期刊名称:Oriental Journal of Computer Science and Technology
印刷版ISSN:0974-6471
出版年度:2010
卷号:3
期号:1
页码:155-159
语种:English
出版社:Oriental Scientific Publishing Company
摘要:The earlier approaches are relied upon various datasets for detecting network attacks. A huge dataset (size of 744 MB data with 4,940,000 records ) was used for ascertaining network attacks. The processing becomes time costly. The reduction and formulation of representive dataset from initial dataset is important. The computational complexity is reduced through the process of Rough-set theory and by utilizing the logic of correlation, functional dependency and closure property. A comparative analysis is performed on an experimental basis and the results are validated and their purity/perfectionality is measured by the aid of SVM (Support Vector Machine ) comparatively.
关键词:Intrusion Data Set ; Correlation ; Functional Dependency ; Closer Property ; Cardinality