Research Article

A Novel Method for Network Intrusion Detection

Algorithm 2

Algorithm of constructing the fuzzy attribute triadic concept vector model.
Input: fuzzy triadic background (FTBac)
Output: fuzzy attribute triadic concept vector (FCTA)
(1) Define and initialize
(2)for each j ∈ {C} do
(3)  binDS ⟵ relationship between object and attribute
(4)  for i = 1 to k do
(5)   
(6)   TConSe ⟵ {triCon, triCon∩TConSe}
(7)  end for
(8)  }
(9)end for
(10)for i = 1 to TConSe.size() do
(11)  for j = 1 to m do
(12)  
(13)  end for
(14)end for
(15)for i = 1 to TConSe.size() do
(16)  FCTA ⟵ unitize TConSe
(17)end for
(18) return FCTA