首页> 外文会议>International Conference on Soft Computing Systems >Identification of Attacks Using Proficient Data Interested Decision Tree Algorithm in Data Mining
【24h】

Identification of Attacks Using Proficient Data Interested Decision Tree Algorithm in Data Mining

机译:使用熟练数据挖掘中的熟练数据感兴趣决策树算法识别攻击

获取原文
获取外文期刊封面目录资料

摘要

The key feature of today's networks is being open, communication between any pair of Internet end points is easier. This leads to various types of intrusions which are actions that threaten the confidentially of the network and lack of effective network infrastructures for distinguishing and dropping malicious traffics. This approach of intrusion detection with data mining concepts involving the KDD cup dataset that generates rules for the detection which works well for new as well as unknown attacks. Data mining is the process of identifying valid understandable patterns in data. It can help learn the traffic through supervised and unsupervised learning we have applied here the semi supervised way. To classify the given data resourcefully, the Proficient Data Interested Decision Tree (PDIDT) algorithm is functioned. We have concentrated on mitigating the Distributed Denial of service (DDos) attacks and in reducing the false alarm rate (FAR) with a global network monitor which can observe and control every flow between any pair of hosts.
机译:今天的网络的关键特征是开放的,任何一对互联网端点之间的通信更容易。这导致各种类型的入侵,这是威胁到网络的行为,以及缺乏用于区分和丢弃恶意的网络基础设施的有效网络基础设施。这种涉及KDD CUP数据集的数据挖掘概念的入侵检测方法,该概念为新的和未知攻击提供良好的检测规则。数据挖掘是识别数据中有效的可理解模式的过程。它可以通过监督和无监督学习来帮助学习流量,我们在此处应用了半监督方式。要符合给定的数据,验证了熟练的数据感兴趣的决策树(PDIDT)算法是否有效。我们专注于减轻分布式拒绝服务(DDOS)攻击,并通过全局网络监视器降低误报率(远),该网络监视器可以观察和控制任何一对主机之间的每个流程。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号