Intrusion Detection using Neural Network Committee Machine

Size: px
Start display at page:

Download "Intrusion Detection using Neural Network Committee Machine"

Transcription

1 2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT) October 30 November 01, 2013, Sarajevo, Bosnia and Herzegovina Intrusion Detection using Neural Network Committee Machine Alma Husagic-Selman Department of Computer Science and Engineering International University of Sarajevo Sarajevo, BiH Rasit Koker Department of Computer Engineering Sakarya University Sakarya, Turkey Suvad Selman Department of Electrical and Electronics Engineering International University of Sarajevo Sarajevo, BiH Abstract Intrusion detection plays an important role in todays computer and communication technology. As such it is very important to design time efficient Intrusion Detection System (IDS) low in both, False Positive Rate (FPR) and False Negative Rate (FNR), but high in attack detection precision. To achieve that, this paper proposes Neural Network Committee Machine (NNCM) IDS. NNCM IDS consists of Input Reduction System based on Principal Component Analysis (PCA) and Intrusion Detection System, which is represented by three levels committee machine, each based on Back-Propagation Neural Network. To reduce the FNR, the system uses offline System Update, which retrains the networks when new attacks are introduced. The system shows the overall attack detection success of 99.8%. Keywords Intrusion detection, Neural Networks, Committee Machine, Intelligent Intrusion Detection System I. INTRODUCTION Since second half of last century, computer networks started to grow with tremendous speed and with them the need for security mechanisms which would ensure data, privacy and computer security grew as well. Many different security mechanisms were designed, yet none was reliable enough to protect the computer-network system from ever evolving threats and attacks. Firewalls were made in order to protect the networks from attacks that come from outside world, but they do not obliterate any intrusion coming from inside the network. Intrusion Detection Systems (IDS), on the other hand, monitor networking packets in order to prevent any form of computer attacks from within the network [1] [4]. This work focuses on IDS, since existing commercial IDSs offer wide window for improvements. In general, IDSs may be designed to perform misuse detection or anomaly detection [1] [5]. In misuse detection, all known abnormal behavior is defined and the system is trained to recognize it. It works by comparing the arriving packet with features of known attack behavior. If any new, not predefined attack arrives, the system would recognize it as normal packet, causing high FNR [2].To avoid very high FNR, misuse based IDS must be retrained very often, sometimes causing delays in the network [6]. Anomaly detection is modeled based on normal behavior [7], so any pattern violating that behavior would be defined as a system attack [1] [5]. Anomaly detection causes high FPR, because even some new normal packets, unknown to the system, would be identified as attacks. This deteriorates overall network performance, since some normal packets would never reach destination. For these reasons, most commercial IDS are designed to perform misuse detection alone. False alarms, be it false positive or false negative, are limiting the performance of IDS. It is therefore very important to reduce both types of these alarms, and the best way to do so is by combining anomaly and misuse detection [5] [8]. This paper proposes fast, efficient and accurate IDS based on committee machine. The system is updated offline anytime threshold for unrecognized packets is reached. The system produces five outputs, normal packet and four attack types (DoS, U2R, R2L and Probe) [9]. The paper is organized as follows: Related works are discussed in Section 2, Section 3 gives an overview of methods and algorithms used in this work, Section 4 presents data used for experimentation, Section 5 describes the system model, Section 6 presents and discusses results, and Section 7 concludes the paper. II. RELATED WORKS Different machine learning mechanisms, including Artificial Neural Networks, Fuzzy Logic, Genetic Algorithms, etc. have been used on KDD CUP 1999 data for Intrusion Detection [1] [10]. Different neural network algorithms have been used, including Grey Neural Networks [4], RBF [10], [11] Recirculation Neural Networks [2], PCA [6] [12] and MLP [5], with MLP generally showing better results than others [2].These works are mainly focusing on misuse detection. In order to combine misuse and anomaly detection, many researchers have recently attempted hybrid methods, by combining neural networks with other machine learning mechanisms, such as fuzzy logic or genetic algorithms [5], [1], [13] [15]. Summary of all these results is presented in Table I. Table II shows FPR and FNR for different neural network and hybrid classification algorithms. III. ALGORITHMS AND METHODS Multiple methods are used in this work: PCA for feature reduction, feed-forward Multilayer Perceptron Neural Net /13/$ IEEE

2 TABLE I. SUMMARY OF RESULTS FOR DIFFERENT NEURAL NETWORKS AND HYBRID SYSTEMS Approach DOS, % Probe, % R2L, % U2R, % Decision Trees Bayesian Networks Flexible Neural Tree Fuzzy NN MLP Advanced NN Evolving Fuzzy NN Recirculation NN PCA & Gray NN Fuzzy C-Mean and MLP ANSIF, FIS & GA above it. There are no connections among the units of a single layer. The common examples of this category are Multilayer Perceptron or Radial Basis Function networks [18]. TABLE II. SUMMARY OF FPR AND FNR FOR DIFFERENT CLASSIFICATION ALGORITHMS Approach FNR, % FPR, % Flexible Neural Tree MLP Clasterization K-NN SVM Recirculation Neural Networks Fuzzy C-Mean and MLP works for classification and Committee Machine as a boosting mechanism. A. Principle Component Analysis PCA is very useful mathematical algorithm, based on orthogonal linear transformation, which is widely used for data compression, image processing and feature extraction [6] [12]. The goal of PCA is to find a set of orthogonal components that minimize the error in reconstructed data. An equivalent formulation of PCA is to find an orthogonal set of vectors that maximize the variance of the projected data [16]. In other words, PCA transforms the data into different frame of reference with minimal error and using fewer features than the original data, while preserving data randomness [17]. For more detailed description of PCA algorithm refer to [16], [17]. B. Neural Networks Neural Networks are mathematical algorithms whose design was inspired by biological neural networks found in living organisms. Neural networks produce efficient solutions to a wide range of specific problems, ranging from simple classification to data compression and image processing [18]. They can be divided into two main categories: feed-forward and recurrent networks. In feed-forward networks the flow of data goes from input to output cells, which can be grouped into layers but no feedback interconnections can exist. On the other hand, recurrent networks contain feedback loops and their dynamical properties are very important. The most popularly used type of neural networks employed in pattern classification tasks is the feed-forward network which is constructed from layers and possesses unidirectional weighted connections between neurons [18], [19]. A feed-forward network has a layered structure (Figure 1), with input layer, hidden layer and output layer. Each layer consists of units where each unit receives its inputs from units in a layer below and send its output to units in a layer directly Fig. 1. Feed-forward network (MLP) with N inputs, one output and one hidden layer Multilayer Perceptron (MLP) type is defined by establishing the number of neurons from which it is built. This process can be divided into three parts: obtaining number of inputs, defining number of outputs, and deciding number of hidden layers. The last part can become crucial to accuracy of obtained classification results [19]. The number of input and output neurons can be actually seen as external specification of the network and these parameters are rather found in a task specification. The number of inputs is determined by the number of features that characterize the data, and outputs typically reflect the number of classes [20]. Fig. 2. Activation function (logistic function) used at neurons Each neuron within the hidden layer is represented by transfer function known as activation function. The transfer function should be able to accept an input within any range, and to produce an output in a strictly limited range. Figure 2 shows one of the most common transfer functions, the logistic function. In this case, the output is in the range (0, 1), and the input is sensitive in a range not much larger than (-1, +1). This function is also smooth and easily differentiable. These properties are critical in allowing the network training algorithms to operate [21]. In order to produce the desired set of output states whenever a set of inputs is presented, neural network has to be

