Research Article

Network Intrusion Anomaly Detection Model Based on Multiclassifier Fusion Technology

Algorithm 1

Majority voting
Input: the results set predicted by each base classifiers Y;
Output: final prediction result C;
(1)a [2] ← {0, 0};
(2) for y in Y do
(3)  a [y] ← a [y] + 1;
(4) end for
(5)C ← argmax (a)
(6) return C