A Bayes Learning-based Anomaly Detection Approach in Large-scale Networks. Wei-song HE a*
|
|
- August Robbins
- 5 years ago
- Views:
Transcription
1 17 nd International Conference on Computer Science and Technology (CST 17) ISBN: A Bayes Learng-based Anomaly Detection Approach Large-scale Networks Wei-song HE a* Department of Electronic Information Engeerg, Liangjiang International College, Chongqg University of Technology a heweisong@gmail.com *Correspondg author Keywords: Anomaly detection, Network traffic, Bayes learng, Feature extraction, Detection algorithm. Abstract. With quick developments of new application patterns and network technologies, network anomalies have an important impact on network operations. How to accurately detect network anomalies has become the hot topic current communication networks. This paper proposes a new detection approach to diagnose the anomaly network traffic. Firstly, we use the Bayes learng theory to describe network traffic properties. By the learng process, normal network traffic can correctly be modeled. Secondly, the feature extraction is used to differentiate abnormal network traffic from normal huge traffic. Thirdly, the detail detection algorithm is presented to fd the anomalous component network traffic. Fally, we carry out the detailed simulation experiments. Simulation results dicate that our approach is effective. Introduction With quick advance of new communication technologies and application patterns, new network anomalies have the creasg appearance current networks. Particularly, network traffic has quickly creased communication networks. Network anomalies have impact on network performance and normal operations [1-]. How to effectively detect and fd abnormal components networks has become a larger challenge [3-4]. Moreover, network anomalies imply users' and network devices' abnormal behaviors their operation process. These behaviors turn degrade network performance and user experience. Accordgly, this further decreases the maximum profit of network providers and adds user costs. Specially, anomalous network traffic has produced the heavy damage to current networks. Therefore, anomaly detections for network traffic have become an important topic current academic and dustries [-8]. Some anomaly detection technologies have been proposed to diagnose network traffic. The transformation doma-based analysis methods, such as wavelet analysis, time doma transformation, frequency transformation, and so on, are used to fd anomalous network traffic [, ]. These methods achieved the fairly accurate detections for abnormal network traffic. Information metrics [3] and parametric methods [9] were aloes exploited to detect network traffic anomalies. By such this way, network traffic can be characterized and extracted different metrics or mode functions. Additionally, the parameter-based detection method could diagnose the abnormal part network traffic [1-11]. Periodicity features were characterized and modeled to fd out traffic 4
2 anomalies communication networks [7]. Accordgly, a period signal model could accurately to detection and diagnose abnormal network traffic. Additionally, the detection method for multimedia traffic was also presented to guarantee network performance [8]. A new detection approach was proposed to fd out abnormal network events [1-1]. To effectively detect abnormal network traffic, the spectral kurtosis theory was used to diagnose abnormal network traffic [16]. Dynamic detection technologies were presented to fd and identify abnormal dynamic traffic flow communication networks [4]. The formation theory analysis method was effectively used to extract anomalous network traffic components [17]. However, these approaches still hold the larger detection errors. This motivates us to research the new method to detect network traffic anomalies. This paper presents a new method to detect the anomaly parts network traffic. Our approach uses the Bayes learng theory to describe the normal network traffic and build the correspondg normal traffic model. Firstly, we regard network traffic as a dynamic Bayes random process. The correspondg Bayes theory model is used to characterize network traffic. Secondly, to accurately model network traffic, we describe the network traffic modelg problem as a Bayes learng process. By the Bayes learng, we can effectively capture the dynamic nature normal network traffic. In such a case, we can accurately build the correct network traffic model for normal situation. Accordgly, we simplify the complex network traffic modelg issue to the simple Bayes learng process. To describe network traffic correlations time doma, we transform network traffic sequence to a dynamic matrix accordg to the common destation of traffic flows. Then each row of dynamic traffic is used to perform the Bayes learng the distribution way. The correspondg extractg process is carried out the Bayes learng process. Thirdly, an appropriate detection threshold identification method is presented to fd out the abnormal network traffic. At the same time, we also propose an anomaly detection algorithm to perform the accurate and effective identification of anomalous network traffic. Simulation results show that our approach is effective and feasible The remag of this paper is arranged as follows. We proposed our detection method Section. In Section 3, we present the simulation results and analysis. Fally, we conclude our work Section 4. Problem Statement For any network traffic, we can refer it as a random process the time doma, namely x = { x(1), x(),...} where x() i (wherei = 1,,... ) represents the value of traffic flow x at time sloti. Network traffic x follows the normal process distribution as follows: 1 ( x μ) PX ( = x) = exp( ) (1) πδ δ where μ and δ are the mean value and variance of the normal process X. Generally, network traffic x() t at time slot t is correlated with network traffic x( z ) (where z = t 1, t,..., t n) before time slot t. In such a case, the Bayes theory is used to describe and model network traffic at time slot k as follows: PXk ( ( ), Xk ( 1), Xk ( ),...) PX ˆ( ) = PXk ( ( ) Xk ( 1), Xk ( ),...) = PXk ( ( 1), Xk ( ),...) ()
3 Without loss of generality, we only take to account the correlations of network traffic of - before with the current network traffic. This is reasonable because network traffic holds strongest correlations with network traffic of several closest to current time slot. In contrast, selectg network traffic of the - is appropriate and computationally simple. Therefore, Equation () can be converted to: PXk ( ( ), Xk ( 1), Xk ( ),..., Xk ( )) PXk ( ( ) Xk ( 1), Xk ( ),..., Xk ( ),) = PXk ( ( 1), Xk ( ),..., Xk ( )) Equation (3) can effectively describe the dynamic traffic of each network flow. However, different network flows hold the larger correlation space. Particularly, network traffic of flows with common destations exhibits larger space correlations. Thereby, we arrange network traffic with common destations to a row to construct an formation matrix about network traffic. Network traffic of all flows the network can be denoted as u= { u( t) i, j = 1,,..., n} and n is an teger. Then we atta a new matrix as follows: u11( t), u1( t),..., u1n ( t) u ( t), u ( t),..., u ( t)... un1( t), un( t),..., unn( t) 1 n = n n = Ut () { u()} t Each low Equation (4) holds the common destation. The traffic of these flows has the stronger space correlations, while they are dependent time. Therefore, we jotly analyze the traffic of each low the matrix Equation (4). The followg equation can be obtaed: uˆ ( t) = E( u( t)) [ ˆ( ( ))... ˆ( ( ))... ˆ = P u t P u t P( u ( t))] du ( t)... du ( t) () i i1 ik i1 k j uˆ () t Equation () is a function with respect to μ and δ for network flows from f i1 to f. Equation () can be further denoted as: uˆ ( t) = E( ui ( t) μi1, μi,..., μ, δi1, δi,..., δ) [ Pˆ ( u (), t μ, δ )... Pˆ ( u (), t μ, δ )... Pˆ ( u (), t μ, δ )] du ()... t du () t = k j i1 i1 i1 ik i i i1 Accordg to Equation (6), by the Bayes learng process N network traffic samples, we can decide the value of μi1, μi,..., μ, δi1, δi,..., δ. In such a case, we build the model about normal network traffic. Accordgly, we construct the below detection process for the traffic of each network flow u () t as follows: Δ u () t = u () t uˆ () t (7) Compute the variance of Δ u () t Equation (6) as follows: Δ d = var( Δ u ( t)) (8) We use the followg anomaly identification method: (3) (4) (6) 6
4 u () t is anomalous, if Δ u () t >Δd u () t is not anomalous, if Δu () t Δd Accordg to Equation (9), we can perform the detection process for network traffic time. Equations ()-(9) show our detection approach for the dynamic network traffic. Now, we propose our detection algorithm. The steps of our algorithm are as follows: Step 1: Give network traffic u= { u ( t) i, j = 1,..., n}, the number N of traffic samples. Step : Accordg to Equation (4), construct the formation matrix Ut () about network traffic. Let j = 1. Step 3: For row i the formation matrix Ut, () accordg to Equations (1)-(3) and the Bayes learng method, use the N network traffic samples to decide the parameters μ, δ of the traffic of network flow u () t. Step 4: Build the model about the traffic of network flow u () t usg the parameters μ, δ, namely attag the followg equation: 1 ( u( t) μ ) PU ( ( t) = u( t)) = exp( ) (1) πδ δ Step : If i < n, let j = j+ 1 and go to back Step 3. Step 6: Build the below jot distribution density function of u( t) = { u ( t),..., u ( t)} : i i1 (9) 1 x 16 (a) Bayes learng results 1 x 16 (a) background traffic (b) Bayes learng relative errors x 16 (b) anormal traffic Figure 1. Bayes learng results and relative errors for network traffic Figure. Network traffic without and with anomalies. pu ( ( t)) = N( μ, μ,..., μ δ, δ,..., δ ) (11) i i1 i, i1 i Step 7: Accordg to Equation (6), atta the estimation uˆ () t of network traffic u() t. 7
5 Step 8: Through Equation (7), compute the deviation Δ u () t of network traffic u() t. Step 9: By Equation (8), calculate the variance d Δ for network traffic u () t. Step 1: Then we use Equation (9) to perform the makg-decision process. If Δ u ( t) > Δ d, network traffic is anomalous. Step 11: If the detection process is fished, save the detection results to the file and exit. Or otherwise go back to Step 7 to contue the detection process. Simulation Result and Analysis Now we carry out the simulations to validate our detection approach for network traffic anomalies. In our test process, we ject anomalous network traffic to normal background network traffic at four different of 4, 8, 1, and 14 with the duration of, respectively. We run 1 times simulation to atta the average detection performance for our detection method. The detection threshold Equation (8) is established accordg to our detection algorithm. In our simulations, we discuss the model performance of network traffic built accordg to the Bayes learng process, and anomaly detection ability. We use the data from the real network to carry out our simulation process. In our experiment, we select the first 3 samples to build our traffic model. We construct a formation matrix about network traffic to carry out jot analysis process. Figure 1 shows the Bayes learng results and relative errors for network traffic. Figure 1 (a) shows that our method can effectively estimate network traffic usg the Bayes learng process, where the estimations follow the dynamic change of the real network traffic. Figure 1 (b) denotes that the estimation results of our method hold the small estimation errors. This dicates that our method can capture the network traffic nature and change. More importantly, we only use the first 3 to build the model about network traffic, while we can atta the accurate estimations. This states that our method can effectively perform the feature characterization of network traffic. Figure plots the network traffic without anomalies and with anomalies. From Figure, we are able to fd that there are no difference between normal network traffic and abnormal network traffic. The anomalous network traffic components hide the larger normal network traffic, which is very difficult to fd and diagnose. 1 x 16 (a) Bayes learng results for network traffic with anomalies x 1 7 (b) Bayes learng errors for network traffic with anomalies Figure 3. Bayes learng results for network traffic with anomalies. 8
6 1 (a) Smoothg deviations (b) Detectg anomaly Figure 4. Deviation smoothg and anomaly detection. Figure 3 plots the Bayes learng results and relative errors for network traffic with anomalies. Different Figure 1, we can fd that for network traffic with anomalies, our method can effectively exhibit the larger deviations for the anomalous network traffic. Figure 4 shows the traffic anomaly detection usg our method. To detection the anomalies, we smooth the deviations of network traffic, which can effectively embody network traffic deviation from normal components. Then we exploit the appropriate detection threshold to fd out the anomalous network traffic. Figure 4 shows that our method can effectively detect diagnose the anomalous traffic. Conclusions This paper proposes a new detection approach to detect the anomaly components network traffic, usg the Bayes learng theory. By Bayes learng, we can describe the normal network traffic and build the correspondg normal traffic model. Through Bayes learng, we describe the network traffic modelg problem as a Bayes learng process. Then we can effectively capture the dynamic nature normal network traffic. We transform network traffic sequence to a dynamic matrix accordg to the common destation of traffic flows so that we can describe network traffic correlations time doma. Then each row of dynamic traffic is used to perform the Bayes learng the distribution way. The correspondg extractg process is carried out the Bayes learng process. We also propose an anomaly detection algorithm to perform the accurate anomalous detection for network traffic. Fally, simulations show that our method is feasible and effective for detectg anomalous components network traffic. Acknowledgement This paper is supported by the Scientific and Technological Research Program of Chongqg Municipal Education Commission (Grant No. KJ18). References [1] M. Ahmed, A. N. Mahmood, J. Hu. A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 16, 6(1):
7 [] D. Jiang, Z. Xu, P. Zhang, et al. A transform doma-based anomaly detection approach to network-wide traffic. Journal of Network and Computer Applications, 14, 4(): [3] Y. Xiang, K. Li, and W. Zhou. "Low-rate DDoS attacks detection and trace back by usg new formation metrics," IEEE Transactions on Information Forensics and Security, 11, 6(): [4] G. Thatte, U. Mitra, and J. Heidemann. "Parametric methods for anomaly detection aggregate traffic," IEEE/ACM Transactions on Networkg, vol. 19, no., pp. 1-, 11. [] D. Jiang, Y. Han, Z. Xu, et al, A time-frequency detectg method for network traffic anomalies, Proc. ICCP 1, 1, pp [6] W. Xiong, H. Hu, N. Xiong, et al. Anomaly secure detection methods by analyzg dynamic characteristics of the network traffic cloud communications. Information Sciences, 14, 8(14): [7] T. Akgül, S. Baykut, M. E. Kantarci, et al. Periodicity-based anomalies self-similar network traffic flow measurements. IEEE Transactions on Instrumentation and Measurement, 11, 6(4): [8] D. Jiang, Z. Yuan, P. Zhang, et al. A traffic anomaly detection approach communication networks for applications of multimedia medical devices. Multimedia Tools and Applications, 16, onle available, pp. 1-. [9] G. Thatte, U. Mitra, J. Heidemann. Parametric methods for anomaly detection aggregate traffic. IEEE Transactions on Networkg, 11, 19(): 1-. [1] D. Jiang, W. Q, L. Nie, et al. Time-frequency detection algorithm of network traffic anomalies, Proc. ICIIM'1, 1, pp [11] G. Thatte, U. Mitra, and J. Heidemann. "Parametric methods for anomaly detection aggregate traffic," IEEE/ACM Transactions on Networkg, vol. 19, no., pp. 1-, 11. [1] B. Eriksson, P. Barford, R. Bowden, et al. Basisdetect: A model-based network event detection framework, Proc. IMC, pp , 1. [13] D. Jiang, C. Yao, Z. Xu, et al. Multi-scale anomaly detection for high-speed network traffic. Transactions on Emergg Telecommunications Technologies, 1, 6(3): [14] M. H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita. A multi-step outlier-based anomaly detection approach to network-wide traffic. Information Sciences, 16, 348(): [1] J. Kevric, S. Jukic, A. Subasi. An effective combg classifier approach usg tree algorithms for network trusion detection. Neural Computg and Applications, 16, onle available. [16] D. Jiang, C. Yao, W. Zhang, et al. A detection algorithm to anomaly network traffic based on spectral kurtosis analysis, Proc. ITSim 13, 13, pp [17] P. Tune, D. Veitch. Samplg vs sketchg: An formation theoretic comparison, Proc. of INFOCOM, 11, pp:
Evidence Gathering for Network Security and Forensics DFRWS EU Dinil Mon Divakaran, Fok Kar Wai, Ido Nevat, Vrizlynn L. L.
Evidence Gathering for Network Security and Forensics DFRWS EU 2017 Dinil Mon Divakaran, Fok Kar Wai, Ido Nevat, Vrizlynn L. L. Thing Talk outline Context and problem Objective Evidence gathering framework
More informationDDoS Attack Detection Using Moment in Statistics with Discriminant Analysis
DDoS Attack Detection Using Moment in Statistics with Discriminant Analysis Pradit Pitaksathienkul 1 and Pongpisit Wuttidittachotti 2 King Mongkut s University of Technology North Bangkok, Thailand 1 praditp9@gmail.com
More informationUNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK
UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK Dr G.Charles Babu Professor MRE College Secunderabad, India. charlesbabu26@gmail.com N.Chennakesavulu Assoc.Professor Wesley PG
More informationImage Enhancement Techniques for Fingerprint Identification
March 2013 1 Image Enhancement Techniques for Fingerprint Identification Pankaj Deshmukh, Siraj Pathan, Riyaz Pathan Abstract The aim of this paper is to propose a new method in fingerprint enhancement
More informationNetwork Traffic Measurements and Analysis
DEIB - Politecnico di Milano Fall, 2017 Introduction Often, we have only a set of features x = x 1, x 2,, x n, but no associated response y. Therefore we are not interested in prediction nor classification,
More informationFace Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method
Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 5, September 2016 Face Recognition ased on LDA and Improved Pairwise-Constrained
More informationLow-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation
Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation Monowar H. Bhuyan and Abhishek Kalwar Dept. of Computer Science & Engg. Kaziranga University, Jorhat-785006, Assam
More informationEnhanced Multivariate Correlation Analysis (MCA) Based Denialof-Service
International Journal of Computer Science & Mechatronics A peer reviewed International Journal Article Available online www.ijcsm.in smsamspublications.com Vol.1.Issue 2. 2015 Enhanced Multivariate Correlation
More informationDiscriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric
Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric HeyShanthiniPandiyaKumari.S 1, Rajitha Nair.P 2 1 (Department of Computer Science &Engineering,
More informationVideo Inter-frame Forgery Identification Based on Optical Flow Consistency
Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong
More informationCLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS
CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of
More informationModel the P2P Attack in Computer Networks
International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Model the P2P Attack in Computer Networks Wei Wang * Science and Technology on Communication Information
More informationArtificial Neural Network To Detect Know And Unknown DDOS Attack
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 2, Ver. II (Mar.-Apr. 2017), PP 56-61 www.iosrjournals.org Artificial Neural Network To Detect Know
More informationNetwork Traffic Anomaly Detection based on Ratio and Volume Analysis
190 Network Traffic Anomaly Detection based on Ratio and Volume Analysis Hyun Joo Kim, Jung C. Na, Jong S. Jang Active Security Technology Research Team Network Security Department Information Security
More informationA Formal Approach to Score Normalization for Meta-search
A Formal Approach to Score Normalization for Meta-search R. Manmatha and H. Sever Center for Intelligent Information Retrieval Computer Science Department University of Massachusetts Amherst, MA 01003
More informationFuzzy Double-Threshold Track Association Algorithm Using Adaptive Threshold in Distributed Multisensor-Multitarget Tracking Systems
13 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing Fuzzy Double-Threshold Trac Association Algorithm Using
More informationBehavior-based Authentication Systems. Multimedia Security
Behavior-based Authentication Systems Multimedia Security Part 1: User Authentication Through Typing Biometrics Features Part 2: User Re-Authentication via Mouse Movements 2 User Authentication Through
More informationAnomaly Detection on Data Streams with High Dimensional Data Environment
Anomaly Detection on Data Streams with High Dimensional Data Environment Mr. D. Gokul Prasath 1, Dr. R. Sivaraj, M.E, Ph.D., 2 Department of CSE, Velalar College of Engineering & Technology, Erode 1 Assistant
More informationOutlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data
Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Ms. Gayatri Attarde 1, Prof. Aarti Deshpande 2 M. E Student, Department of Computer Engineering, GHRCCEM, University
More information1.1 SYMPTOMS OF DDoS ATTACK:
2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Entropy Based Approach for the Detection of DDOS Attack Abhilash Singh,
More informationNetwork Anomaly Detection Using Autonomous System Flow Aggregates
Network Anomaly Detection Using Autonomous System Flow Aggregates To appear, GLOBECOM 4. Draft version Thienne ohnson and Loukas Lazos Department of Electrical and Computer Engineering University of Arizona,
More informationAn Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks
An Based on the Temporal-spatial Correlation in Wireless Sensor Networks 1 Department of Computer Science & Technology, Harbin Institute of Technology at Weihai,Weihai, 264209, China E-mail: Liuyang322@hit.edu.cn
More informationNETWORK TRAFFIC ANALYSIS - A DIFFERENT APPROACH USING INCOMING AND OUTGOING TRAFFIC DIFFERENCES
NETWORK TRAFFIC ANALYSIS - A DIFFERENT APPROACH USING INCOMING AND OUTGOING TRAFFIC DIFFERENCES RENATO PREIGSCHADT DE AZEVEDO, DOUGLAS CAMARGO FOSTER, RAUL CERETTA NUNES, ALICE KOZAKEVICIUS Universidade
More informationDouble Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 1 January 2015, Page No. 9966-9970 Double Threshold Based Load Balancing Approach by Using VM Migration
More informationMetric and Identification of Spatial Objects Based on Data Fields
Proceedings of the 8th International Symposium on Spatial Accuracy Assessment in Natural Resources and Environmental Sciences Shanghai, P. R. China, June 25-27, 2008, pp. 368-375 Metric and Identification
More informationBasic Concepts And Future Directions Of Road Network Reliability Analysis
Journal of Advanced Transportarion, Vol. 33, No. 2, pp. 12.5-134 Basic Concepts And Future Directions Of Road Network Reliability Analysis Yasunori Iida Background The stability of road networks has become
More informationCAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture
CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture Yuan-ni Liu Hong Tang, Guo-feng Zhao The School of Communication and Information Engineering of ChongQing University of Posts and
More informationDensity Based Clustering using Modified PSO based Neighbor Selection
Density Based Clustering using Modified PSO based Neighbor Selection K. Nafees Ahmed Research Scholar, Dept of Computer Science Jamal Mohamed College (Autonomous), Tiruchirappalli, India nafeesjmc@gmail.com
More informationTwo Algorithms of Image Segmentation and Measurement Method of Particle s Parameters
Appl. Math. Inf. Sci. 6 No. 1S pp. 105S-109S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. Two Algorithms of Image Segmentation
More informationFuzzy Systems. Fuzzy Systems in Knowledge Engineering. Chapter 4. Christian Jacob. 4. Fuzzy Systems. Fuzzy Systems in Knowledge Engineering
Chapter 4 Fuzzy Systems Knowledge Engeerg Fuzzy Systems Christian Jacob jacob@cpsc.ucalgary.ca Department of Computer Science University of Calgary [Kasabov, 1996] Fuzzy Systems Knowledge Engeerg [Kasabov,
More informationDetection Of Dos Attack Using Multivariate Correlation Analysis
Detection Of Dos Attack Using Multivariate Correlation Analysis Miss Smita N.Shendge, Mr. Prasad R.Kulkarni Student,, Computer Department,Aditya Engineering college Beed,Maharastra,India Professor, Computer
More informationProvision of Quality of Service with Router Support
Provision of Quality of Service with Router Support Hongli Luo Department of Computer and Electrical Engineering Technology and Information System and Technology Indiana University Purdue University Fort
More informationAnalysis of Detection Mechanism of Low Rate DDoS Attack Using Robust Random Early Detection Algorithm
Analysis of Detection Mechanism of Low Rate DDoS Attack Using Robust Random Early Detection Algorithm 1 Shreeya Shah, 2 Hardik Upadhyay 1 Research Scholar, 2 Assistant Professor 1 IT Systems & Network
More informationHUE PRESERVING ENHANCEMENT ALGORITHM BASED ON WAVELET TRANSFORM AND HUMAN VISUAL SYSTEM
International Journal of Information Technology and Knowledge Management July-December 011, Volume 4, No., pp. 63-67 HUE PRESERVING ENHANCEMENT ALGORITHM BASED ON WAVELET TRANSFORM AND HUMAN VISUAL SYSTEM
More informationInternet Traffic Classification Using Machine Learning. Tanjila Ahmed Dec 6, 2017
Internet Traffic Classification Using Machine Learning Tanjila Ahmed Dec 6, 2017 Agenda 1. Introduction 2. Motivation 3. Methodology 4. Results 5. Conclusion 6. References Motivation Traffic classification
More informationImage Interpolation using Collaborative Filtering
Image Interpolation using Collaborative Filtering 1,2 Qiang Guo, 1,2,3 Caiming Zhang *1 School of Computer Science and Technology, Shandong Economic University, Jinan, 250014, China, qguo2010@gmail.com
More informationA Data Classification Algorithm of Internet of Things Based on Neural Network
A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To
More informationDELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC
DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC Zhou Ling 1, 2, Ding Wei-xiong 2 and Zhu Yu-xi 2 1 Department of Information Science and Engineer, Central South University,
More informationDATA MINING II - 1DL460
DATA MINING II - 1DL460 Spring 2016 A second course in data mining!! http://www.it.uu.se/edu/course/homepage/infoutv2/vt16 Kjell Orsborn! Uppsala Database Laboratory! Department of Information Technology,
More informationA DYNAMIC CONTROLLING SCHEME FOR A TRACKING SYSTEM. Received February 2009; accepted April 2009
ICIC Express Letters ICIC International c 2009 ISSN 1881-803X Volume 3, Number 2, June 2009 pp. 219 223 A DYNAMIC CONTROLLING SCHEME FOR A TRACKING SYSTEM Ming-Liang Li 1,Yu-KueiChiu 1, Yi-Nung Chung 2
More informationA Levy Alpha Stable Model for Anomaly Detection in Network Traffic
A Levy Alpha Stable Model for Anomaly Detection in Network Traffic Diana A Dept of IT, KalasalingamUniversity, Tamilnadu, India E-mail: arul.diana@gmail.com Mercy Christial T Asst. Prof I/IT, Dept of IT,
More informationReal-Time Model-Free Detection of Low-Quality Synchrophasor Data
Real-Time Model-Free Detection of Low-Quality Synchrophasor Data Meng Wu and Le Xie Department of Electrical and Computer Engineering Texas A&M University College Station, TX NASPI Work Group meeting March
More informationADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS
ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National
More informationHYBRID TRANSFORMATION TECHNIQUE FOR IMAGE COMPRESSION
31 st July 01. Vol. 41 No. 005-01 JATIT & LLS. All rights reserved. ISSN: 199-8645 www.jatit.org E-ISSN: 1817-3195 HYBRID TRANSFORMATION TECHNIQUE FOR IMAGE COMPRESSION 1 SRIRAM.B, THIYAGARAJAN.S 1, Student,
More informationClustering Analysis based on Data Mining Applications Xuedong Fan
Applied Mechanics and Materials Online: 203-02-3 ISSN: 662-7482, Vols. 303-306, pp 026-029 doi:0.4028/www.scientific.net/amm.303-306.026 203 Trans Tech Publications, Switzerland Clustering Analysis based
More informationPRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA
PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department
More informationAn efficient face recognition algorithm based on multi-kernel regularization learning
Acta Technica 61, No. 4A/2016, 75 84 c 2017 Institute of Thermomechanics CAS, v.v.i. An efficient face recognition algorithm based on multi-kernel regularization learning Bi Rongrong 1 Abstract. A novel
More informationModulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1
Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Maryam Soltan, Inkwon Hwang, Massoud Pedram Dept. of Electrical Engineering University of Southern California Los Angeles, CA
More informationResearch on Design and Application of Computer Database Quality Evaluation Model
Research on Design and Application of Computer Database Quality Evaluation Model Abstract Hong Li, Hui Ge Shihezi Radio and TV University, Shihezi 832000, China Computer data quality evaluation is the
More informationHigh Capacity Reversible Watermarking Scheme for 2D Vector Maps
Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration
More informationDetecting Anomalies in Network Traffic Using Maximum Entropy Estimation
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop
More informationAnomaly Detection System for Video Data Using Machine Learning
Anomaly Detection System for Video Data Using Machine Learning Tadashi Ogino Abstract We are developing an anomaly detection system for video data that uses machine learning. The proposed system has two
More informationImpact of Sampling on Anomaly Detection
Impact of Sampling on Anomaly Detection DIMACS/DyDan Workshop on Internet Tomography Chen-Nee Chuah Robust & Ubiquitous Networking (RUBINET) Lab http://www.ece.ucdavis.edu/rubinet Electrical & Computer
More informationCPSC 340: Machine Learning and Data Mining. Outlier Detection Fall 2018
CPSC 340: Machine Learning and Data Mining Outlier Detection Fall 2018 Admin Assignment 2 is due Friday. Assignment 1 grades available? Midterm rooms are now booked. October 18 th at 6:30pm (BUCH A102
More informationImage Denoising Based on Hybrid Fourier and Neighborhood Wavelet Coefficients Jun Cheng, Songli Lei
Image Denoising Based on Hybrid Fourier and Neighborhood Wavelet Coefficients Jun Cheng, Songli Lei College of Physical and Information Science, Hunan Normal University, Changsha, China Hunan Art Professional
More informationImproving Image Segmentation Quality Via Graph Theory
International Symposium on Computers & Informatics (ISCI 05) Improving Image Segmentation Quality Via Graph Theory Xiangxiang Li, Songhao Zhu School of Automatic, Nanjing University of Post and Telecommunications,
More informationCombining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks*
Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks* Wei Wei 1, Yabo Dong 1, Dongming Lu 1, and Guang Jin 2 1 College of Compute Science and Technology,
More informationResearch on Quality Inspection method of Digital Aerial Photography Results
Research on Quality Inspection method of Digital Aerial Photography Results WANG Xiaojun, LI Yanling, LIANG Yong, Zeng Yanwei.School of Information Science & Engineering, Shandong Agricultural University,
More informationA Novel Intrusion Detection Method for WSN Sijia Wang a, Qi Li and Yanhui Guo
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) A Novel Intrusion Detection Method for WSN Sijia Wang a, Qi Li and Yanhui Guo Beijing University of
More informationGlobal Optimization of Integrated Transformers for High Frequency Microwave Circuits Using a Gaussian Process Based Surrogate Model
Global Optimization of Integrated Transformers for High Frequency Microwave Circuits Usg a Gaussian Process Based Surrogate Model Bo Liu, Yg He, Patrick Reynaert, Georges Gielen ESAT-MICAS, Katholieke
More informationA Robust Wavelet-Based Watermarking Algorithm Using Edge Detection
A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The
More informationResearch Article Modeling and Simulation Based on the Hybrid System of Leasing Equipment Optimal Allocation
Discrete Dynamics in Nature and Society Volume 215, Article ID 459381, 5 pages http://dxdoiorg/11155/215/459381 Research Article Modeling and Simulation Based on the Hybrid System of Leasing Equipment
More information10/14/2017. Dejan Sarka. Anomaly Detection. Sponsors
Dejan Sarka Anomaly Detection Sponsors About me SQL Server MVP (17 years) and MCT (20 years) 25 years working with SQL Server Authoring 16 th book Authoring many courses, articles Agenda Introduction Simple