3 configured by setting the strengths or weights to the interconnections. This step is known as learning procedure [21]. Learning rules are roughly divided into three categories of supervised, unsupervised and reinforcement learning methods. For descriptions of these algorithms refer to [18] [23]. Back-propagation (backward propagation of errors) is supervised learning algorithm, which is the most useful for feedforward networks. The algorithm can be divided into two main phases, propagation phase and weight update. In propagation phase, inputs are passed to the hidden layer where the initial weights were set. The hidden layer produces certain outputs, which are evaluated against original outputs, and error is calculated. In the second phase, the calculated error is used to update neuron weights. The process continues until optimum weights, are obtained [18] [20]. The problem with back-propagation is slow convergence, which can be improved if Scaled Conjugate Gradient (SCG)back-propagation learning mechanism is used. SCG belongs to the class of Conjugate Gradient Methods, which are characteristic by super-linear convergence on most problems [22]. Moller (1993) has shown that SCG is at least an order of magnitude faster than standard back-propagation learning. This speed-up depends on the convergence criteria, so the bigger demand for reduction in error, the bigger the speedup. By using a step size scaling mechanism SCG avoids a time consuming line-search per learning iteration, which makes the algorithm faster than some other learning algorithms [24]. C. Committee Machine In this work, artificial neural network committee machines with feed-forward multilayer perceptron and back-propagation learning algorithm is used. In committee machines, a complex computational task is solved by dividing it into a number of computationally simple tasks and then combining the solutions of these computations [18]. In other words, computational simplicity is achieved by distributing the learning task among a number of experts, which in turn divide the input space into a set of subspaces. The combination of these experts is said to constitute a committee machine. Basically, it fuses knowledge acquired by experts to arrive at an overall decision that is superior to that attainable by any one of them acting alone [20]. This method reduces the FP and FN errors, and improves performance of the system [20]. IV. DATA DESCRIPTION The data used in this work is widely used KDD CUP 1999 data, which was created based on DARPA Intrusion Detection data set, collected by MIT Lincoln Laboratory [9]. The data contains 41 features, specifying packet type, protocol and so on, and class label, specifying if the packet is normal or attack. Data set contains 22 attack types, which can be divided into four main categories [9], as follows: Denial of Service (DoS) denies service to legitimate users, most commonly through overloading of existing resources. Six out of total 22 attacks fall into this group. User-to-Root (U2R), user with normal user privileges tries to exploit vulnerabilities of the system in order to gain the access to the root of the system. Four out of total 22 attack fall into this group. Remote-to-Locals (R2L), unauthorized user from a remote machine tries to access local machine by exploiting holes in local machine. Eight out of 22 attacks fall into this group. Probing (Probe), unauthorized user monitors the networks in order to obtain information and discover systems vulnerabilities. Four out of total 22 attack fall into this group. Original KDD CUP 1999 training data, consisting of about 5 million records, was too large to analyze, and for that reason, concise set known as 10% training set was used. Out of this concise set of records, records was chosen for training and 6900 records was used for testing. V. INTRUSION DETECTION MODEL Intrusion Detection Model was designed based on anomaly detection, with Committee Machine recognizing if the attack exists or not. As mentioned earlier, anomaly detection is shown to have low FNR, but in order to reduce FPR, system update is designed. Thus, proposed Intrusion Detection Model consists of three parts: Input Reduction System, Committee Machine and System Update (Figure 3). Fig. 3. Proposed Intrusion Detection Model A. Input Reduction System In systems with large dataset characterized with numerous features, input or feature reduction process should be done whenever possible. This step helps remove distracting variance from a dataset and as such improves the performance of the classifier and speeds up the classification process. In this work, single PCA neural network was chosen as a tool for feature reduction. PCA Neural Network takes original 41 inputs and reduces the input size to 13. General overview of input reduction system is shown in Figure 4. Fig. 4. Input/Feature Reduction System B. Committee Machine Committee consists of three Back-Propagating Neural Networks, set in parallel. Each neural network receives inputs from

4 Fig. 5. scheme Committee Machine with three MLP Neural Networks and voting VI. RESULTS AND DISCUSSION Simulation has shown an outstanding results for proposed model with 99.6% classification success. Following figures present results. Figure 7 shows confusion matrix for test data of third neural network. This network was trained to be an expert for data which first two neural networks within the committee machine could not recognize. the classification success was 99.6% with 0.2% FPR (4 records) and 0.3% FNR (7 records). IRS, and produces one output, which states if the attack exists or not (Figure 5). In order to train and test Committee Machine, we needed to divide test data into three sets, each containing 2300 data records. Initial training set consisting of data records was used to train the first neural network. The network was then tested with first test data set, and all test data records which failed to be classified using first neural network, were fed into the second neural network training set. Second network was then trained and tested, and all failed test data records were fed into third neural network training set. This way of training enables each neural network within committee machine to become expert for different sets of records. The voting scheme was designed to choose the output based on the agreement of at least two neural networks. C. System Update The system update consists of database, used to hold undefined new packets. Once undefined packets are detected, the system update retrains the network offline, and then updates the weights on committee machine. Figure 6 shows the flowchart for System update. Fig. 7. Confusion matrix for third neural network within Committee Machine Figure 8 shows confusion matrix for overall data, which includes training, test and validation data. The results show classification of 99.8%, with 0.1% (23 records) FPR and 0.1% (13 records) FNR. Fig. 6. System Update flowchart Fig. 8. Confusion Matrix for overall data

5 Figure 9 shows receiver operating characteristics (ROC) for each output class, which represent sensitivity against 1- specificity values associated with the observations predicted event probabilities. According to [24], the more ROC curve approaches the left top edge of the plot, the better the classification. From the Figure is clear than after 0.1% of FPR, the classification is almost maximum. Input reduction system is based on PCA, and it reduces the number of inputs from 41 to 13. Intrusion detection system was based on committee machine, which performs attack classification. It consists of three feed-forward multilayer perceptron neural networks with back-propagation learning, and voting scheme that is based on the combination of best outputs. The system update should be done offline once the threshold for recorded unknown packets is reached. Generally, the system update retrains the neural networks for new unknown attacks. The overall system showed the classification of 99.8%, with 0.1% both, false positive and false negative rate, and mean square error of REFERENCES Fig. 9. Receiver Operating Characteristics Last figure (Figure 10) shows the mean squared error (mse) for our classification. It has been shown that the best classification was obtained at epoch 37 with mse. At this point, test and validation data gets the best common minimum. Fig. 10. Mean Squared Error (mse) VII. CONCLUSION In this paper we have proposed a new model for Intrusion Detection System. The model consists of three parts: Input reduction system, intrusion detection system and offline system update. [1] S. Chavan, K. Shah, N. Dave, S. Mukherjee, A. Abraham, and S. Sanyal, Adaptive neuro-fuzzy intrusion detection systems, in Information Technology: Coding and Computing, Proceedings. ITCC International Conference on, vol. 1, 2004, pp Vol.1. [2] P. Kachurka and V. Golovko, Neural network approach to realtime network intrusion detection and recognition, in Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), 2011 IEEE 6th International Conference on, vol. 1, 2011, pp [3] J. Zhao, M. Chen, and Q. Luo, Research of intrusion detection system based on neural networks, in Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, 2011, pp [4] D.-X. Xia, S.-H. Yang, and C.-G. Li, Intrusion detection system based on principal component analysis and grey neural networks, in Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on, vol. 2, 2010, pp [5] M. Muna and M. Mehrotra, Design network intrusion detection system using hybrid fuzzy-neural network, International Journal of Computer Science and Security, vol. 4, no. 3, p , [6] F. Song, Z. Guo, and D. Mei, Feature selection using principal component analysis, in System Science, Engineering Design and Manufacturing Informatization (ICSEM), 2010 International Conference on, vol. 1, 2010, pp [7] D.-K. Kang, D. Fuller, and V. Honavar, Learning classifiers for misuse and anomaly detection using a bag of system calls representation, in Information Assurance Workshop, IAW 05. Proceedings from the Sixth Annual IEEE SMC, 2005, pp [8] G. Wang, J. Hao, J. Ma, and L. Huang, A new approach to intrusion detection using artificial neural networks and fuzzy clustering, Expert Systems with Applications, vol. 37, no. 9, pp , [9] (1999, October) Kdd cup 99 competition. [Online]. Available: [10] C. Zhang, J. Jiang, and M. Kamel, Intrusion detection using hierarchical neural networks, Pattern Recognition Letters, vol. 26, no. 6, pp , [11] U. Ahmed and A. Masood, Host based intrusion detection using rbf neural networks, in Emerging Technologies, ICET International Conference on, 2009, pp [12] S. Lakhina, S. Joseph, and B. Verma, Feature reduction using principal component analysis for effective anomalybased intrusion detection on nsl-kdd, International Journal of Engineering Science and Technology, vol. 2, no. 6, pp , [13] F. Li, Hybrid neural network intrusion detection system using genetic algorithm, in Multimedia Technology (ICMT), 2010 International Conference on, 2010, pp [14] A. N. Toosi and M. Kahani, A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers, Computer Communications, vol. 30, no. 10, pp , [15] S. Mukkamala, G. Janoski, and A. Sung, Intrusion detection using neural networks and support vector machines, in Neural Networks, IJCNN 02. Proceedings of the 2002 International Joint Conference on, vol. 2, 2002, pp

6 [16] K. I. Diamantaras and S. Y. Kung, Principal Component Neural Networks. John Wiley & Sons, New York., [17] I. Jolliffe, Principal Component Analysis. Springer-Verlag, [18] S. Haykin, Neural Networks A Comprehensive Foundation, 2nd ed. Prentice-Hall, Inc. Simon & Schuster, A Viacom Company Upper Saddle River, New Jersey 07458, [19] J. Goldsmith, Unsupervised learning of the morphology of a natural language, Computational Linguistics, vol. 27, no. 2, pp , [20] S. Selman and A. Husagic-Selman, Multilayered feedforward neural networks as a tool for distinction of the authors of texts, in Information, Communication and Automation Technologies (ICAT), 2011 XXIII International Symposium on, 2011, pp [21] R. E. Schapire, The strength of weak learnability, Machine Learning, vol. 5, pp , [22] M. F. Mller, A scaled conjugate gradient algorithm for fast supervised learning, Neural Networks, vol. 6, no. 4, pp , [23] N. J. Nilsson, Learning Machines: Foundations of Trainable Pattern- Classifying Systems. McGraw-Hill, New York, [24] M. H. Beale, M. T. Hagan, and H. B. Demuth, Neural Networks Toolbox. User s Guide, MatLab R2012a. MathWorks Inc., 2012.

Performance Analysis of Network Intrusion Detection System using Back Propagation for Feed Forward Neural Network in MATLAB/SIMULINK

Performance Analysis of Network Intrusion Detection System using Back Propagation for Feed Forward Neural Network in MATLAB/SIMULINK ISSN (e): 2250 3005 Volume, 08 Issue, 5 May 2018 International Journal of Computational Engineering Research (IJCER) Performance Analysis of Network Intrusion Detection System using Back Propagation for

More information

Review on Methods of Selecting Number of Hidden Nodes in Artificial Neural Network

Review on Methods of Selecting Number of Hidden Nodes in Artificial Neural Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set

Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set Razieh Baradaran, Department of information technology, university of Qom, Qom, Iran R.baradaran@stu.qom.ac.ir Mahdieh HajiMohammadHosseini,

More information

Intrusion Detection System Using Hybrid Approach by MLP and K-Means Clustering

Intrusion Detection System Using Hybrid Approach by MLP and K-Means Clustering Intrusion Detection System Using Hybrid Approach by MLP and K-Means Clustering Archana A. Kadam, Prof. S. P. Medhane M.Tech Student, Bharati Vidyapeeth Deemed University, College of Engineering, Pune,

More information

An Ensemble Data Mining Approach for Intrusion Detection in a Computer Network

An Ensemble Data Mining Approach for Intrusion Detection in a Computer Network International Journal of Science and Engineering Investigations vol. 6, issue 62, March 2017 ISSN: 2251-8843 An Ensemble Data Mining Approach for Intrusion Detection in a Computer Network Abisola Ayomide

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN 1 Review: Boosting Classifiers For Intrusion Detection Richa Rawat, Anurag Jain ABSTRACT Network and host intrusion detection systems monitor malicious activities and the management station is a technique

More information

Hybrid Feature Selection for Modeling Intrusion Detection Systems

Hybrid Feature Selection for Modeling Intrusion Detection Systems Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,

More information

Intrusion Detection System with FGA and MLP Algorithm

Intrusion Detection System with FGA and MLP Algorithm Intrusion Detection System with FGA and MLP Algorithm International Journal of Engineering Research & Technology (IJERT) Miss. Madhuri R. Yadav Department Of Computer Engineering Siddhant College Of Engineering,

More information

Dynamic Analysis of Structures Using Neural Networks

Dynamic Analysis of Structures Using Neural Networks Dynamic Analysis of Structures Using Neural Networks Alireza Lavaei Academic member, Islamic Azad University, Boroujerd Branch, Iran Alireza Lohrasbi Academic member, Islamic Azad University, Boroujerd

More information

Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes

Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes Thaksen J. Parvat USET G.G.S.Indratrastha University Dwarka, New Delhi 78 pthaksen.sit@sinhgad.edu Abstract Intrusion

More information

A Neuro-Fuzzy Classifier for Intrusion Detection Systems

A Neuro-Fuzzy Classifier for Intrusion Detection Systems . 11 th International CSI Computer Conference (CSICC 2006), School of Computer Science, IPM, Jan. 24-26, 2006, Tehran, Iran. A Neuro-Fuzzy Classifier for Intrusion Detection Systems Adel Nadjaran Toosi

More information

FACE RECOGNITION USING FUZZY NEURAL NETWORK

FACE RECOGNITION USING FUZZY NEURAL NETWORK FACE RECOGNITION USING FUZZY NEURAL NETWORK TADI.CHANDRASEKHAR Research Scholar, Dept. of ECE, GITAM University, Vishakapatnam, AndraPradesh Assoc. Prof., Dept. of. ECE, GIET Engineering College, Vishakapatnam,

More information

A study on fuzzy intrusion detection

A study on fuzzy intrusion detection A study on fuzzy intrusion detection J.T. Yao S.L. Zhao L. V. Saxton Department of Computer Science University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: [jtyao,zhao200s,saxton]@cs.uregina.ca

More information

Image Compression: An Artificial Neural Network Approach

Image Compression: An Artificial Neural Network Approach Image Compression: An Artificial Neural Network Approach Anjana B 1, Mrs Shreeja R 2 1 Department of Computer Science and Engineering, Calicut University, Kuttippuram 2 Department of Computer Science and

More information

Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks

Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks Ritika Luthra Research Scholar Chandigarh University Gulshan Goyal Associate Professor Chandigarh University ABSTRACT Image Skeletonization

More information

Flow-based Anomaly Intrusion Detection System Using Neural Network

Flow-based Anomaly Intrusion Detection System Using Neural Network Flow-based Anomaly Intrusion Detection System Using Neural Network tational power to analyze only the basic characteristics of network flow, so as to Intrusion Detection systems (KBIDES) classify the data

More information

Argha Roy* Dept. of CSE Netaji Subhash Engg. College West Bengal, India.

Argha Roy* Dept. of CSE Netaji Subhash Engg. College West Bengal, India. Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Training Artificial

More information

An Algorithm For Training Multilayer Perceptron (MLP) For Image Reconstruction Using Neural Network Without Overfitting.

An Algorithm For Training Multilayer Perceptron (MLP) For Image Reconstruction Using Neural Network Without Overfitting. An Algorithm For Training Multilayer Perceptron (MLP) For Image Reconstruction Using Neural Network Without Overfitting. Mohammad Mahmudul Alam Mia, Shovasis Kumar Biswas, Monalisa Chowdhury Urmi, Abubakar

More information

Determining the Number of Hidden Neurons in a Multi Layer Feed Forward Neural Network

Determining the Number of Hidden Neurons in a Multi Layer Feed Forward Neural Network Determining the Number of Hidden Neurons in a Multi Layer Feed Forward Neural Network Lynn Ray University of Maryland University College 3501 University Blvd East Adelphi, MD 20783. USA ABSTRACT: A neural

More information

Efficient Method for Intrusion Detection in Multitenanat Data Center; A Review

Efficient Method for Intrusion Detection in Multitenanat Data Center; A Review Efficient Method for Intrusion Detection in Multitenanat Data Center; A Review S. M. Jawahire Dept. of Computer Engineering J.S.C.O.E.,Hadapsar Pune, India H. A. Hingoliwala Dept. of Computer Engineering

More information

Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers

Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers A. Salhi, B. Minaoui, M. Fakir, H. Chakib, H. Grimech Faculty of science and Technology Sultan Moulay Slimane

More information

An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data

An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data Nian Zhang and Lara Thompson Department of Electrical and Computer Engineering, University

More information

Ensemble of Soft Computing Techniques for Intrusion Detection. Ensemble of Soft Computing Techniques for Intrusion Detection

