Probabilistic reasoning in intelligent systems: networks of plausible inference
Probabilistic reasoning in intelligent systems: networks of plausible inference
C4.5: programs for machine learning
C4.5: programs for machine learning
State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
Enhancements to the data mining process
Enhancements to the data mining process
Introduction to Bayesian Networks
Introduction to Bayesian Networks
AAAI'96 Proceedings of the thirteenth national conference on Artificial intelligence - Volume 1
Wrapper-based computation and evaluation of sampling methods for imbalanced datasets
UBDM '05 Proceedings of the 1st international workshop on Utility-based data mining
Decision tree classifier for network intrusion detection with GA-based feature selection
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Hybrid intelligent systems for network security
Proceedings of the 44th annual Southeast regional conference
Intrusion detection in web applications using text mining
Engineering Applications of Artificial Intelligence
Principled reasoning and practical applications of alert fusion in intrusion detection systems
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Automatically countering imbalance and its empirical relationship to cost
Data Mining and Knowledge Discovery
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Minimizing False Positives of a Decision Tree Classifier for Intrusion Detection on the Internet
Journal of Network and Systems Management
Data mining-based intrusion detectors
Expert Systems with Applications: An International Journal
Enhancing network based intrusion detection for imbalanced data
International Journal of Knowledge-based and Intelligent Engineering Systems
Information Sciences: an International Journal
FPGA based programmable embedded intrusion detection system
Proceedings of the 3rd international conference on Security of information and networks
Improving individual identification in security check with an EEG based biometric solution
BI'10 Proceedings of the 2010 international conference on Brain informatics
Exploring discrepancies in findings obtained with the KDD Cup '99 data set
Intelligent Data Analysis
Decision tree based light weight intrusion detection using a wrapper approach
Expert Systems with Applications: An International Journal
Computational intelligence for network intrusion detection: recent contributions
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
Using data field to analyze network intrusions
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Detecting novel network attacks with a data field
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Network intrusion detection system: a machine learning approach
Intelligent Decision Technologies
New exact concise representation of rare correlated patterns: application to intrusion detection
PAKDD'12 Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part II
Layered approach for intrusion detection using naïve Bayes classifier
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Proceedings of the Third Symposium on Information and Communication Technology
Using probabilistic generative models for ranking risks of Android apps
Proceedings of the 2012 ACM conference on Computer and communications security
Fuzzy particle swarm optimization for intrusion detection
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part V
Event stream database based architecture to detect network intrusion: (industry article)
Proceedings of the 7th ACM international conference on Distributed event-based systems
Proceedings of the 2013 Research in Adaptive and Convergent Systems
Hi-index | 0.00 |
Bayes networks are powerful tools for decision and reasoning under uncertainty. A very simple form of Bayes networks is called naive Bayes, which are particularly efficient for inference tasks. However, naive Bayes are based on a very strong independence assumption. This paper offers an experimental study of the use of naive Bayes in intrusion detection. We show that even if having a simple structure, naive Bayes provide very competitive results. The experimental study is done on KDD'99 intrusion data sets. We consider three levels of attack granularities depending on whether dealing with whole attacks, or grouping them in four main categories or just focusing on normal and abnormal behaviours. In the whole experimentations, we compare the performance of naive Bayes networks with one of well known machine learning techniques which is decision tree. Moreover, we compare the good performance of Bayes nets with respect to existing best results performed on KDD'99.