Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition
|
|
- Dale Marsh
- 6 years ago
- Views:
Transcription
1 Detectng Compounded Anomalous SNMP Stuatons Usng Cooperatve Unsupervsed Pattern Recognton Emlo Corchado, Álvaro Herrero, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span Abstract. Ths research employs unsupervsed pattern recognton to approach the thorny ssue of detectng anomalous network behavor. It apples a connectonst model to dentfy user behavor patterns and successfully demonstrates that such models respond well to the demands and dynamc features of the problem. It llustrates the effectveness of neural networks n the feld of Intruson Detecton (ID) by explotng ther strong ponts: recognton, classfcaton and generalzaton. Its man novelty les n ts connectonst archtecture, whch up untl the present has never been appled to Intruson Detecton Systems (IDS) and network securty. The IDS presented n ths research s used to analyse network traffc n order to detect anomalous SNMP (Smple Network Management Protocol) traffc patterns. The results also show that the system s capable of detectng ndependent and compounded anomalous SNMP stuatons. It s therefore of great assstance to network admnstrators n decdng whether such anomalous stuatons represent real ntrusons. 1 Introducton Intruson Detecton Systems (IDS) are tools desgned to montor the events occurrng n a computer system or network, analysng them to detect suspcous patterns that may be related to a network or system attack. They have become a necessary addtonal tool to the securty nfrastructure as the number of network attacks has rsen very sharply over recent years. There are currently several technques used to mplement IDS. Some are based on the use of expert systems (contanng a set of rules that descrbe attacks), sgnature verfcaton (where attack scenaros are converted nto sequences of audt events), petr nets (where known attacks are presented wth graphcal petr nets) or statetranston dagrams (representng attacks wth a set of goals and transtons). One of the man dsadvantages of these technques s the fact that new attack sgnatures are not automatcally dscovered wthout updatng the IDS. Connectonst models have been dentfed as very promsng methods of addressng the ID problem due to two key features: they are sutable to detect day-0 attacks and they are able to classfy patterns (attack classfcaton, alert valdaton). There have recently been several attempts to apply artfcal neural archtectures [1, 2] (such as Self-Organsng Maps [3, 4] or Elman Network [5]) to the feld of network securty. Ths paper presents an IDS based on a neural archtecture that has never before been appled to the problem of ID.
2 2 The Cooperatve Unsupervsed IDS Model Exploratory Proecton Pursut (EPP) [6, 7, 8, 9] s a statstcal method for solvng the complex problem of dentfyng structure n hgh dmensonal data. It s based on the proecton of the data onto a lower dmensonal subspace n whch ts structure s searched by eye. It s necessary to defne an ndex to measure the varyng degrees of nterest generated by each proecton. Subsequently, the data s transformed by maxmzng the ndex and the assocated nterest. From a statstcal pont of vew the most nterestng drectons are those that are as non-gaussan as possble. The Data Classfcaton and Result Dsplay steps performed by ths IDS model are based on the use of a neural EPP model called Cooperatve Maxmum Lkelhood Hebban Learnng (CMLHL) [10, 11, 12]. It was ntally appled to the feld of Artfcal Vson [10, 11] to dentfy local flters n space and tme. Here, we have appled t to the feld of Computer Securty [2, 13, 14]. It s based on Maxmum Lkelhood Hebban Learnng (MLHL) [8, 9]. Consder an N-dmensonal nput vector, x, and an M-dmensonal output vector, y, wth W beng the weght lnkng nput to output and let η be the learnng rate. MLHL can be expressed as: N y = W x,. (1) = 1 The actvaton ( e ) s fed back through the same weghts and subtracted from the nput: Weght change: e = x M = 1 W y,. (2) p 1 ( e ) e W = η. y. sgn. (3) Lateral connectons [10, 11] have been derved from the Rectfed Gaussan Dstrbuton [15] and appled to the MLHL. The resultant net can fnd the ndependent factors of a data set but do so n a way that captures some type of global orderng n the data set. So, the fnal CMLHL model s as follows: Feed forward step: Equaton (1) Lateral actvaton passng: y ( t + ) = [ y (t) + τ( b Ay) ] + 1. (4) Feed back step: Equaton (2) Weght change: Equaton (3) Where: η s the learnng rate, τ s the strength of the lateral connectons, b s the bas parameter and p s a parameter related to the energy functon [8, 9, 11]. Fnally A s a symmetrc matrx used to modfy the response to the data. Its effect s based on the relaton between the dstances among the output neurons.
