Please use this identifier to cite or link to this item:
http://hdl.handle.net/1942/32425
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | MAHMOOD, Deeman | - |
dc.contributor.author | Hussein, Mohammed Abdullah | - |
dc.date.accessioned | 2020-10-08T10:46:27Z | - |
dc.date.available | 2020-10-08T10:46:27Z | - |
dc.date.issued | 2014 | - |
dc.date.submitted | 2020-10-01T12:05:11Z | - |
dc.identifier.citation | Journal of Zankoy Sulaimani - Part A, 16 (1) , p. 69 -76 | - |
dc.identifier.uri | http://hdl.handle.net/1942/32425 | - |
dc.description.abstract | This work implements data mining techniques for analysing the performance of Naive Bayes, C4.5 Decision Tree, and the hybrid of these two algorithms the Naive Bayes Tree (NBTree). The goal is to select the most efficient algorithm to build a network intrusion detection system (NIDS). For our experimental analysis we used the new NSL-KDD dataset, which is a modified dataset of the KDDCup 1999 intrusion detection benchmark dataset, with a split of 66.0% for the training set and the remainder for the testing set. In the testing process Weka has been used, which is a Java based open source framework consisting of a collection of machine learning algorithms for data mining applications. In terms of accuracy the experimental results show that the hybrid NBTree is more precise than the other two approaches and the decision tree is better than the Naive Bayes algorithm. Otherwise, in terms of speed of response the Naive Bayes outperform the other two algorithms followed by Decision Tree and NBTree, respectively. | - |
dc.language.iso | en | - |
dc.subject.other | Decision Tree (C45) | - |
dc.subject.other | Intrusion detection System (IDS) | - |
dc.subject.other | Naïve Bayes (NB) | - |
dc.subject.other | NBTree | - |
dc.subject.other | NSL- KDD | - |
dc.subject.other | Weka | - |
dc.title | AnalyzingNB, DT and NBTree Intrusion Detection Algorithms | - |
dc.type | Journal Contribution | - |
dc.identifier.epage | 76 | - |
dc.identifier.issue | 1 | - |
dc.identifier.spage | 69 | - |
dc.identifier.volume | 16 | - |
local.bibliographicCitation.jcat | A2 | - |
local.type.refereed | Refereed | - |
local.type.specified | Article | - |
dc.identifier.doi | 10.17656/jzs.10285 | - |
dc.contributor.orcid | 0000-0002-9443-8139 | - |
local.provider.type | Orcid | - |
local.uhasselt.uhpub | no | - |
item.contributor | MAHMOOD, Deeman | - |
item.contributor | Hussein, Mohammed Abdullah | - |
item.accessRights | Open Access | - |
item.fulltext | With Fulltext | - |
item.fullcitation | MAHMOOD, Deeman & Hussein, Mohammed Abdullah (2014) AnalyzingNB, DT and NBTree Intrusion Detection Algorithms. In: Journal of Zankoy Sulaimani - Part A, 16 (1) , p. 69 -76. | - |
Appears in Collections: | Research publications |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.