More informationAnti-Distortion Image Contrast Enhancement Algorithm Based on Fuzzy Statistical Analysis of the Histogram Equalization
, pp.101-106 http://dx.doi.org/10.14257/astl.2016.123.20 Anti-Distortion Image Contrast Enhancement Algorithm Based on Fuzzy Statistical Analysis of the Histogram Equalization Yao Nan 1, Wang KaiSheng
More informationConcealing Information in Images using Progressive Recovery
Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,
More informationOptimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game
2012 7th International ICST Conference on Communications and Networking in China (CHINACOM) Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game Yuhua Xu, Zhan Gao and Wei
More informationSelf-Organized Similarity based Kernel Fuzzy Clustering Model and Its Applications
Fifth International Workshop on Computational Intelligence & Applications IEEE SMC Hiroshima Chapter, Hiroshima University, Japan, November 10, 11 & 12, 2009 Self-Organized Similarity based Kernel Fuzzy
More informationReliability Measure of 2D-PAGE Spot Matching using Multiple Graphs
Reliability Measure of 2D-PAGE Spot Matching using Multiple Graphs Dae-Seong Jeoune 1, Chan-Myeong Han 2, Yun-Kyoo Ryoo 3, Sung-Woo Han 4, Hwi-Won Kim 5, Wookhyun Kim 6, and Young-Woo Yoon 6 1 Department
More informationImproved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning
Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Timothy Glennan, Christopher Leckie, Sarah M. Erfani Department of Computing and Information Systems,
More informationBridge Surface Crack Detection Method
, pp.337-343 http://dx.doi.org/10.14257/astl.2016. Bridge Surface Crack Detection Method Tingping Zhang 1,2, Jianxi Yang 1, Xinyu Liang 3 1 School of Information Science & Engineering, Chongqing Jiaotong
More informationReversible Image Data Hiding with Local Adaptive Contrast Enhancement
Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed
More informationMultivariate Correlation Analysis based detection of DOS with Tracebacking
1 Multivariate Correlation Analysis based detection of DOS with Tracebacking Jasheeda P Student Department of CSE Kathir College of Engineering Coimbatore jashi108@gmail.com T.K.P.Rajagopal Associate Professor
More informationImproved Balanced Parallel FP-Growth with MapReduce Qing YANG 1,a, Fei-Yang DU 2,b, Xi ZHU 1,c, Cheng-Gong JIANG *
2016 Joint International Conference on Artificial Intelligence and Computer Engineering (AICE 2016) and International Conference on Network and Communication Security (NCS 2016) ISBN: 978-1-60595-362-5
More informationClassification and K-Nearest Neighbors
Classification and K-Nearest Neighbors Administrivia o Reminder: Homework 1 is due by 5pm Friday on Moodle o Reading Quiz associated with today s lecture. Due before class Wednesday. NOTETAKER 2 Regression
More informationPacket Scheduling with Buffer Management for Fair Bandwidth Sharing and Delay Differentiation
Packet Scheduling with Buffer Management for Fair Bandwidth Sharing and Delay Differentiation Dennis Ippoliti and Xiaobo Zhou Department of Computer Science University of Colorado at Colorado Springs Colorado
More informationFSRM Feedback Algorithm based on Learning Theory
Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 699-703 699 FSRM Feedback Algorithm based on Learning Theory Open Access Zhang Shui-Li *, Dong
More informationAvailable Online through
Available Online through www.ijptonline.com ISSN: 0975-766X CODEN: IJPTFI Research Article ANALYSIS OF CT LIVER IMAGES FOR TUMOUR DIAGNOSIS BASED ON CLUSTERING TECHNIQUE AND TEXTURE FEATURES M.Krithika
More informationOn the Improvement of Weighted Page Content Rank
On the Improvement of Weighted Page Content Rank Seifede Kadry and Ali Kalakech Abstract The World Wide Web has become one of the most useful formation resource used for formation retrievals and knowledge
More informationAn Efficient RFID Data Cleaning Method Based on Wavelet Density Estimation
An Efficient RFID Data Cleaning Method Based on Wavelet Density Estimation Yaozong LIU 1*, Hong ZHANG 1, Fawang HAN 2, Jun TAN 3 1 School of Computer Science and Engineering Nanjing University of Science
More informationA new robust watermarking scheme based on PDE decomposition *
A new robust watermarking scheme based on PDE decomposition * Noura Aherrahrou University Sidi Mohamed Ben Abdellah Faculty of Sciences Dhar El mahraz LIIAN, Department of Informatics Fez, Morocco Hamid
More informationAn Integrated Face Recognition Algorithm Based on Wavelet Subspace
, pp.20-25 http://dx.doi.org/0.4257/astl.204.48.20 An Integrated Face Recognition Algorithm Based on Wavelet Subspace Wenhui Li, Ning Ma, Zhiyan Wang College of computer science and technology, Jilin University,
More informationA Real-Time Network Simulation Application for Multimedia over IP
A Real-Time Simulation Application for Multimedia over IP ABSTRACT This paper details a Secure Voice over IP (SVoIP) development tool, the Simulation Application (Netsim), which provides real-time network
More informationAdaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision
Adaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision Zhiyan Zhang 1, Wei Qian 1, Lei Pan 1 & Yanjun Li 1 1 University of Shanghai for Science and Technology, China
More informationmanufacturing process.