3 3 Model Structure The am of ths research s to desgn a system capable of detectng anomalous stuatons wthn a computer network. The nformaton analysed by our system s obtaned from the packets that travel along the network, meanng that t s a Network-Based IDS. The data needed to analyse the traffc s contaned on the captured packets headers, obtaned usng a network analyser. The structure of the IDS model s descrbed as follows: Frst step.- Network Traffc Capture: one of the network nterfaces s set up n promscuous mode. It captures all the packets travellng along the network. Second step.- Data Pre-processng: the captured data s pre-processed and used as an nput data n the followng stage. Thrd step.- Data Classfcaton: once the data has been pre-processed, the connectonst model (secton 2) analyses the data and dentfes anomalous patterns. Fourth step.- Result Dsplay: the last step s related to the vsualzaton stage. Fnally the output s presented to the network admnstrator. 4 Real Data Sets Contanng Compounded and Independent Anomalous SNMP Stuatons We have decded to study anomalous SNMP stuatons because an attack based on ths protocol may severely compromse system securty [17]. CISCO [18] ranked the top fve most vulnerable servces n order of mportance, and SNMP was one of them. In the short-term, SNMP was orented to manage nodes n the Internet communty [19]. Our efforts have focussed on the study of two of the most dangerous anomalous stuatons related to SNMP [2, 13, 14]: SNMP port sweep: t s a scannng of network computers for the SNMP port usng snffng methods. The am s to make a systematc sweep wthn a group of hosts to verfy f SNMP s actve n any port. Both default port numbers (161 and 162) and random port number (3750) are used. MIB nformaton transfer: the MIB (Management Informaton Base) can be defned n broad terms as the database used by SNMP to store nformaton about the elements that t controls. Ths stuaton s a transfer of some nformaton contaned n the SNMP MIB. Ths knd of transfer s potentally qute a dangerous stuaton because anybody who possesses some free tools, some basc SNMP knowledge and the communty password (n SNMP v. 1 and SNMP v. 2) wll be able to access all sorts of nterestng and sometmes useful nformaton. In ths work, the IDS analysed three dfferent data sets: 1 st Data set (Fg 1): ths ncludes an example of each one of the anomalous stuatons defned above: an SNMP port sweep and an MIB nformaton transfer. We have called ths a compounded anomalous SNMP stuaton because t nvolves smple but dfferent anomalous events that occur at the same tme. 2 nd Data set (Fg 2.a): ths contans an example of an SNMP port sweep stuaton (an ndependent anomalous SNMP stuaton).
4 3 rd Data set (Fg 2.b): an example of an MIB nformaton transfer stuaton (another ndependent anomalous SNMP stuaton). In addton to the SNMP packets, these data sets contan traffc related to other protocols nstalled n our network, such as NETBIOS and BOOTPS. In the Data Pre-processng step, the system performs a data selecton from all of the captured nformaton. As a result, all of the above-mentoned data sets contan the followng fve varables extracted from the packet headers: tmestamp (the tme when the packet was sent n relaton to the frst one), protocol (all the protocols contaned n the data set have been codfed, takng values between 1 and 35), source port (the port number of the source host that sent the packet), destnaton port (the destnaton host port number to whch the packet s sent) and sze (total packet sze n Bytes). 5 Results, Conclusons and Future Work Scatterplot Matrx s used to analyse parwse relatonshps between varables n hgh dmensonal data sets. Each factor par hghlghts dfferent structures or clusters n the proectons of the same data set. It was used to analyse the results obtaned from the connectonst IDS model. The system dentfed (Fg 1.a) the two anomalous stuatons contaned n the real compounded data set. The analyss took account of such aspects as traffc densty or anomalous traffc drectons. Factor par 2-1 (Fg 1.a) contans the best representaton of ths anomalous stuaton, where the horzontal axe s related wth the tme feature and the vertcal axe represents a combnaton of the protocol and sze features. There are several ssues to hghlght about ths fgure: (Fg 1.a) dentfes the sweep by means of normal and abnormal drectons. It s clear that packets contaned n ths group do not progress n the same drecton as the rest of packets groups (related to normal stuatons). On the other hand, Groups 2 and 3 (Fg. 1.a) brng together packets related to the MIB nformaton transfer. These groups are dentfed as anomalous due to ther hgh temporal packets concentratons. Group 3 Group 3 Fg. 1.a. Scatterplot Matrx factor par 2-1 generated by the model for the 1 st data set Fg. 1.b. PCA proecton for the 1 st data set We have appled dfferent connectonst methods such as Prncpal Component Analyss (PCA) [20] (Fg. 1.b) or MLHL to the same data set. CMLHL provdes more
5 sparse proectons than the others [11]. CMLHL s able of dentfyng both anomalous stuatons whle PCA (Fg. 1.b) s only able to dentfy the sweep (Groups 1, 2 and 3). On the other hand, as can be seen n Fg. 2.a and Fg. 2.b, the neural IDS s capable of dentfyng both anomalous stuatons ndependently. The followng fgures (Fg. 2.a and Fg 2.b) show how the system performs successfully n those cases where there s only one anomalous stuaton wthn normal ones (2 nd and 3 rd Data Sets). In Fg 2.a we have dentfed the sweep (Groups 1, 2 and 3) by means of normal/abnormal drecton and n Fg 2.b we have dentfed the MIB transfer (Groups 1 and 2) by means of hgh temporal concentraton of packets. Group 3 Fg. 2.a. Independent SNMP anomalous stuaton by a port sweep (2 nd data set) Fg. 2.b. Independent SNMP anomalous stuaton by a MIB transfer (3 rd data set) Ths research demonstrates the effectveness and robustness of ths novel IDS due to ts capablty to dentfy anomalous stuatons n two dfferent ways: whether or not they are contaned n the same data set. In summary, the connectonst IDS descrbed n ths paper s able to dentfy both ndependent and compounded anomalous SNMP stuatons showng ts capablty for generalzaton. The vsualzaton tool used n the Result Dsplay step, shows data proectons that hghlght anomalous stuatons suffcently clearly to alert the network admnstrator, takng nto account such aspects as traffc densty or abnormal drectons. One of the most common IDS technques s the one called sgnature verfcaton [20b]. Most of sgnature verfcaton systems use pattern matchng algorthms based on prevously establshed rules ncluded n a database. To reduce the number of posteror false alarms, ths database should be adapted to the work envronment by studyng the traffc patterns that crculate along the network segment where the IDS s set up. One dsadvantage of ths method s the hgh processng tme consume. Ths can be reduced by speedng up the packets analyss [21]. In comparson wth ths method, the advantages of our novel neural IDS are the followng: t does not requre any prevous knowledge n the form of rules and t s able to detect unknown attacks day-0 ones. Further work wll be focused on the applcaton of GRID [22] computaton wth more complex data sets and the use of mult-agent dstrbuted systems.
6 References 1. Debar, H., Becker, M., Sbon, D.: A Neural Network Component for an Intruson Detecton System. IEEE Symposum on Research n Computer Securty and Prvacy (1992) 2. Corchado, E., Herrero, A., Baruque, B., Sáz, J.M.: Intruson Detecton System Based on a Cooperatve Topology Preservng Method. Internatonal Conference on Adaptve and Natural Computng Algorthms. Sprnger Computer Scence. SprngerWenNewYork (2005) 3. Hätönen, K., Höglund, A., Sorvar, A.: A Computer Host-Based User Anomaly Detecton System Usng the Self-Organzng Map. Internatonal Jont Conference of Neural Networks (2000) 4. Zanero, S., Savares, S.M.: Unsupervsed Learnng Technques for an Intruson Detecton System. ACM Symposum on Appled Computng (2004) Ghosh, A., Schwartzbard, A., Schatz, A.: Learnng Program Behavor Profles for Intruson Detecton. Workshop on Intruson Detecton and Network Montorng (1999) 6. Fredman, J., Tukey, J.: A Proecton Pursut Algorthm for Exploratory Data Analyss. IEEE Transacton on Computers 23 (1974) Hyvärnen, A.: Complexty Pursut: Separatng Interestng Components from Tme Seres. Neural Computaton 13 (2001) Corchado, E., MacDonald, D., Fyfe, C.: Maxmum and Mnmum Lkelhood Hebban Learnng for Exploratory Proecton Pursut. Data Mnng and Knowledge Dscovery. Kluwer Academc Publshng 8(3) (2004) Fyfe, C., Corchado, E.: Maxmum Lkelhood Hebban Rules. European Symposum on Artfcal Neural Networks (2002) 10. Corchado, E., Han, Y., Fyfe, C.: Structurng Global Responses of Local Flters usng Lateral Connectons. Journal of Expermental and Theoretcal Artfcal Intellgence 15(4) (2003) Corchado, E., Fyfe, C.: Connectonst Technques for the Identfcaton and Suppresson of Interferng Underlyng Factors. Internatonal Journal of Pattern Recognton and Artfcal Intellgence 17(8) (2003) Corchado, E., Corchado, J.M., Sáz, L., Lara, A.: Constructng a Global and Integral Model of Busness Management Usng a CBR System. 1st Internatonal Conference on Cooperatve Desgn, Vsualzaton and Engneerng (2004) 13. Herrero, A., Corchado, E., Sáz, J.M.: A Cooperatve Unsupervsed Connectonst Model Appled to Identfy Anomalous Massve SNMP Data Sendng. 1st Internatonal Conference on Natural Computaton (2005) ( In press ) 14. Herrero, A., Corchado, E., Sáz, J.M.: Identfcaton of Anomalous SNMP Stuatons Usng a Cooperatve Connectonst Exploratory Proecton Pursut Model. 6th Internatonal Conference on Intellgent Data Engneerng and Automated Learnng (2005) ( In press ) 15. Seung, H.S., Socc, N.D., Lee, D.: The Rectfed Gaussan Dstrbuton. Advances n Neural Informaton Processng Systems 10 (1998) Myerson, J.M.: Identfyng Enterprse Network Vulnerabltes. Internatonal Journal of Network Management 12 (2002) 18. Csco Secure Consultng: Vulnerablty Statstcs Report (2000) 19. Case, J., Fedor, M.S., Schoffstall, M.L., Davn, C.: Smple Network Management (SNMP). RFC-1157 (1990) 20. Oa, E.: Neural Networks, Prncpal Components and Subspaces. Internatonal Journal of Neural Systems 1 (1989) Aldwar, M., Conte, T., Franzon, P.: Confgurable strng matchng hardware for speedng up ntruson detecton. ACM SIGARCH Computer Archtecture News 33(1) (2005) 22. Foster, I., Kesselman, C.: The Grd: Blueprnt for a New Computng Infrastructure. 1 t edn. Morgan Kaufmann Publshers (1998)
Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:
Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationFace Recognition Based on SVM and 2DPCA
Vol. 4, o. 3, September, 2011 Face Recognton Based on SVM and 2DPCA Tha Hoang Le, Len Bu Faculty of Informaton Technology, HCMC Unversty of Scence Faculty of Informaton Scences and Engneerng, Unversty
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationA Deflected Grid-based Algorithm for Clustering Analysis
A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationClassifying Acoustic Transient Signals Using Artificial Intelligence
Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationProper Choice of Data Used for the Estimation of Datum Transformation Parameters
Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More informationFeature Reduction and Selection
Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More information3D vector computer graphics
3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres
More informationType-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data
Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES
More informationDetection of an Object by using Principal Component Analysis
Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationHierarchical clustering for gene expression data analysis
Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationOutline. Type of Machine Learning. Examples of Application. Unsupervised Learning
Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More informationPRÉSENTATIONS DE PROJETS
PRÉSENTATIONS DE PROJETS Rex Onlne (V. Atanasu) What s Rex? Rex s an onlne browser for collectons of wrtten documents [1]. Asde ths core functon t has however many other applcatons that make t nterestng
More informationSupport Vector Machines
Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationWhy visualisation? IRDS: Visualization. Univariate data. Visualisations that we won t be interested in. Graphics provide little additional information
Why vsualsaton? IRDS: Vsualzaton Charles Sutton Unversty of Ednburgh Goal : Have a data set that I want to understand. Ths s called exploratory data analyss. Today s lecture. Goal II: Want to dsplay data
More informationA Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1
A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department
More informationNeural Networks in Statistical Anomaly Intrusion Detection
Neural Networks n Statstcal Anomaly Intruson Detecton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech., Unversty Heghts, Newark, NJ 72, USA
More informationImage Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline
mage Vsualzaton mage Vsualzaton mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and Analyss outlne mage Representaton & Vsualzaton Basc magng Algorthms Shape Representaton and
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More informationBOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET
1 BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET TZU-CHENG CHUANG School of Electrcal and Computer Engneerng, Purdue Unversty, West Lafayette, Indana 47907 SAUL B. GELFAND School
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationNetwork Intrusion Detection Based on PSO-SVM
TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*
More informationGender Classification using Interlaced Derivative Patterns
Gender Classfcaton usng Interlaced Dervatve Patterns Author Shobernejad, Ameneh, Gao, Yongsheng Publshed 2 Conference Ttle Proceedngs of the 2th Internatonal Conference on Pattern Recognton (ICPR 2) DOI
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationA Novel Term_Class Relevance Measure for Text Categorization
A Novel Term_Class Relevance Measure for Text Categorzaton D S Guru, Mahamad Suhl Department of Studes n Computer Scence, Unversty of Mysore, Mysore, Inda Abstract: In ths paper, we ntroduce a new measure
More informationSCALABLE AND VISUALIZATION-ORIENTED CLUSTERING FOR EXPLORATORY SPATIAL ANALYSIS
SCALABLE AND VISUALIZATION-ORIENTED CLUSTERING FOR EXPLORATORY SPATIAL ANALYSIS J.H.Guan, F.B.Zhu, F.L.Ban a School of Computer, Spatal Informaton & Dgtal Engneerng Center, Wuhan Unversty, Wuhan, 430079,
More informationLOOP ANALYSIS. The second systematic technique to determine all currents and voltages in a circuit
LOOP ANALYSS The second systematic technique to determine all currents and voltages in a circuit T S DUAL TO NODE ANALYSS - T FRST DETERMNES ALL CURRENTS N A CRCUT AND THEN T USES OHM S LAW TO COMPUTE
More informationA Topology-aware Random Walk
A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble
More informationNAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics
Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationUsing Fuzzy Logic to Enhance the Large Size Remote Sensing Images
Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract
More informationOutline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1
4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:
More informationAn IPv6-Oriented IDS Framework and Solutions of Two Problems
An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationMachine Learning 9. week
Machne Learnng 9. week Mappng Concept Radal Bass Functons (RBF) RBF Networks 1 Mappng It s probably the best scenaro for the classfcaton of two dataset s to separate them lnearly. As you see n the below
More informationA Post Randomization Framework for Privacy-Preserving Bayesian. Network Parameter Learning
A Post Randomzaton Framework for Prvacy-Preservng Bayesan Network Parameter Learnng JIANJIE MA K.SIVAKUMAR School Electrcal Engneerng and Computer Scence, Washngton State Unversty Pullman, WA. 9964-75
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationSteps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices
Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between
More informationOn Some Entertaining Applications of the Concept of Set in Computer Science Course
On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,
More informationA PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION
1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute
More informationUnsupervised Learning
Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and
More informationLearning a Class-Specific Dictionary for Facial Expression Recognition
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 4 Sofa 016 Prnt ISSN: 1311-970; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-016-0067 Learnng a Class-Specfc Dctonary for
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationA Knowledge Management System for Organizing MEDLINE Database
A Knowledge Management System for Organzng MEDLINE Database Hyunk Km, Su-Shng Chen Computer and Informaton Scence Engneerng Department, Unversty of Florda, Ganesvlle, Florda 32611, USA Wth the exploson
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationFINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK
FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,
More informationGA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks
Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member
More informationThe Shortest Path of Touring Lines given in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He
More informationReal-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution
Real-tme Moton Capture System Usng One Vdeo Camera Based on Color and Edge Dstrbuton YOSHIAKI AKAZAWA, YOSHIHIRO OKADA, AND KOICHI NIIJIMA Graduate School of Informaton Scence and Electrcal Engneerng,
More informationDiscriminative Dictionary Learning with Pairwise Constraints
Dscrmnatve Dctonary Learnng wth Parwse Constrants Humn Guo Zhuoln Jang LARRY S. DAVIS UNIVERSITY OF MARYLAND Nov. 6 th, Outlne Introducton/motvaton Dctonary Learnng Dscrmnatve Dctonary Learnng wth Parwse
More informationProfessional competences training path for an e-commerce major, based on the ISM method
World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng
More informationA Statistical Model Selection Strategy Applied to Neural Networks