Ensemble of Soft Computing Techniques for Intrusion Detection. Ensemble of Soft Computing Techniques for Intrusion Detection Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 13 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Comparison of variable learning rate and Levenberg-Marquardt back-propagation training algorithms for detecting attacks in Intrusion Detection Systems

Comparison of variable learning rate and Levenberg-Marquardt back-propagation training algorithms for detecting attacks in Intrusion Detection Systems Comparison of variable learning rate and Levenberg-Marquardt back-propagation training algorithms for detecting attacks in Intrusion Detection Systems Tummala Pradeep 1 IV th Year Student, Department of

More information

Optimization Model of K-Means Clustering Using Artificial Neural Networks to Handle Class Imbalance Problem

Optimization Model of K-Means Clustering Using Artificial Neural Networks to Handle Class Imbalance Problem IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Optimization Model of K-Means Clustering Using Artificial Neural Networks to Handle Class Imbalance Problem To cite this article:

More information

1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra

1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra Pattern Recall Analysis of the Hopfield Neural Network with a Genetic Algorithm Susmita Mohapatra Department of Computer Science, Utkal University, India Abstract: This paper is focused on the implementation

More information

A *69>H>N6 #DJGC6A DG C<>C::G>C<,8>:C8:H /DA 'D 2:6G, ()-"&"3 -"(' ( +-" " " % '.+ % ' -0(+$,

A *69>H>N6 #DJGC6A DG C<>C::G>C<,8>:C8:H /DA 'D 2:6G, ()-&3 -(' ( +-   % '.+ % ' -0(+$, The structure is a very important aspect in neural network design, it is not only impossible to determine an optimal structure for a given problem, it is even impossible to prove that a given structure

More information

Combination of Three Machine Learning Algorithms for Intrusion Detection Systems in Computer Networks

Combination of Three Machine Learning Algorithms for Intrusion Detection Systems in Computer Networks Vol. () December, pp. 9-8 ISSN95-9X Combination of Three Machine Learning Algorithms for Intrusion Detection Systems in Computer Networks Ali Reza Zebarjad, Mohmmad Mehdi Lotfinejad Dapartment of Computer,

More information

KINEMATIC ANALYSIS OF ADEPT VIPER USING NEURAL NETWORK

KINEMATIC ANALYSIS OF ADEPT VIPER USING NEURAL NETWORK Proceedings of the National Conference on Trends and Advances in Mechanical Engineering, YMCA Institute of Engineering, Faridabad, Haryana., Dec 9-10, 2006. KINEMATIC ANALYSIS OF ADEPT VIPER USING NEURAL

More information

COMBINING NEURAL NETWORKS FOR SKIN DETECTION

COMBINING NEURAL NETWORKS FOR SKIN DETECTION COMBINING NEURAL NETWORKS FOR SKIN DETECTION Chelsia Amy Doukim 1, Jamal Ahmad Dargham 1, Ali Chekima 1 and Sigeru Omatu 2 1 School of Engineering and Information Technology, Universiti Malaysia Sabah,

More information

Yuki Osada Andrew Cannon

Yuki Osada Andrew Cannon Yuki Osada Andrew Cannon 1 Humans are an intelligent species One feature is the ability to learn The ability to learn comes down to the brain The brain learns from experience Research shows that the brain

More information

CHAPTER VI BACK PROPAGATION ALGORITHM

CHAPTER VI BACK PROPAGATION ALGORITHM 6.1 Introduction CHAPTER VI BACK PROPAGATION ALGORITHM In the previous chapter, we analysed that multiple layer perceptrons are effectively applied to handle tricky problems if trained with a vastly accepted

More information

A study of Intrusion Detection System for Cloud Network Using FC-ANN Algorithm

A study of Intrusion Detection System for Cloud Network Using FC-ANN Algorithm A study of Intrusion Detection System for Cloud Network Using FC-ANN Algorithm Gayatri K. Chaturvedi 1, Arjun K. Chaturvedi 2, Varsha R. More 3 (MECOMP-Lecturer) 1, (BEIT-Student) 2, (BEE&TC-Student) 3

More information

Research Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6)

Research Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6) International Journals of Advanced Research in Computer Science and Software Engineering Research Article June 17 Artificial Neural Network in Classification A Comparison Dr. J. Jegathesh Amalraj * Assistant

More information

Review on Data Mining Techniques for Intrusion Detection System

Review on Data Mining Techniques for Intrusion Detection System Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,

More information

Classification and Regression using Linear Networks, Multilayer Perceptrons and Radial Basis Functions

Classification and Regression using Linear Networks, Multilayer Perceptrons and Radial Basis Functions ENEE 739Q SPRING 2002 COURSE ASSIGNMENT 2 REPORT 1 Classification and Regression using Linear Networks, Multilayer Perceptrons and Radial Basis Functions Vikas Chandrakant Raykar Abstract The aim of the

More information

A Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction

A Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction A Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction Hanghang Tong 1, Chongrong Li 2, and Jingrui He 1 1 Department of Automation, Tsinghua University, Beijing 100084,

More information

CS6220: DATA MINING TECHNIQUES

CS6220: DATA MINING TECHNIQUES CS6220: DATA MINING TECHNIQUES Image Data: Classification via Neural Networks Instructor: Yizhou Sun yzsun@ccs.neu.edu November 19, 2015 Methods to Learn Classification Clustering Frequent Pattern Mining

More information

Contents Machine Learning concepts 4 Learning Algorithm 4 Predictive Model (Model) 4 Model, Classification 4 Model, Regression 4 Representation

Contents Machine Learning concepts 4 Learning Algorithm 4 Predictive Model (Model) 4 Model, Classification 4 Model, Regression 4 Representation Contents Machine Learning concepts 4 Learning Algorithm 4 Predictive Model (Model) 4 Model, Classification 4 Model, Regression 4 Representation Learning 4 Supervised Learning 4 Unsupervised Learning 4

More information

Intrusion detection in computer networks through a hybrid approach of data mining and decision trees

Intrusion detection in computer networks through a hybrid approach of data mining and decision trees WALIA journal 30(S1): 233237, 2014 Available online at www.waliaj.com ISSN 10263861 2014 WALIA Intrusion detection in computer networks through a hybrid approach of data mining and decision trees Tayebeh

More information

NEURAL NETWORK BASED REGRESSION TESTING

NEURAL NETWORK BASED REGRESSION TESTING NEURAL NETWORK BASED REGRESSION TESTING Esha Khanna Assistant Professor, IT Department, D. A.V Institute of Management, (India) ABSTRACT Regression testing re-executes all the test cases in order to ensure

More information

Neural Networks. CE-725: Statistical Pattern Recognition Sharif University of Technology Spring Soleymani

Neural Networks. CE-725: Statistical Pattern Recognition Sharif University of Technology Spring Soleymani Neural Networks CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Biological and artificial neural networks Feed-forward neural networks Single layer

More information

Keywords Intrusion Detection System, Artificial Neural Network, Multi-Layer Perceptron. Apriori algorithm

Keywords Intrusion Detection System, Artificial Neural Network, Multi-Layer Perceptron. Apriori algorithm Volume 3, Issue 6, June 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Detecting and Classifying

More information

A Review on Performance Comparison of Artificial Intelligence Techniques Used for Intrusion Detection

A Review on Performance Comparison of Artificial Intelligence Techniques Used for Intrusion Detection A Review on Performance Comparison of Artificial Intelligence Techniques Used for Intrusion Detection Navaneet Kumar Sinha 1, Gulshan Kumar 2 and Krishan Kumar 3 1 Department of Computer Science & Engineering,

More information

Learning Fuzzy Cognitive Maps by a Hybrid Method Using Nonlinear Hebbian Learning and Extended Great Deluge Algorithm

Learning Fuzzy Cognitive Maps by a Hybrid Method Using Nonlinear Hebbian Learning and Extended Great Deluge Algorithm Learning Fuzzy Cognitive Maps by a Hybrid Method Using Nonlinear Hebbian Learning and Extended Great Deluge Algorithm Zhaowei Ren School of Electronic and Computing Systems University of Cincinnati 600

More information

An Intelligent Technique for Image Compression

An Intelligent Technique for Image Compression An Intelligent Technique for Image Compression Athira Mayadevi Somanathan 1, V. Kalaichelvi 2 1 Dept. Of Electronics and Communications Engineering, BITS Pilani, Dubai, U.A.E. 2 Dept. Of Electronics and

More information

Classifier C-Net. 2D Projected Images of 3D Objects. 2D Projected Images of 3D Objects. Model I. Model II

Classifier C-Net. 2D Projected Images of 3D Objects. 2D Projected Images of 3D Objects. Model I. Model II Advances in Neural Information Processing Systems 7. (99) The MIT Press, Cambridge, MA. pp.949-96 Unsupervised Classication of 3D Objects from D Views Satoshi Suzuki Hiroshi Ando ATR Human Information

More information

Data Mining. Neural Networks

Data Mining. Neural Networks Data Mining Neural Networks Goals for this Unit Basic understanding of Neural Networks and how they work Ability to use Neural Networks to solve real problems Understand when neural networks may be most

More information

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of

More information

Cluster Based detection of Attack IDS using Data Mining

Cluster Based detection of Attack IDS using Data Mining Cluster Based detection of Attack IDS using Data Mining 1 Manisha Kansra, 2 Pankaj Dev Chadha 1 Research scholar, 2 Assistant Professor, 1 Department of Computer Science Engineering 1 Geeta Institute of

More information

FEATURE SELECTION TECHNIQUES

FEATURE SELECTION TECHNIQUES CHAPTER-2 FEATURE SELECTION TECHNIQUES 2.1. INTRODUCTION Dimensionality reduction through the choice of an appropriate feature subset selection, results in multiple uses including performance upgrading,

More information

Performance Analysis of Data Mining Classification Techniques

Performance Analysis of Data Mining Classification Techniques Performance Analysis of Data Mining Classification Techniques Tejas Mehta 1, Dr. Dhaval Kathiriya 2 Ph.D. Student, School of Computer Science, Dr. Babasaheb Ambedkar Open University, Gujarat, India 1 Principal

More information

EE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR

EE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR EE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR 1.Introductıon. 2.Multi Layer Perception.. 3.Fuzzy C-Means Clustering.. 4.Real

More information

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X Analysis about Classification Techniques on Categorical Data in Data Mining Assistant Professor P. Meena Department of Computer Science Adhiyaman Arts and Science College for Women Uthangarai, Krishnagiri,

More information

Available online at ScienceDirect. Procedia Computer Science 89 (2016 )

Available online at   ScienceDirect. Procedia Computer Science 89 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 89 (2016 ) 117 123 Twelfth International Multi-Conference on Information Processing-2016 (IMCIP-2016) Performance Evaluation

More information

Applying Neural Network Architecture for Inverse Kinematics Problem in Robotics

Applying Neural Network Architecture for Inverse Kinematics Problem in Robotics J. Software Engineering & Applications, 2010, 3: 230-239 doi:10.4236/jsea.2010.33028 Published Online March 2010 (http://www.scirp.org/journal/jsea) Applying Neural Network Architecture for Inverse Kinematics

More information

A Neural Network Model Of Insurance Customer Ratings

A Neural Network Model Of Insurance Customer Ratings A Neural Network Model Of Insurance Customer Ratings Jan Jantzen 1 Abstract Given a set of data on customers the engineering problem in this study is to model the data and classify customers

More information

Anomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model

Anomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model 264 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.8, August 2008 Anomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model M. Bahrololum and M. Khaleghi

More information

Finding Dominant Parameters For Fault Diagnosis Of a Single Bearing System Using Back Propagation Neural Network

Finding Dominant Parameters For Fault Diagnosis Of a Single Bearing System Using Back Propagation Neural Network International Journal of Mechanical & Mechatronics Engineering IJMME-IJENS Vol:13 No:01 40 Finding Dominant Parameters For Fault Diagnosis Of a Single Bearing System Using Back Propagation Neural Network

More information

11/14/2010 Intelligent Systems and Soft Computing 1

11/14/2010 Intelligent Systems and Soft Computing 1 Lecture 7 Artificial neural networks: Supervised learning Introduction, or how the brain works The neuron as a simple computing element The perceptron Multilayer neural networks Accelerated learning in

More information

IN recent years, neural networks have attracted considerable attention

IN recent years, neural networks have attracted considerable attention Multilayer Perceptron: Architecture Optimization and Training Hassan Ramchoun, Mohammed Amine Janati Idrissi, Youssef Ghanou, Mohamed Ettaouil Modeling and Scientific Computing Laboratory, Faculty of Science

