Computer Science ›› 2018, Vol. 45 ›› Issue (4): 157-162.doi: 10.11896/j.issn.1002-137X.2018.04.026

Previous Articles     Next Articles

Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree

LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin   

  • Online:2018-04-15 Published:2018-05-11

Abstract: Combining with the idea of TF-IDF algorithm,the frequency of characteristics(Eigen Frequency),the frequency of forest(Forest Frequency) and the pseudo boosting decision tree(PBDT) were put forward,solving the margi-nalized problem of wrong data with the increasing number of iterations for gradient boosting decision tree(GBDT).In PBDT,all the decision trees produce respectively in data sets after the original data set of the Bootstrapping,without aiming at each iteration to sample data sets.Then intranet defense experiment was conducted on distributed cluster.The experimental results show that on the training set with a certain scale,PBDT has better prediction accuracy.

Key words: Pseudo boosting decision tree,Distributed cluster,Intranet defense

[1] PRADHAN B.A comparative study on the predictive ability of the decision tree,support vector machine and neuro-fuzzy mo-dels in landslide susceptibility mapping using GIS[J].Computers & Geosciences,2013,51(2):350-365.
[2] SHOTTON J.Real-time human pose recognition in parts from single depth images[J].Communications of the ACM,2013,56(1):116-124.
[3] FREUND Y,SCHAPIRE R E.A Decision-Theoretic Generalization of On-Line Learning and an Application to Boosting[J].Journal of Computer and System Sciences,1997,5(1):119-139.
[4] GLIGOROV V V,WILLIAMS M.Efficient,reliable and fasthigh-level triggering using a bonsai boosted decision tree[J].Journal of Instrumentation,2012,8(2):6.
[5] RUTKOWSKI L.Trees for Mining Data Streams Based on the McDiarmid’s Bound[J].IEEE Transactions on Knowledge and Data Engineering,2013,25(6):1272-1279.
[6] SCHAPIRE R E.The strength of weak learn ability[J].Ma-chine Learning,1990,5(2):197-227.
[7] XIE J B.Research and Implementation of Intranet Security Situa-tion Awareness Technology[D].Guangzhou:Guangdong University of Technology,2015.(in Chinese) 谢锦彪.内网安全态势感知技术的研究与实现[D].广州:广东工业大学,2015.
[8] BREIMAN L.Bagging predictors [J].Machine Learning,1996,24(2):123-140.
[9] SCHAPIRE R E.A brief introduction to boosting[C]∥International Joint Conference on Artificial Intelligence.Sweden,1999:1401-1406.
[10] SCHAPIRE R E,SINGER Y.Improved boosting algorithmsusing confidence-rated predictions[J].Machine Learning,1999,37(3):297-336.
[11] WITTEN I H,FRANK E,HALL M A.Data Mining:Practical Machine Learning Tools and Techniques(Second Edition)[M].San Francisco:Morgan Kaufmann publications,2005.
[12] PAIK J H.A novel TF-IDF weighting scheme for effective ran-king[C]∥36th International ACM SIGIR Conference on Research and Development in Information Retrieval.2013:343-352.
[13] WU H C,LUK R W P,WONG K F,et al.Interpreting TF-IDF term weights as making relevance decisions[J].ACM Transactions on Information Systems,2008,26(3):55-59.
[14] ESCALANTE H J.Term-weighting learning via genetic Pro-gramming for text classification[J].Knowledge-Based Systems,2014,83(1):176-189.
[15] KUNCORO B A,ISWANTO B H.TF-IDF method in ranking keywords of Instagram users’ image captions[C]∥International Conference on Information Technology Systems & Innovation.2015:1-5.

No related articles found!
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .