Index Link

  • RootNode
    • Co-operative College, Mandalay
    • Cooperative College, Phaunggyi
    • Co-operative University, Sagaing
    • Co-operative University, Thanlyin
    • Dagon University
    • Kyaukse University
    • Laquarware Technological college
    • Mandalay Technological University
    • Mandalay University of Distance Education
    • Mandalay University of Foreign Languages
    • Maubin University
    • Mawlamyine University
    • Meiktila University
    • Mohnyin University
    • Myanmar Institute of Information Technology
    • Myanmar Maritime University
    • National Management Degree College
    • Naypyitaw State Academy
    • Pathein University
    • Sagaing University
    • Sagaing University of Education
    • Taunggyi University
    • Technological University, Hmawbi
    • Technological University (Kyaukse)
    • Technological University Mandalay
    • University of Computer Studies, Mandalay
    • University of Computer Studies Maubin
    • University of Computer Studies, Meikhtila
    • University of Computer Studies Pathein
    • University of Computer Studies, Taungoo
    • University of Computer Studies, Yangon
    • University of Dental Medicine Mandalay
    • University of Dental Medicine, Yangon
    • University of Information Technology
    • University of Mandalay
    • University of Medicine 1
    • University of Medicine 2
    • University of Medicine Mandalay
    • University of Myitkyina
    • University of Public Health, Yangon
    • University of Veterinary Science
    • University of Yangon
    • West Yangon University
    • Yadanabon University
    • Yangon Technological University
    • Yangon University of Distance Education
    • Yangon University of Economics
    • Yangon University of Education
    • Yangon University of Foreign Languages
    • Yezin Agricultural University
    • New Index

Item

{"_buckets": {"deposit": "c5b95ee1-7695-4b8c-8551-78fad8af82c2"}, "_deposit": {"id": "4477", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4477"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4477", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "A Network Intrusion Detection Model Using Fuzzy C4.5 Decision Tree", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "With the growing rate of interconnections among computer systems, reliablenetwork communication is becoming a majorchallenge. Intrusion detection has emerged as asignificant field of research, because it is nottheoretically possible to set up a system with novulnerabilities. This paper purposes the use offuzzy logic to generate decision tree to classifythe intrusion data. Further, the fuzzy decisiontree is then converted to fuzzy rules. The fuzzydecision tree (C4.5) method is used the minimizemeasure of classification ambiguity for differentattributes. This method overcomes the sharpboundary problems; provide good accuracydealing with continuous attributes and predictionproblems. The experimental result is carried outby using 10% KDD Cup 99 benchmark networkintrusion detection dataset."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Fuzzy Logic"}, {"interim": "Fuzzy C4.5"}, {"interim": "Fuzzy Rules"}, {"interim": "Intrusion Detection"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-11-14"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "10050.pdf", "filesize": [{"value": "669 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 669000.0, "url": {"url": "https://meral.edu.mm/record/4477/files/10050.pdf"}, "version_id": "1b20ef67-1084-4ed0-bed8-66ae3c9e337f"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Tenth International Conference On Computer Applications (ICCA 2012)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Hlaing, Thuzar"}, {"subitem_authors_fullname": "Khine, May Aye"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2012-02-28"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2406"}, "item_title": "A Network Intrusion Detection Model Using Fuzzy C4.5 Decision Tree", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004477", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-11-14"}, "publish_date": "2019-11-14", "publish_status": "0", "recid": "4477", "relation": {}, "relation_version_is_last": true, "title": ["A Network Intrusion Detection Model Using Fuzzy C4.5 Decision Tree"], "weko_shared_id": -1}

A Network Intrusion Detection Model Using Fuzzy C4.5 Decision Tree

http://hdl.handle.net/20.500.12678/0000004477
f268a8b3-38d2-48a7-871c-c8e991d1f2b2
c5b95ee1-7695-4b8c-8551-78fad8af82c2
None
Name / File License Actions
10050.pdf 10050.pdf (669 Kb)
Publication type
Article
Upload type
Publication
Title
Title A Network Intrusion Detection Model Using Fuzzy C4.5 Decision Tree
Language en_US
Publication date 2012-02-28
Authors
Hlaing, Thuzar
Khine, May Aye
Description
With the growing rate of interconnections among computer systems, reliablenetwork communication is becoming a majorchallenge. Intrusion detection has emerged as asignificant field of research, because it is nottheoretically possible to set up a system with novulnerabilities. This paper purposes the use offuzzy logic to generate decision tree to classifythe intrusion data. Further, the fuzzy decisiontree is then converted to fuzzy rules. The fuzzydecision tree (C4.5) method is used the minimizemeasure of classification ambiguity for differentattributes. This method overcomes the sharpboundary problems; provide good accuracydealing with continuous attributes and predictionproblems. The experimental result is carried outby using 10% KDD Cup 99 benchmark networkintrusion detection dataset.
Keywords
Fuzzy Logic, Fuzzy C4.5, Fuzzy Rules, Intrusion Detection
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/2406
Journal articles
Tenth International Conference On Computer Applications (ICCA 2012)
Conference papers
Books/reports/chapters
Thesis/dissertations
0
0
views
downloads
Views Downloads

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats