Javascript must be enabled to continue!
Research on hybrid intrusion detection method based on the ADASYN and ID3 algorithms
View through CrossRef
<abstract>
<p>Intrusion detection system plays an important role in network security. Early detection of the potential attacks can prevent the further network intrusion from adversaries. To improve the effectiveness of the intrusion detection rate, this paper proposes a hybrid intrusion detection method that utilizes ADASYN (Adaptive Synthetic) and the decision tree based on ID3 algorithm. At first, the intrusion detection dataset is transformed by coding technology and normalized. Subsequently, the ADASYN algorithm is applied to implement oversampling on the training set, and the ID3 algorithm is employed to build a decision tree model. In addition, the model proposed by the research is evaluated by accuracy, precision, recall, and false alarm rate. Besides, a performance comparison is conducted with other models. Consequently, it is found that the combined model based on ADASYN and ID3 decision tree proposed in this research possesses higher accuracy as well as lower false alarm rate, which is more suitable for intrusion detection tasks.</p>
</abstract>
American Institute of Mathematical Sciences (AIMS)
Title: Research on hybrid intrusion detection method based on the ADASYN and ID3 algorithms
Description:
<abstract>
<p>Intrusion detection system plays an important role in network security.
Early detection of the potential attacks can prevent the further network intrusion from adversaries.
To improve the effectiveness of the intrusion detection rate, this paper proposes a hybrid intrusion detection method that utilizes ADASYN (Adaptive Synthetic) and the decision tree based on ID3 algorithm.
At first, the intrusion detection dataset is transformed by coding technology and normalized.
Subsequently, the ADASYN algorithm is applied to implement oversampling on the training set, and the ID3 algorithm is employed to build a decision tree model.
In addition, the model proposed by the research is evaluated by accuracy, precision, recall, and false alarm rate.
Besides, a performance comparison is conducted with other models.
Consequently, it is found that the combined model based on ADASYN and ID3 decision tree proposed in this research possesses higher accuracy as well as lower false alarm rate, which is more suitable for intrusion detection tasks.
</p>
</abstract>.
Related Results
Effect of Cumin Intercropping Density on Cotton Growth and System Economic Benefits under Subsurface Drip Irrigation
Effect of Cumin Intercropping Density on Cotton Growth and System Economic Benefits under Subsurface Drip Irrigation
Abstract
The mulch-free subsurface drip irrigation system demonstrated water-saving potential as an alternative to traditional mulch-based drip irrigation, while also elimi...
PREDIKSI PROFIT PADA PERUSAHAAN DENGAN KLASIFIKASI ALGORITMA C4.5
PREDIKSI PROFIT PADA PERUSAHAAN DENGAN KLASIFIKASI ALGORITMA C4.5
<p><em>In the construction project activities, planning is used as a reference for job implementers and becomes the standard of project implementation, including: docum...
Network intrusion detection method based on IEHO-SVM
Network intrusion detection method based on IEHO-SVM
As the growth of network technology, the network intrusion has become increasingly serious. An elephant herding optimization algorithm and support vector machine-based network intr...
Modeling Hybrid Metaheuristic Optimization Algorithm for Convergence Prediction
Modeling Hybrid Metaheuristic Optimization Algorithm for Convergence Prediction
The project aims at the design and development of six hybrid nature inspired algorithms based on Grey Wolf Optimization algorithm with Artificial Bee Colony Optimization algorithm ...
Modeling Hybrid Metaheuristic Optimization Algorithm for Convergence Prediction
Modeling Hybrid Metaheuristic Optimization Algorithm for Convergence Prediction
The project aims at the design and development of six hybrid nature inspired algorithms based on Grey Wolf Optimization algorithm with Artificial Bee Colony Optimization algorithm ...
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
Intrusion detection plays a pivotal aspect in providing security for the information and the main technology lies in identifying different networks in an accurate as well as precis...
HYBRID APPROACH FOR INTRUSION DETECTION USING MACHINE LEARNING
HYBRID APPROACH FOR INTRUSION DETECTION USING MACHINE LEARNING
That is why the development of highly effective Intrusion Detection Systems IDS, protecting networks from both known and unfamiliar threats, has become especially actual due to the...
Advanced frameworks for fraud detection leveraging quantum machine learning and data science in fintech ecosystems
Advanced frameworks for fraud detection leveraging quantum machine learning and data science in fintech ecosystems
The rapid expansion of the fintech sector has brought with it an increasing demand for robust and sophisticated fraud detection systems capable of managing large volumes of financi...

