Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking


Index Link

Index Tree

  • RootNode

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "c5b95ee1-7695-4b8c-8551-78fad8af82c2"}, "_deposit": {"id": "4477", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4477"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4477", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "A Network Intrusion Detection Model Using Fuzzy C4.5 Decision Tree", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "With the growing rate of interconnections among computer systems, reliablenetwork communication is becoming a majorchallenge. Intrusion detection has emerged as asignificant field of research, because it is nottheoretically possible to set up a system with novulnerabilities. This paper purposes the use offuzzy logic to generate decision tree to classifythe intrusion data. Further, the fuzzy decisiontree is then converted to fuzzy rules. The fuzzydecision tree (C4.5) method is used the minimizemeasure of classification ambiguity for differentattributes. This method overcomes the sharpboundary problems; provide good accuracydealing with continuous attributes and predictionproblems. The experimental result is carried outby using 10% KDD Cup 99 benchmark networkintrusion detection dataset."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Fuzzy Logic"}, {"interim": "Fuzzy C4.5"}, {"interim": "Fuzzy Rules"}, {"interim": "Intrusion Detection"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-11-14"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "10050.pdf", "filesize": [{"value": "669 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 669000.0, "url": {"url": "https://meral.edu.mm/record/4477/files/10050.pdf"}, "version_id": "1b20ef67-1084-4ed0-bed8-66ae3c9e337f"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Tenth International Conference On Computer Applications (ICCA 2012)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Hlaing, Thuzar"}, {"subitem_authors_fullname": "Khine, May Aye"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2012-02-28"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2406"}, "item_title": "A Network Intrusion Detection Model Using Fuzzy C4.5 Decision Tree", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004477", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-11-14"}, "publish_date": "2019-11-14", "publish_status": "0", "recid": "4477", "relation": {}, "relation_version_is_last": true, "title": ["A Network Intrusion Detection Model Using Fuzzy C4.5 Decision Tree"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

A Network Intrusion Detection Model Using Fuzzy C4.5 Decision Tree

http://hdl.handle.net/20.500.12678/0000004477
http://hdl.handle.net/20.500.12678/0000004477
f268a8b3-38d2-48a7-871c-c8e991d1f2b2
c5b95ee1-7695-4b8c-8551-78fad8af82c2
None
Preview
Name / File License Actions
10050.pdf 10050.pdf (669 Kb)
Publication type
Article
Upload type
Publication
Title
Title A Network Intrusion Detection Model Using Fuzzy C4.5 Decision Tree
Language en_US
Publication date 2012-02-28
Authors
Hlaing, Thuzar
Khine, May Aye
Description
With the growing rate of interconnections among computer systems, reliablenetwork communication is becoming a majorchallenge. Intrusion detection has emerged as asignificant field of research, because it is nottheoretically possible to set up a system with novulnerabilities. This paper purposes the use offuzzy logic to generate decision tree to classifythe intrusion data. Further, the fuzzy decisiontree is then converted to fuzzy rules. The fuzzydecision tree (C4.5) method is used the minimizemeasure of classification ambiguity for differentattributes. This method overcomes the sharpboundary problems; provide good accuracydealing with continuous attributes and predictionproblems. The experimental result is carried outby using 10% KDD Cup 99 benchmark networkintrusion detection dataset.
Keywords
Fuzzy Logic, Fuzzy C4.5, Fuzzy Rules, Intrusion Detection
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/2406
Journal articles
Tenth International Conference On Computer Applications (ICCA 2012)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:54:02.097019
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL