Книга: Gaurav Mishra and Gulshan Ahuja «Classification of data mining techniques in intrusion detection»

Classification of data mining techniques in intrusion detection

Производитель: "LAP Lambert Academic Publishing"

Data mining is the process of gathering, searching, and analyzing a large amount of raw data, as to discover patterns, relationships and behavior of data. There are large numbers of algorithms for classification of data mining. Single algorithm is not efficient for classification of data and recognize their pattern and behavior . There is a key term known as ensemble learning which means Combining two or more classifiers for efficient result. I have used the KDD 99 dataset for the experiment which have 41 features labeled either as normal or as an attack. In this book I have represented how graphical machine learning tool weka can be used for data mining and how ensemble learning can be implemented using weka. I have used three classifiers with the Bagging and Boosting ensemble learning approach which are complementary naive bayes and two are rule based classifiers, part and jrip. My experiment shows that bagging improves the efficiency of the rule based classifiers as well as of naive... ISBN:9783659442155

Издательство: "LAP Lambert Academic Publishing" (2013)

ISBN: 9783659442155

См. также в других словарях:

  • Data Analysis Techniques for Fraud Detection — Fraud is a million dollar business and it is increasing every year. The PwC global economic crime survey of 2009 suggests that close to 30% of companies worldwide reported fallen victim to fraud in the past year[1] Fraud involves one or more… …   Wikipedia

  • Intrusion detection system — An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.[1] Some systems may attempt to stop …   Wikipedia

  • Anomaly detection — Anomaly detection, also referred to as outlier detection[1] refers to detecting patterns in a given data set that do not conform to an established normal behavior.[2] The patterns thus detected are called anomalies and often translate to critical …   Wikipedia

  • Intruder detection — In information security, intruder detection is the art of detecting intruders behind attacks as unique persons. This techniques try to identify the person analyzing their computational behaviour.This concept is not yet very extended and tend to… …   Wikipedia

  • Malware — Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access… …   Wikipedia

  • technology, history of — Introduction       the development over time of systematic techniques for making and doing things. The term technology, a combination of the Greek technē, “art, craft,” with logos, “word, speech,” meant in Greece a discourse on the arts, both… …   Universalium

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»