UCSY's Research Repository

An Analysis of Rule and Decision Tree Based Intrusion Detection System

Show simple item record

dc.contributor.author Aung, Yi Yi
dc.contributor.author Min, Myat Myat
dc.date.accessioned 2019-07-03T07:34:56Z
dc.date.available 2019-07-03T07:34:56Z
dc.date.issued 2018-02-22
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/289
dc.description.abstract We are living in 21st century wherein the number of internet of things is competing with increasing population. Security is becoming a major concern for information technology over network. Therefore, people use technology to overcome every problem that comes in the network intrusions. Now many researchers and developers are trying to protect networks from various attacks but at the same time raise many questions, confusions and conflicts regarding their protecting technology. Because each approaches have advantages and disadvantages in detection. The system use rule based data mining techniques in intrusion detection system for network. And also it compares the approaches of rule based and tree based intrusion detection system by using 10 % kddcup’99 dataset. For rule based approach, we use K-means and JRip algorithms to classify internal and external security threats and attacks. For decision tree based approach, we use K-means and C4.5 algorithms to compare between detection method en_US
dc.language.iso en en_US
dc.publisher Sixteenth International Conferences on Computer Applications(ICCA 2018) en_US
dc.title An Analysis of Rule and Decision Tree Based Intrusion Detection System en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics