UCSY's Research Repository

A Network Intrusion Detection Model Using Fuzzy C4.5 Decision Tree

Show simple item record

dc.contributor.author Hlaing, Thuzar
dc.contributor.author Khine, May Aye
dc.date.accessioned 2019-11-14T06:36:36Z
dc.date.available 2019-11-14T06:36:36Z
dc.date.issued 2012-02-28
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/2406
dc.description.abstract With the growing rate of interconnections among computer systems, reliable network communication is becoming a major challenge. Intrusion detection has emerged as a significant field of research, because it is not theoretically possible to set up a system with no vulnerabilities. This paper purposes the use of fuzzy logic to generate decision tree to classify the intrusion data. Further, the fuzzy decision tree is then converted to fuzzy rules. The fuzzy decision tree (C4.5) method is used the minimize measure of classification ambiguity for different attributes. This method overcomes the sharp boundary problems; provide good accuracy dealing with continuous attributes and prediction problems. The experimental result is carried out by using 10% KDD Cup 99 benchmark network intrusion detection dataset. en_US
dc.language.iso en_US en_US
dc.publisher Tenth International Conference On Computer Applications (ICCA 2012) en_US
dc.subject Fuzzy Logic en_US
dc.subject Fuzzy C4.5 en_US
dc.subject Fuzzy Rules en_US
dc.subject Intrusion Detection en_US
dc.title A Network Intrusion Detection Model Using Fuzzy C4.5 Decision Tree en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics