ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Performance of data mining algorithms in unauthorized intrusion detection systems in computer networks

Journal: International Journal of Computer Techniques (Vol.2, No. 5)

Publication Date:

Authors : ; ; ;

Page : 61-66

Keywords : Intrusion Detection; Network; Data Mining.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In this article, we first normalized data by using random sampling conducted and chose a limited number of data. Then we determined the two types of clusters using hours and non-working hours and hours, and we implement the clusters ID3 and Decision tree algorithms. The results of our proposed method show that ID3 algorithm for high power at sorting and classification acts better than Decision tree. The purpose of this paper is to compare the performance of these two algorithms.

Last modified: 2015-10-28 10:54:06