Research Article

Monitoring Research of Network Security Information System Based on Rough Set Data Mining

Table 8

Proportion of the intrusion behavior.

GenomeVoteMushroomAccuracy rateData sizeHandling time

POSFS1.40.61.230.710.37
CEFS1.841.461.611.481.94
PSORSFS5.282.794.372.315.5
CIQFS3.14.82.914.225.55
Arithmetic4.942.422.714.013.39
Tic-tac-toe1.191.522.111.266.72