{"created":"2020-09-01T14:53:57.615632+00:00","id":4477,"links":{},"metadata":{"_buckets":{"deposit":"c5b95ee1-7695-4b8c-8551-78fad8af82c2"},"_deposit":{"id":"4477","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4477"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4477","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"A Network Intrusion Detection Model Using Fuzzy C4.5 Decision Tree","subitem_1551255648112":"en_US"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"With the growing rate of interconnections among computer systems, reliablenetwork communication is becoming a majorchallenge. Intrusion detection has emerged as asignificant field of research, because it is nottheoretically possible to set up a system with novulnerabilities. This paper purposes the use offuzzy logic to generate decision tree to classifythe intrusion data. Further, the fuzzy decisiontree is then converted to fuzzy rules. The fuzzydecision tree (C4.5) method is used the minimizemeasure of classification ambiguity for differentattributes. This method overcomes the sharpboundary problems; provide good accuracydealing with continuous attributes and predictionproblems. The experimental result is carried outby using 10% KDD Cup 99 benchmark networkintrusion detection dataset."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Fuzzy Logic"},{"interim":"Fuzzy C4.5"},{"interim":"Fuzzy Rules"},{"interim":"Intrusion Detection"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-11-14"}],"displaytype":"preview","filename":"10050.pdf","filesize":[{"value":"669 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4477/files/10050.pdf"},"version_id":"1b20ef67-1084-4ed0-bed8-66ae3c9e337f"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Tenth International Conference On Computer Applications (ICCA 2012)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Hlaing, Thuzar"},{"subitem_authors_fullname":"Khine, May Aye"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2012-02-28"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/2406"},"item_title":"A Network Intrusion Detection Model Using Fuzzy C4.5 Decision Tree","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-11-14","publish_status":"0","recid":"4477","relation_version_is_last":true,"title":["A Network Intrusion Detection Model Using Fuzzy C4.5 Decision Tree"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:58:52.760329+00:00"}