Research Article
Monitoring Research of Network Security Information System Based on Rough Set Data Mining
Table 8
Proportion of the intrusion behavior.
| Genome | Vote | Mushroom | Accuracy rate | Data size | Handling time |
| POSFS | 1.4 | 0.6 | 1.23 | 0.71 | 0.37 | CEFS | 1.84 | 1.46 | 1.61 | 1.48 | 1.94 | PSORSFS | 5.28 | 2.79 | 4.37 | 2.31 | 5.5 | CIQFS | 3.1 | 4.8 | 2.91 | 4.22 | 5.55 | Arithmetic | 4.94 | 2.42 | 2.71 | 4.01 | 3.39 | Tic-tac-toe | 1.19 | 1.52 | 2.11 | 1.26 | 6.72 |
|
|