Intrusion Detection using Neural Network Committee Machine
|
|
- Melvyn Ward
- 6 years ago
- Views:
Transcription
1 2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT) October 30 November 01, 2013, Sarajevo, Bosnia and Herzegovina Intrusion Detection using Neural Network Committee Machine Alma Husagic-Selman Department of Computer Science and Engineering International University of Sarajevo Sarajevo, BiH Rasit Koker Department of Computer Engineering Sakarya University Sakarya, Turkey Suvad Selman Department of Electrical and Electronics Engineering International University of Sarajevo Sarajevo, BiH Abstract Intrusion detection plays an important role in todays computer and communication technology. As such it is very important to design time efficient Intrusion Detection System (IDS) low in both, False Positive Rate (FPR) and False Negative Rate (FNR), but high in attack detection precision. To achieve that, this paper proposes Neural Network Committee Machine (NNCM) IDS. NNCM IDS consists of Input Reduction System based on Principal Component Analysis (PCA) and Intrusion Detection System, which is represented by three levels committee machine, each based on Back-Propagation Neural Network. To reduce the FNR, the system uses offline System Update, which retrains the networks when new attacks are introduced. The system shows the overall attack detection success of 99.8%. Keywords Intrusion detection, Neural Networks, Committee Machine, Intelligent Intrusion Detection System I. INTRODUCTION Since second half of last century, computer networks started to grow with tremendous speed and with them the need for security mechanisms which would ensure data, privacy and computer security grew as well. Many different security mechanisms were designed, yet none was reliable enough to protect the computer-network system from ever evolving threats and attacks. Firewalls were made in order to protect the networks from attacks that come from outside world, but they do not obliterate any intrusion coming from inside the network. Intrusion Detection Systems (IDS), on the other hand, monitor networking packets in order to prevent any form of computer attacks from within the network [1] [4]. This work focuses on IDS, since existing commercial IDSs offer wide window for improvements. In general, IDSs may be designed to perform misuse detection or anomaly detection [1] [5]. In misuse detection, all known abnormal behavior is defined and the system is trained to recognize it. It works by comparing the arriving packet with features of known attack behavior. If any new, not predefined attack arrives, the system would recognize it as normal packet, causing high FNR [2].To avoid very high FNR, misuse based IDS must be retrained very often, sometimes causing delays in the network [6]. Anomaly detection is modeled based on normal behavior [7], so any pattern violating that behavior would be defined as a system attack [1] [5]. Anomaly detection causes high FPR, because even some new normal packets, unknown to the system, would be identified as attacks. This deteriorates overall network performance, since some normal packets would never reach destination. For these reasons, most commercial IDS are designed to perform misuse detection alone. False alarms, be it false positive or false negative, are limiting the performance of IDS. It is therefore very important to reduce both types of these alarms, and the best way to do so is by combining anomaly and misuse detection [5] [8]. This paper proposes fast, efficient and accurate IDS based on committee machine. The system is updated offline anytime threshold for unrecognized packets is reached. The system produces five outputs, normal packet and four attack types (DoS, U2R, R2L and Probe) [9]. The paper is organized as follows: Related works are discussed in Section 2, Section 3 gives an overview of methods and algorithms used in this work, Section 4 presents data used for experimentation, Section 5 describes the system model, Section 6 presents and discusses results, and Section 7 concludes the paper. II. RELATED WORKS Different machine learning mechanisms, including Artificial Neural Networks, Fuzzy Logic, Genetic Algorithms, etc. have been used on KDD CUP 1999 data for Intrusion Detection [1] [10]. Different neural network algorithms have been used, including Grey Neural Networks [4], RBF [10], [11] Recirculation Neural Networks [2], PCA [6] [12] and MLP [5], with MLP generally showing better results than others [2].These works are mainly focusing on misuse detection. In order to combine misuse and anomaly detection, many researchers have recently attempted hybrid methods, by combining neural networks with other machine learning mechanisms, such as fuzzy logic or genetic algorithms [5], [1], [13] [15]. Summary of all these results is presented in Table I. Table II shows FPR and FNR for different neural network and hybrid classification algorithms. III. ALGORITHMS AND METHODS Multiple methods are used in this work: PCA for feature reduction, feed-forward Multilayer Perceptron Neural Net /13/$ IEEE
