Performance of data mining algorithms in unauthorized intrusion detection systems in computer networks
Journal: International Journal of Computer Techniques (Vol.2, No. 5)Publication Date: 2015-09-01
Authors : Hadi Ghadimkhani; Ali Habiboghli; Rouhollah Mostafaei;
Page : 61-66
Keywords : Intrusion Detection; Network; Data Mining.;
Abstract
In this article, we first normalized data by using random sampling conducted and chose a limited number of data. Then we determined the two types of clusters using hours and non-working hours and hours, and we implement the clusters ID3 and Decision tree algorithms. The results of our proposed method show that ID3 algorithm for high power at sorting and classification acts better than Decision tree. The purpose of this paper is to compare the performance of these two algorithms.
Other Latest Articles
- An Improved Collaborative Filtering Algorithm Based on Tags and User Ratings
- Influence of race and the season on the chemical composition of cow's milk
- OPTIMAL INTERPOLATION OF IN-SITU AND SATELLITE PASSIVE MICROWAVE DATA FOR GLOBAL SNOW DEPTH ESTIMATION
- THE STUDY OF MEDICINAL PLANTS FOR ELBASAN DISTRICT
- ADVANTAGE AND DISADVANTAGE OF SHOPPING MALL AS AN URBAN BUILDING: KYIV CASE STUDY
Last modified: 2015-10-28 10:54:06