Classifier Selection Model Based on Gain Ratio Feature Selection Method
Abstract
Keywords
Full Text:
PDFReferences
P.Amudha, H.Abdul Rauf,” Performance Evaluation of Data Mining Techniques in Intrusion Detection”, Proc. of 2nd Intl Conference on Intelligent Information systems and management, pp. 66, 2011.
R.Kohavi,G.H.John, “Wrappers for feature subset selection”,Artificial Intelligence,vol.1,no.2,pp.273-324,1997.
R.Quinlan, C4.5: Programs for Machine Learning, Morgan Kaufmann Publishers,San Mateo,CA,1993.
Dokas, P., Ertoz, L., Lazarevic, A., Srivastava, J., & Tan, P. N. “Data mining for network intrusion detection”, Proceeding of NGDM, pp.21–30, 2002.
Wu, S., and Yen, E.” Data mining-based intrusion detectors”, Expert Systems with Applications, vol.36, no.3, pp.5605–5612, 2009.
N. B. Amor, S. Benferhat, and Z. Elouedi. “Naive Bayes vs Decision trees in intrusion detection systems”, pp. 420–424, 2004.
Gang Wang. Jinxing Hao, Jian ma, Lihua Huanh,” A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering”, Expert Systems with Applications,2010,doi:10.1016/j.eswa.2010.02.102
R. Kohavi, “Scaling Up the Accuracy of Naïve-Bayes Classifiers: A Decision-tree Hybrid,” Proc. of the 2th International Conference on Knowledge Discovery and Data Mining (KDD‟96), pp.202-207, 1996.
J. Zhang and M. Zulkernine. “Network intrusion detection using Random Forests”, Proc. of the Third Annual Conference on Privacy, Security and Trust, pp. 53–61, 2005
Asha Gowda Karegowda, A.S.Manjunath,M. A.Jayaram,”Comparative Study of Feature selection using Gain Ratio and Correlation based feature selection”,Intl Journal of Information Technology and Knowledge management,vol.2,no.2,pp.271-277.
P.Amudha, H.Abdul Rauf,” Performance Analysis of Data Mining Approaches in Intrusion Detection”, Proc. of IEEE Intl Conference on Process Automation, Control and Computing, pp.1-6, 2011 KDD99,KDDCup 1999 data(1999), http://kdd.ics.uci.edu/
Databases/kddcup99/10 percent.gz.
Daniel T, Larase, Discovering Knowledge in Data. An introduction to Data Mining, John Wiley & Sons, Inc, 2005.
John,G.H.,Langley,P,” Estimating Continuous Distributions in Bayesian classifiers”, In proc. of 11th conf. on Uncertainty in artificial Intelligence,1995.
L.Breiman,” Random Forests”, Machine Learning, vol. 45, no. 1, pp. 5-23, 2001.
www.cs.waikato.ac.nz/ml/weka/.
D. E. Denning, "An intrusion-detection model." IEEE Transactions on Software Engineering, Vol. SE-13,no. 2,pp.222-232, 1987.
Carl Endorf, Eugene Schultz, Jim Mellander, Intrusion Detection & Prevention, McGraw-Hill, 2004.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.