More information

Automatic Modularization of ANNs Using Adaptive Critic Method

Automatic Modularization of ANNs Using Adaptive Critic Method Automatic Modularization of ANNs Using Adaptive Critic Method RUDOLF JAKŠA Kyushu Institute of Design 4-9-1 Shiobaru, Minami-ku, Fukuoka, 815-8540 JAPAN Abstract: - We propose automatic modularization

More information

Face Detection Using Radial Basis Function Neural Networks With Fixed Spread Value

Face Detection Using Radial Basis Function Neural Networks With Fixed Spread Value Detection Using Radial Basis Function Neural Networks With Fixed Value Khairul Azha A. Aziz Faculty of Electronics and Computer Engineering, Universiti Teknikal Malaysia Melaka, Ayer Keroh, Melaka, Malaysia.

More information

A Data Classification Algorithm of Internet of Things Based on Neural Network

A Data Classification Algorithm of Internet of Things Based on Neural Network A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To

More information

Visual object classification by sparse convolutional neural networks

Visual object classification by sparse convolutional neural networks Visual object classification by sparse convolutional neural networks Alexander Gepperth 1 1- Ruhr-Universität Bochum - Institute for Neural Dynamics Universitätsstraße 150, 44801 Bochum - Germany Abstract.

More information

NEURAL NETWORK-BASED SEGMENTATION OF TEXTURES USING GABOR FEATURES

NEURAL NETWORK-BASED SEGMENTATION OF TEXTURES USING GABOR FEATURES NEURAL NETWORK-BASED SEGMENTATION OF TEXTURES USING GABOR FEATURES A. G. Ramakrishnan, S. Kumar Raja, and H. V. Raghu Ram Dept. of Electrical Engg., Indian Institute of Science Bangalore - 560 012, India

More information

Approach Using Genetic Algorithm for Intrusion Detection System

Approach Using Genetic Algorithm for Intrusion Detection System Approach Using Genetic Algorithm for Intrusion Detection System 544 Abhijeet Karve Government College of Engineering, Aurangabad, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra-

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 Application of Neural Network for Different Learning Parameter in Classification of Local Feature Image Annie anak Joseph, Chong Yung Fook Universiti Malaysia Sarawak, Faculty of Engineering, 94300, Kota

More information

International Journal of Electrical and Computer Engineering 4: Application of Neural Network in User Authentication for Smart Home System

International Journal of Electrical and Computer Engineering 4: Application of Neural Network in User Authentication for Smart Home System Application of Neural Network in User Authentication for Smart Home System A. Joseph, D.B.L. Bong, and D.A.A. Mat Abstract Security has been an important issue and concern in the smart home systems. Smart

More information

DEVELOPMENT OF NEURAL NETWORK TRAINING METHODOLOGY FOR MODELING NONLINEAR SYSTEMS WITH APPLICATION TO THE PREDICTION OF THE REFRACTIVE INDEX

DEVELOPMENT OF NEURAL NETWORK TRAINING METHODOLOGY FOR MODELING NONLINEAR SYSTEMS WITH APPLICATION TO THE PREDICTION OF THE REFRACTIVE INDEX DEVELOPMENT OF NEURAL NETWORK TRAINING METHODOLOGY FOR MODELING NONLINEAR SYSTEMS WITH APPLICATION TO THE PREDICTION OF THE REFRACTIVE INDEX THESIS CHONDRODIMA EVANGELIA Supervisor: Dr. Alex Alexandridis,

More information

Research on Evaluation Method of Product Style Semantics Based on Neural Network

Research on Evaluation Method of Product Style Semantics Based on Neural Network Research Journal of Applied Sciences, Engineering and Technology 6(23): 4330-4335, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: September 28, 2012 Accepted:

More information

Radial Basis Function Neural Network Classifier

Radial Basis Function Neural Network Classifier Recognition of Unconstrained Handwritten Numerals by a Radial Basis Function Neural Network Classifier Hwang, Young-Sup and Bang, Sung-Yang Department of Computer Science & Engineering Pohang University

More information

Based on the fusion of neural network algorithm in the application of the anomaly detection

Based on the fusion of neural network algorithm in the application of the anomaly detection , pp.28-34 http://dx.doi.org/10.14257/astl.2016.134.05 Based on the fusion of neural network algorithm in the application of the anomaly detection Zhu YuanZhong Electrical and Information Engineering Department

More information

Comparison Deep Learning Method to Traditional Methods Using for Network Intrusion Detection

Comparison Deep Learning Method to Traditional Methods Using for Network Intrusion Detection 2016 8th IEEE International Conference on Communication Softw are and N etw ork s Comparison Deep Learning Method to Traditional Methods Using for Network Intrusion Detection Bo Dong Computing Center of

More information

An Optimized Genetic Algorithm with Classification Approach used for Intrusion Detection

An Optimized Genetic Algorithm with Classification Approach used for Intrusion Detection International Journal of Computer Networks and Communications Security VOL. 3, NO. 1, JANUARY 2015, 6 10 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) An Optimized

More information

Multiple Classifier Fusion With Cuttlefish Algorithm Based Feature Selection

Multiple Classifier Fusion With Cuttlefish Algorithm Based Feature Selection Multiple Fusion With Cuttlefish Algorithm Based Feature Selection K.Jayakumar Department of Communication and Networking k_jeyakumar1979@yahoo.co.in S.Karpagam Department of Computer Science and Engineering,

More information

Identification of Multisensor Conversion Characteristic Using Neural Networks

Identification of Multisensor Conversion Characteristic Using Neural Networks Sensors & Transducers 3 by IFSA http://www.sensorsportal.com Identification of Multisensor Conversion Characteristic Using Neural Networks Iryna TURCHENKO and Volodymyr KOCHAN Research Institute of Intelligent

More information

NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION

NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION * Prof. Dr. Ban Ahmed Mitras ** Ammar Saad Abdul-Jabbar * Dept. of Operation Research & Intelligent Techniques ** Dept. of Mathematics. College

