Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1501434.1501513acmotherconferencesArticle/Chapter ViewAbstractPublication PagespstConference Proceedingsconference-collections
research-article

Using an improved C4.5 for imbalanced dataset of intrusion

Published: 30 October 2006 Publication History

Abstract

The imbalance of dataset will directly affect the precision of classifier. PC4.5, an improved C4.5 algorithm is proposed. The experiments in MIT dataset indicate that PC4.5 is effective on imbalanced dataset and the scale of the decision tree could be reduced.

References

[1]
Ross J Quinlan. C4.5: Programs for machine learning{M}. American: Morgan Kaufman Publishers, 1993.
[2]
Zhang Qi-rui, Zhang Lin, Dong Shou-bin. The influence of class distribution on Text Categorization. Journal of Tsinghua University (Science and Technology). 2005 (45): 1802--1805
[3]
Witten IH, Frank E. Data Ming: Practical Machine Learning Tools and Techniques with Java Implementations. Seattle: Morgan Kaufimann Publishers 2000. 265--314.
[4]
Chris Drummond & Robert C. Holte. C4.5, Class Imbalance, and Cost Sensitivity: Why Under-Sampling beats Over-Sampling. in proceeding of Learning from Imbalanced Datasets II, ICML, Washington DC, 2003.
[5]
Prati, R. C., Batista, G. E. A. P. A., and Monard, M. C. Class Imbalances versus Class Overlapping: an Analysis of a Learning System Behavior. In MICAI (2004), pp. 312--321. LNAI 2972.
[6]
A. Kolcz, A. Chowdhury and J. Alspector, "Data Duplication: An Imbalance Problem?," ICML'2003 Workshop on Learning from Imbalanced Datasets, Washington, DC, USA, 2003

Cited By

View all
  • (2020)Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature SelectionNetwork and System Security10.1007/978-3-030-65745-1_16(277-291)Online publication date: 19-Dec-2020
  • (2018)RETRACTED ARTICLEMultimedia Tools and Applications10.1007/s11042-017-5057-377:3(3245-3260)Online publication date: 1-Feb-2018
  • (2016)Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak ClusteringApplied Cryptography and Network Security10.1007/978-3-319-39555-5_12(212-227)Online publication date: 9-Jun-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
PST '06: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
October 2006
389 pages
ISBN:1595936041
DOI:10.1145/1501434
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 October 2006

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Conference

PST06
PST06: International Conference on Privacy, Security and Trust
October 30 - November 1, 2006
Ontario, Markham, Canada

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 29 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature SelectionNetwork and System Security10.1007/978-3-030-65745-1_16(277-291)Online publication date: 19-Dec-2020
  • (2018)RETRACTED ARTICLEMultimedia Tools and Applications10.1007/s11042-017-5057-377:3(3245-3260)Online publication date: 1-Feb-2018
  • (2016)Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak ClusteringApplied Cryptography and Network Security10.1007/978-3-319-39555-5_12(212-227)Online publication date: 9-Jun-2016
  • (2011)Artificial neural network — Naïve bayes fusion for solving classification problem of imbalanced dataset2011 Fourth International Conference on Modeling, Simulation and Applied Optimization10.1109/ICMSAO.2011.5775584(1-5)Online publication date: Apr-2011
  • (2008)Random-Forests-Based Network Intrusion Detection SystemsIEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews10.1109/TSMCC.2008.92387638:5(649-659)Online publication date: 1-Sep-2008

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media