Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "99240ab3-3315-42a3-9a1a-d86d7627c50c"}, "_deposit": {"id": "4647", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4647"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4647", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "An Analysis of Rule and Decision Tree Based Intrusion Detection System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "We are living in 21st century wherein the number of internet of things is competing with increasing population. Security is becoming a major concern for information technology over network. Therefore, people use technology to overcome every problem that comes in the network intrusions. Now many researchers and developers are trying to protect networks from various attacks but at the same time raise many questions, confusions and conflicts regarding their protecting technology. Because each approaches have advantages and disadvantages in detection. The system use rule based data mining techniques in intrusion detection system for network. And also it compares the approaches of rule based and tree based intrusion detection system by using 10 % kddcup’99 dataset. For rule based approach, we use K-means and JRip algorithms to classify internal and external security threats and attacks. For decision tree based approach, we use K-means and C4.5 algorithms to compare between detection method"}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Sixteenth International Conferences on Computer Applications(ICCA 2018)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Yi Yi"}, {"subitem_authors_fullname": "Min, Myat Myat"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2018-02-22"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/289"}, "item_title": "An Analysis of Rule and Decision Tree Based Intrusion Detection System", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004647", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4647", "relation": {}, "relation_version_is_last": true, "title": ["An Analysis of Rule and Decision Tree Based Intrusion Detection System"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

An Analysis of Rule and Decision Tree Based Intrusion Detection System

http://hdl.handle.net/20.500.12678/0000004647
http://hdl.handle.net/20.500.12678/0000004647
7c1fb0cb-0661-401d-93ec-d2c05fff9012
99240ab3-3315-42a3-9a1a-d86d7627c50c
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:13:51.696249
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL