Research Article
A Novel Method for Network Intrusion Detection
Algorithm 3
Classification algorithm.
| Input: network connection I and FCTA | | Output: category of I | (1) | Preprocessing the network connection I | (2) | | (3) | | (4) | for each i ∈ FCTA do | (5) | simValue ⟵ Sim( VC, i ) | (6) | Accumulate the similarity by category | (7) | end for | (8) | maxSim ⟵ 0, k ⟵ 0 | (9) | for i = 1 to n do | (10) | avgSim ⟵ Avg (each category simValue) | (11) | if avgSim > maxSim | (12) | maxSim ⟵ avgSim | (13) | k ⟵ i | (14) | end if | (15) | end for | (16) | the classification of d ⟵ k |
|