In order to timely and properly analyse the customer credit assessment, and to speed up the decision-making speed, here introduced the application of data mining technology used in the bank on the users" evaluati...
详细信息
In order to timely and properly analyse the customer credit assessment, and to speed up the decision-making speed, here introduced the application of data mining technology used in the bank on the users" evaluation, and establish a decision tree model of customer credit evaluation which is aimed at improving the credit rating quality . And introduced the basic process of decision tree algorithm. Bank customer's credit is classified as background. Using the decision tree algorithmc4.5 as the most classic tools, specific studies of business understanding, data understanding, data preparation, modeling, evaluation and implementation of aspects of publishing have been done. customer credit, using the decision tree classification algorithm, obtained a series of decision rules with which a bank to make the right decisions.
Discovery of malicious correlations in computer networks has been an emergent problem motivating extensive research in computer science to develop improved intrusion detecting systems (IDS). In this manuscript, we pre...
详细信息
ISBN:
(纸本)9781467313421
Discovery of malicious correlations in computer networks has been an emergent problem motivating extensive research in computer science to develop improved intrusion detecting systems (IDS). In this manuscript, we present a machine learning approach known as Decision Tree (c4.5) algorithm and Geneticalgorithm, to classify such risky/attack type of connections. The algorithm obtains into consideration dissimilar features in network connections and to create a classification rule set. Every rule in rule set recognizes a particular attack type. For this research, we implement a GA, c.45 and educated it on the KDD cup 99 data set to create a rule set that can be functional to the IDS to recognize and categorize dissimilar varieties of assault links. During our study, we have developed a rule set contain of six rules to classify six dissimilar attack type of connections that fall into 4 modules namely DoS, U2R, root to local and probing attacks. The rule produces works with 93.70% correctness for detecting the denial of service type of attack connections, and with significant accuracy for detecting the root to local, user to root and probe connections. Results from our experiment have given hopeful results towards applying enhanced geneticalgorithm for NIDS.
The purpose of this paper is to improve the quality of engineering project grading, the basic processes of data mining technique are introduced. Taking the engineering project grading as background, the implement cycl...
详细信息
The purpose of this paper is to improve the quality of engineering project grading, the basic processes of data mining technique are introduced. Taking the engineering project grading as background, the implement cycles such as business understanding, data understanding, data preparation, modeling, evaluation and deployment are studied in detail. During modeling, the decision tree is adopted as analyzing modeling, and the conventional c4.5 algorithm is adapted. The adapted algorithm is applied to the engineering project grading, and its result is compared with that of conventional c4.5 algorithm. The comparing result demonstrates that for the complex system such as engineering project grading, it can improve in a certain extent on precision and obtained structure of decision tree, it can improve the quality of engineering project grading.
To found security events from web logs has become an important aspect of network *** paper proposes a website anomaly detection model based on *** creating a anomaly feature sets of the model,c4.5 algorithm was used t...
详细信息
To found security events from web logs has become an important aspect of network *** paper proposes a website anomaly detection model based on *** creating a anomaly feature sets of the model,c4.5 algorithm was used to improve feature sets,making the abnormal records in feature sets store *** logs in website with the treated feature stes,the model ultimately achieves the purpose of checking website’s security event fast and accurately.
Traditional intrusion detection technology exists a lot of problems, such as low performance, low intelligent level, high false alarm rate, high false negative rate and so on. In this paper, c4.5 decision tree classif...
详细信息
Traditional intrusion detection technology exists a lot of problems, such as low performance, low intelligent level, high false alarm rate, high false negative rate and so on. In this paper, c4.5 decision tree classification method is used to build an effective decision tree for intrusion detection, then convert the decision tree into rules and save them into the knowledge base of intrusion detection system. These rules are used to judge whether the new network behavior is normal or abnormal. Experiments show that: the detection accuracy rate of intrusion detection algorithm based on c4.5 decision tree is over 90%, and the process of constructing rules is easy to understand, so it is an effective method for intrusion detection.
The operational planners in power grid companies perform a large number of offline voltage stability studies for a variety of operating conditions. How to effectively determine voltage stability limits from massive am...
详细信息
ISBN:
(纸本)9781510835429
The operational planners in power grid companies perform a large number of offline voltage stability studies for a variety of operating conditions. How to effectively determine voltage stability limits from massive amount of offline data has become a challenge for operational planners. This paper applies decision tree(DT) to extract operating guidelines from off-line analysis results. case study results on a practical power system prove that voltage stability operating guidelines, which are extracted by decision tree, can be used by system operators for online monitoring and control of electric power systems.
Decision trees are generally generated from top to bottom,and each decision or event may lead to two or more *** set is characterized by the use of imprecise,uncertain,partial real information to obtain easy to proces...
详细信息
Decision trees are generally generated from top to bottom,and each decision or event may lead to two or more *** set is characterized by the use of imprecise,uncertain,partial real information to obtain easy to process,robust,low-cost decision-making *** tree method is widely used in enterprise *** sets use upper and lower approximations to describe uncertainty,which makes the boundary clear and reduces the randomness of algorithm *** paper presents construction of decision analysis system based on improved decision tree pruning algorithm and rough set classification Theory.
In order to provide decision and guidance for the future development of libraries, based on the Data Mining Decision Tree c4.5 algorithm, taking the library of changchun Institute of Technology as an example, by struc...
详细信息
In order to provide decision and guidance for the future development of libraries, based on the Data Mining Decision Tree c4.5 algorithm, taking the library of changchun Institute of Technology as an example, by structuring decision tree and mining the factors which restrain users from using the library digital resource, the author gets some potential links among the factors affacting the using of library digital resource, the needs of university library users can be analyzed effectively with this algorithm.
HTTP-tunnel is always used by Trojans and backdoors to avoid the detection of firewalls,and it is a threat of network ***-tunnel traffic is encrypted now, and the only way to detect the HTTP-tunnel traffic is based on...
详细信息
HTTP-tunnel is always used by Trojans and backdoors to avoid the detection of firewalls,and it is a threat of network ***-tunnel traffic is encrypted now, and the only way to detect the HTTP-tunnel traffic is based on statistical features of transport *** are a few methods in detection of HTTP-tunnel,and the statistical fingerprinting is an effective *** method of statistical fingerprinting is instability because the features which the method using is the packet size and the inter-arrival time,and its accuracy is determined by the volume of training *** suggested a method based on c4.5 algorithm which using the features of packet and *** to the algorithm of fingerprint,the c4.5 algorithm had some advantages in stability,accuracy and efficiency in our experiment.
HTTP-tunnel is always used by Trojans and backdoors to avoid the detection of firewalls, and it is a threat of network security. HTTP-tunnel traffic is encrypted now, and the only way to detect the HTTPtunnel traff...
详细信息
HTTP-tunnel is always used by Trojans and backdoors to avoid the detection of firewalls, and it is a threat of network security. HTTP-tunnel traffic is encrypted now, and the only way to detect the HTTPtunnel traffic is based on statistical features of transport layer. There are a few methods in detection of HTTP-tunnel, and the statistical fingerprinting is an effective method. The method of statistical fingerprinting is instability because the features which the method using is the packet size and the inter-arrival time, and its accuracy is determined by the volume of training set We suggested a method based on c4.5 algorithm which using the features of packet and flow. comparing to the algorithm of fingerprint, the c4.5 algorithm had some advantages in stability, accuracy and efficiency in our experiment
暂无评论