A Statstcal Model Selecton Strategy Appled to Neural Networks Joaquín Pzarro Elsa Guerrero Pedro L. Galndo joaqun.pzarro@uca.es elsa.guerrero@uca.es pedro.galndo@uca.es Dpto Lenguajes y Sstemas Informátcos
More informationA Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems
A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationFAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks
2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng
More informationDetection of hand grasping an object from complex background based on machine learning co-occurrence of local image feature
Detecton of hand graspng an object from complex background based on machne learnng co-occurrence of local mage feature Shnya Moroka, Yasuhro Hramoto, Nobutaka Shmada, Tadash Matsuo, Yoshak Shra Rtsumekan
More informationOracle Database: 12c Administrator
Oracle Database: 12c Admnstrator 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and PL/SQL along wth the benefts
More informationReal-time Network Attack Intention Recognition Algorithm
Internatonal Journal of Securty and Its Applcatons, pp.51-62 http://dx.do.org/10.14257/sa.2016.10.4.06 Real-tme Network Attack Intenton Recognton Algorthm Qu Hu and Wang Kun Zhengzhou Insttute of Informaton
More informationA Gradient Difference based Technique for Video Text Detection
A Gradent Dfference based Technque for Vdeo Text Detecton Palaahnakote Shvakumara, Trung Quy Phan and Chew Lm Tan School of Computng, Natonal Unversty of Sngapore {shva, phanquyt, tancl }@comp.nus.edu.sg
More informationINTELLECT SENSING OF NEURAL NETWORK THAT TRAINED TO CLASSIFY COMPLEX SIGNALS. Reznik A. Galinskaya A.
Internatonal Journal "Informaton heores & Applcatons" Vol.10 173 INELLEC SENSING OF NEURAL NEWORK HA RAINED O CLASSIFY COMPLEX SIGNALS Reznk A. Galnskaya A. Abstract: An expermental comparson of nformaton
More informationON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE
Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton
More informationA New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1
A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent
More informationA Gradient Difference based Technique for Video Text Detection
2009 10th Internatonal Conference on Document Analyss and Recognton A Gradent Dfference based Technque for Vdeo Text Detecton Palaahnakote Shvakumara, Trung Quy Phan and Chew Lm Tan School of Computng,
More informationHybridization of Expectation-Maximization and K-Means Algorithms for Better Clustering Performance
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 2 Sofa 2016 Prnt ISSN: 1311-9702; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-2016-0017 Hybrdzaton of Expectaton-Maxmzaton
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationFuzzy Modeling of the Complexity vs. Accuracy Trade-off in a Sequential Two-Stage Multi-Classifier System
Fuzzy Modelng of the Complexty vs. Accuracy Trade-off n a Sequental Two-Stage Mult-Classfer System MARK LAST 1 Department of Informaton Systems Engneerng Ben-Guron Unversty of the Negev Beer-Sheva 84105
More informationAdaptive Silhouette Extraction and Human Tracking in Dynamic. Environments 1
Adaptve Slhouette Extracton and Human Trackng n Dynamc Envronments 1 X Chen, Zhha He, Derek Anderson, James Keller, and Marjore Skubc Department of Electrcal and Computer Engneerng Unversty of Mssour,
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationPalmprint Feature Extraction Using 2-D Gabor Filters
Palmprnt Feature Extracton Usng 2-D Gabor Flters Wa Kn Kong Davd Zhang and Wenxn L Bometrcs Research Centre Department of Computng The Hong Kong Polytechnc Unversty Kowloon Hong Kong Correspondng author:
More informationA Robust Method for Estimating the Fundamental Matrix
Proc. VIIth Dgtal Image Computng: Technques and Applcatons, Sun C., Talbot H., Ourseln S. and Adraansen T. (Eds.), 0- Dec. 003, Sydney A Robust Method for Estmatng the Fundamental Matrx C.L. Feng and Y.S.
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationMining Image Features in an Automatic Two- Dimensional Shape Recognition System
Internatonal Journal of Appled Mathematcs and Computer Scences Volume 2 Number 1 Mnng Image Features n an Automatc Two- Dmensonal Shape Recognton System R. A. Salam, M.A. Rodrgues Abstract The number of
More informationImpact of a New Attribute Extraction Algorithm on Web Page Classification
Impact of a New Attrbute Extracton Algorthm on Web Page Classfcaton Gösel Brc, Banu Dr, Yldz Techncal Unversty, Computer Engneerng Department Abstract Ths paper ntroduces a new algorthm for dmensonalty
More information