Research Article
A Novel Method for Network Intrusion Detection
Algorithm 1
Data preprocessing algorithm.
| | Input: raw data file | | | Output: fuzzy triadic background (FTBac) | | (1) | cfMap ⟵ relationship between intrusion type and number | | (2) | for each i ∈ {raw data} do | | (3) | for each j ∈ {T} do | | (4) | strDS ⟵ Record[i][j] | | (5) | end for | | (6) | strDS ⟵ Record[i][m] converted by cfMap | | (7) | end for | | (8) | for i = 1 to n do | | (9) | | | (10) | for j = 1 to m − 1 do | | (11) | | | (12) | end for | | (13) | end for | | (14) | FTBac ⟵ standardize and normalize FTBac |
|