Research Article

A Novel Method for Network Intrusion Detection

Algorithm 1

Data preprocessing algorithm.
Input: raw data file
Output: fuzzy triadic background (FTBac)
(1)cfMap ⟵ relationship between intrusion type and number
(2)for each i ∈ {raw data} do
(3)  for each j ∈ {T} do
(4)   strDS ⟵ Record[i][j]
(5)  end for
(6)  strDS ⟵ Record[i][m] converted by cfMap
(7)end for
(8)for i = 1 to n do
(9)  
(10)  for j = 1 to m − 1 do
(11)   
(12)  end for
(13)end for
(14) FTBac ⟵ standardize and normalize FTBac