More information

Character Recognition Using Convolutional Neural Networks

Character Recognition Using Convolutional Neural Networks Character Recognition Using Convolutional Neural Networks David Bouchain Seminar Statistical Learning Theory University of Ulm, Germany Institute for Neural Information Processing Winter 2006/2007 Abstract

More information

GP Ensemble for Distributed Intrusion Detection Systems

GP Ensemble for Distributed Intrusion Detection Systems GP Ensemble for Distributed Intrusion Detection Systems Gianluigi Folino, Clara Pizzuti and Giandomenico Spezzano ICAR-CNR, Via P.Bucci 41/C, Univ. della Calabria 87036 Rende (CS), Italy {folino,pizzuti,spezzano}@icar.cnr.it

More information

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:

More information

A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection

A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection S. Revathi Ph.D. Research Scholar PG and Research, Department of Computer Science Government Arts

More information

Nonlinear dimensionality reduction of large datasets for data exploration

Nonlinear dimensionality reduction of large datasets for data exploration Data Mining VII: Data, Text and Web Mining and their Business Applications 3 Nonlinear dimensionality reduction of large datasets for data exploration V. Tomenko & V. Popov Wessex Institute of Technology,

More information

Procedia Computer Science

Procedia Computer Science Procedia Computer Science 3 (2011) 584 588 Procedia Computer Science 00 (2010) 000 000 Procedia Computer Science www.elsevier.com/locate/procedia www.elsevier.com/locate/procedia WCIT 2010 Diagnosing internal

More information

A Survey And Comparative Analysis Of Data

A Survey And Comparative Analysis Of Data A Survey And Comparative Analysis Of Data Mining Techniques For Network Intrusion Detection Systems In Information Security, intrusion detection is the act of detecting actions that attempt to In 11th

More information

Intelligent Risk Identification and Analysis in IT Network Systems

Intelligent Risk Identification and Analysis in IT Network Systems Intelligent Risk Identification and Analysis in IT Network Systems Masoud Mohammadian University of Canberra, Faculty of Information Sciences and Engineering, Canberra, ACT 2616, Australia masoud.mohammadian@canberra.edu.au

More information

Self-Organizing Maps for Analysis of Expandable Polystyrene Batch Process

Self-Organizing Maps for Analysis of Expandable Polystyrene Batch Process International Journal of Computers, Communications & Control Vol. II (2007), No. 2, pp. 143-148 Self-Organizing Maps for Analysis of Expandable Polystyrene Batch Process Mikko Heikkinen, Ville Nurminen,

More information

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) Research on Applications of Data Mining in Electronic Commerce Xiuping YANG 1, a 1 Computer Science Department,

More information

DDoS Detection in SDN Switches using Support Vector Machine Classifier

DDoS Detection in SDN Switches using Support Vector Machine Classifier Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) DDoS Detection in SDN Switches using Support Vector Machine Classifier Xue Li1, a *, Dongming Yuan2,b, Hefei

More information

Mining Audit Data for Intrusion Detection Systems Using Support Vector Machines and Neural Networks

Mining Audit Data for Intrusion Detection Systems Using Support Vector Machines and Neural Networks Journal on Information Sciences and Computing, Vol.1, No.1, December 2007 Mining Audit Data for Intrusion Detection Systems Using Support Vector Machines and Neural Networks 47 Ramamoorthy Subbureddiar,

More information

Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network

Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Utkarsh Dwivedi 1, Pranjal Rajput 2, Manish Kumar Sharma 3 1UG Scholar, Dept. of CSE, GCET, Greater Noida,

More information

European Journal of Science and Engineering Vol. 1, Issue 1, 2013 ADAPTIVE NEURO-FUZZY INFERENCE SYSTEM IDENTIFICATION OF AN INDUCTION MOTOR

European Journal of Science and Engineering Vol. 1, Issue 1, 2013 ADAPTIVE NEURO-FUZZY INFERENCE SYSTEM IDENTIFICATION OF AN INDUCTION MOTOR ADAPTIVE NEURO-FUZZY INFERENCE SYSTEM IDENTIFICATION OF AN INDUCTION MOTOR Ahmed A. M. Emam College of Engineering Karrary University SUDAN ahmedimam1965@yahoo.co.in Eisa Bashier M. Tayeb College of Engineering

More information

Application of the Generic Feature Selection Measure in Detection of Web Attacks

Application of the Generic Feature Selection Measure in Detection of Web Attacks Application of the Generic Feature Selection Measure in Detection of Web Attacks Hai Thanh Nguyen 1, Carmen Torrano-Gimenez 2, Gonzalo Alvarez 2 Slobodan Petrović 1, and Katrin Franke 1 1 Norwegian Information

More information

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN 1 Shipra Diwakar, 2 Dr. R. Kashyup 1 Research Scholar, 2 HOD ECE Rayat Bahara University Ropar, Punjab ABSTRACT Security in Wireless Sensor

More information

A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks

A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks K.Q. Yan, S.C. Wang, C.W. Liu Abstract Recent advances in Wireless Sensor Networks (WSNs) have made them extremely useful in

More information

APPLICATIONS OF INTELLIGENT HYBRID SYSTEMS IN MATLAB

APPLICATIONS OF INTELLIGENT HYBRID SYSTEMS IN MATLAB APPLICATIONS OF INTELLIGENT HYBRID SYSTEMS IN MATLAB Z. Dideková, S. Kajan Institute of Control and Industrial Informatics, Faculty of Electrical Engineering and Information Technology, Slovak University

More information

Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations

Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations Prateek Saxena March 3 2008 1 The Problems Today s lecture is on the discussion of the critique on 1998 and 1999 DARPA IDS evaluations conducted

More information

INTELLIGENT transportation systems have a significant

INTELLIGENT transportation systems have a significant INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 205, VOL. 6, NO. 4, PP. 35 356 Manuscript received October 4, 205; revised November, 205. DOI: 0.55/eletel-205-0046 Efficient Two-Step Approach for Automatic

More information

Classification of Face Images for Gender, Age, Facial Expression, and Identity 1

Classification of Face Images for Gender, Age, Facial Expression, and Identity 1 Proc. Int. Conf. on Artificial Neural Networks (ICANN 05), Warsaw, LNCS 3696, vol. I, pp. 569-574, Springer Verlag 2005 Classification of Face Images for Gender, Age, Facial Expression, and Identity 1

More information