A DECISION TREE BASED TECHNIQUE FOR CLASSIFICATION OF IDS DATA SET.

{"title":"A DECISION TREE BASED TECHNIQUE FOR CLASSIFICATION OF IDS DATA SET.","authors":"","doi":"10.29121/ijesrt.v9.i6.2020.10","DOIUrl":null,"url":null,"abstract":"In the previous two decades, systems have encountered huge development that has accelerate a move in processing situations from brought together PC frameworks to organize data frameworks. An enormous volume of significant data, for example, individual profiles and Visa data is circulated and moved through systems. Consequently, arrange security has turned out to be a higher priority than at any other time. Be that as it may, given open and complex interconnected system frameworks, it is hard to build up a safe systems administration condition. Gatecrashers jeopardize framework security by slamming administrations, changing basic information, and taking significant data. In Information Security, interruption location is the demonstration of recognizing activities that endeavor to bargain the classification, uprightness or accessibility of an asset. It assumes a significant job in assault discovery, security check and system examine. This paper exhibits a refreshed choice tree based method for the characterization of interruption information. KDD 99 informational index is utilized for test work.","PeriodicalId":426715,"journal":{"name":"June-2020","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"June-2020","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.29121/ijesrt.v9.i6.2020.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In the previous two decades, systems have encountered huge development that has accelerate a move in processing situations from brought together PC frameworks to organize data frameworks. An enormous volume of significant data, for example, individual profiles and Visa data is circulated and moved through systems. Consequently, arrange security has turned out to be a higher priority than at any other time. Be that as it may, given open and complex interconnected system frameworks, it is hard to build up a safe systems administration condition. Gatecrashers jeopardize framework security by slamming administrations, changing basic information, and taking significant data. In Information Security, interruption location is the demonstration of recognizing activities that endeavor to bargain the classification, uprightness or accessibility of an asset. It assumes a significant job in assault discovery, security check and system examine. This paper exhibits a refreshed choice tree based method for the characterization of interruption information. KDD 99 informational index is utilized for test work.
基于决策树的ids数据集分类技术。
在过去的二十年中,系统经历了巨大的发展,加速了从汇集PC框架到组织数据框架的处理情况的转变。大量的重要数据,例如个人资料和Visa数据在系统中流通和移动。因此,安排安全已成为比任何时候都更高的优先事项。尽管如此,在开放、复杂、互联的系统框架下,很难建立一个安全的系统管理条件。闯入者通过攻击管理、更改基本信息和获取重要数据来危害框架的安全性。在信息安全中,中断位置是识别试图对资产的分类、正确性或可访问性进行交易的活动的演示。它在攻击发现、安全检查和系统检查方面起着重要的作用。本文提出了一种基于更新选择树的中断信息表征方法。测试工作采用kdd99信息索引。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信