Research Article
A Novel Method for Network Intrusion Detection
Algorithm 1
Data preprocessing algorithm.
| Input: raw data file | | Output: fuzzy triadic background (FTBac) | (1) | cfMap ⟵ relationship between intrusion type and number | (2) | for each i ∈ {raw data} do | (3) | for each j ∈ {T} do | (4) | strDS ⟵ Record[i][j] | (5) | end for | (6) | strDS ⟵ Record[i][m] converted by cfMap | (7) | end for | (8) | for i = 1 to n do | (9) | | (10) | for j = 1 to m − 1 do | (11) | | (12) | end for | (13) | end for | (14) | FTBac ⟵ standardize and normalize FTBac |
|