10-Nov-2015
  • (2011)Design and analysis of genetic fuzzy systems for intrusion detection in computer networksExpert Systems with Applications: An International Journal10.1016/j.eswa.2010.12.00638:6(7067-7075)Online publication date: 1-Jun-2011
  • (2010)ReviewApplied Soft Computing10.1016/j.asoc.2009.06.01910:1(1-35)Online publication date: 1-Jan-2010

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media