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 203-207 203 Open Access Identifying Method for Key Quality Characteristics in Series-Parallel
More informationChapter 5: Outlier Detection
Ludwig-Maximilians-Universität München Institut für Informatik Lehr- und Forschungseinheit für Datenbanksysteme Knowledge Discovery in Databases SS 2016 Chapter 5: Outlier Detection Lecture: Prof. Dr.
More informationStudy on the Quantitative Vulnerability Model of Information System based on Mathematical Modeling Techniques. Yunzhi Li
Applied Mechanics and Materials Submitted: 2014-08-05 ISSN: 1662-7482, Vols. 651-653, pp 1953-1957 Accepted: 2014-08-06 doi:10.4028/www.scientific.net/amm.651-653.1953 Online: 2014-09-30 2014 Trans Tech
More informationCAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture
CAMPSNA: A Cloud Assisted Mobile Peer to Peer Social Network Architecture Yuan-ni Liu Hong Tang, Guo-feng Zhao The School of Communication and Information Engineering of ChongQing University of Posts and
More informationAn Effective Multi-Focus Medical Image Fusion Using Dual Tree Compactly Supported Shear-let Transform Based on Local Energy Means
An Effective Multi-Focus Medical Image Fusion Using Dual Tree Compactly Supported Shear-let Based on Local Energy Means K. L. Naga Kishore 1, N. Nagaraju 2, A.V. Vinod Kumar 3 1Dept. of. ECE, Vardhaman
More informationSD 372 Pattern Recognition
SD 372 Pattern Recognition Lab 2: Model Estimation and Discriminant Functions 1 Purpose This lab examines the areas of statistical model estimation and classifier aggregation. Model estimation will be
More informationEvaluation of Fourier Transform Coefficients for The Diagnosis of Rheumatoid Arthritis From Diffuse Optical Tomography Images
Evaluation of Fourier Transform Coefficients for The Diagnosis of Rheumatoid Arthritis From Diffuse Optical Tomography Images Ludguier D. Montejo *a, Jingfei Jia a, Hyun K. Kim b, Andreas H. Hielscher
More informationAn Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a
International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,
More informationCORRELATION BASED CAR NUMBER PLATE EXTRACTION SYSTEM
CORRELATION BASED CAR NUMBER PLATE EXTRACTION SYSTEM 1 PHYO THET KHIN, 2 LAI LAI WIN KYI 1,2 Department of Information Technology, Mandalay Technological University The Republic of the Union of Myanmar
More informationInternational Journal of Informative & Futuristic Research ISSN (Online):
Reviewed Paper Volume 2 Issue 3 November 2014 International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 A System For Denial-Of-Service Attack Detection Based On Multivariate Correlation
More informationQuaternion-based color difference measure for removing impulse noise in color images
2014 International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS) Quaternion-based color difference measure for removing impulse noise in color images Lunbo Chen, Yicong
More informationA study of classification algorithms using Rapidminer
Volume 119 No. 12 2018, 15977-15988 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A study of classification algorithms using Rapidminer Dr.J.Arunadevi 1, S.Ramya 2, M.Ramesh Raja
More informationA Method of Identifying the P2P File Sharing
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications
More informationFirewall Policy Modelling and Anomaly Detection
Firewall Policy Modelling and Anomaly Detection 1 Suhail Ahmed 1 Computer Science & Engineering Department, VTU University, SDIT, Mangalore, Karnataka. India Abstract - In this paper an anomaly management
More informationGlobal Thresholding Techniques to Classify Dead Cells in Diffusion Weighted Magnetic Resonant Images
Global Thresholding Techniques to Classify Dead Cells in Diffusion Weighted Magnetic Resonant Images Ravi S 1, A. M. Khan 2 1 Research Student, Department of Electronics, Mangalore University, Karnataka
More informationOpen Access Research on the Prediction Model of Material Cost Based on Data Mining
Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining
More informationComputer Technology Department, Sanjivani K. B. P. Polytechnic, Kopargaon
Outlier Detection Using Oversampling PCA for Credit Card Fraud Detection Amruta D. Pawar 1, Seema A. Dongare 2, Amol L. Deokate 3, Harshal S. Sangle 4, Panchsheela V. Mokal 5 1,2,3,4,5 Computer Technology
More information