2 TABLE I. SUMMARY OF RESULTS FOR DIFFERENT NEURAL NETWORKS AND HYBRID SYSTEMS Approach DOS, % Probe, % R2L, % U2R, % Decision Trees Bayesian Networks Flexible Neural Tree Fuzzy NN MLP Advanced NN Evolving Fuzzy NN Recirculation NN PCA & Gray NN Fuzzy C-Mean and MLP ANSIF, FIS & GA above it. There are no connections among the units of a single layer. The common examples of this category are Multilayer Perceptron or Radial Basis Function networks [18]. TABLE II. SUMMARY OF FPR AND FNR FOR DIFFERENT CLASSIFICATION ALGORITHMS Approach FNR, % FPR, % Flexible Neural Tree MLP Clasterization K-NN SVM Recirculation Neural Networks Fuzzy C-Mean and MLP works for classification and Committee Machine as a boosting mechanism. A. Principle Component Analysis PCA is very useful mathematical algorithm, based on orthogonal linear transformation, which is widely used for data compression, image processing and feature extraction [6] [12]. The goal of PCA is to find a set of orthogonal components that minimize the error in reconstructed data. An equivalent formulation of PCA is to find an orthogonal set of vectors that maximize the variance of the projected data [16]. In other words, PCA transforms the data into different frame of reference with minimal error and using fewer features than the original data, while preserving data randomness [17]. For more detailed description of PCA algorithm refer to [16], [17]. B. Neural Networks Neural Networks are mathematical algorithms whose design was inspired by biological neural networks found in living organisms. Neural networks produce efficient solutions to a wide range of specific problems, ranging from simple classification to data compression and image processing [18]. They can be divided into two main categories: feed-forward and recurrent networks. In feed-forward networks the flow of data goes from input to output cells, which can be grouped into layers but no feedback interconnections can exist. On the other hand, recurrent networks contain feedback loops and their dynamical properties are very important. The most popularly used type of neural networks employed in pattern classification tasks is the feed-forward network which is constructed from layers and possesses unidirectional weighted connections between neurons [18], [19]. A feed-forward network has a layered structure (Figure 1), with input layer, hidden layer and output layer. Each layer consists of units where each unit receives its inputs from units in a layer below and send its output to units in a layer directly Fig. 1. Feed-forward network (MLP) with N inputs, one output and one hidden layer Multilayer Perceptron (MLP) type is defined by establishing the number of neurons from which it is built. This process can be divided into three parts: obtaining number of inputs, defining number of outputs, and deciding number of hidden layers. The last part can become crucial to accuracy of obtained classification results [19]. The number of input and output neurons can be actually seen as external specification of the network and these parameters are rather found in a task specification. The number of inputs is determined by the number of features that characterize the data, and outputs typically reflect the number of classes [20]. Fig. 2. Activation function (logistic function) used at neurons Each neuron within the hidden layer is represented by transfer function known as activation function. The transfer function should be able to accept an input within any range, and to produce an output in a strictly limited range. Figure 2 shows one of the most common transfer functions, the logistic function. In this case, the output is in the range (0, 1), and the input is sensitive in a range not much larger than (-1, +1). This function is also smooth and easily differentiable. These properties are critical in allowing the network training algorithms to operate [21]. In order to produce the desired set of output states whenever a set of inputs is presented, neural network has to be
3 configured by setting the strengths or weights to the interconnections. This step is known as learning procedure [21]. Learning rules are roughly divided into three categories of supervised, unsupervised and reinforcement learning methods. For descriptions of these algorithms refer to [18] [23]. Back-propagation (backward propagation of errors) is supervised learning algorithm, which is the most useful for feedforward networks. The algorithm can be divided into two main phases, propagation phase and weight update. In propagation phase, inputs are passed to the hidden layer where the initial weights were set. The hidden layer produces certain outputs, which are evaluated against original outputs, and error is calculated. In the second phase, the calculated error is used to update neuron weights. The process continues until optimum weights, are obtained [18] [20]. The problem with back-propagation is slow convergence, which can be improved if Scaled Conjugate Gradient (SCG)back-propagation learning mechanism is used. SCG belongs to the class of Conjugate Gradient Methods, which are characteristic by super-linear convergence on most problems [22]. Moller (1993) has shown that SCG is at least an order of magnitude faster than standard back-propagation learning. This speed-up depends on the convergence criteria, so the bigger demand for reduction in error, the bigger the speedup. By using a step size scaling mechanism SCG avoids a time consuming line-search per learning iteration, which makes the algorithm faster than some other learning algorithms [24]. C. Committee Machine In this work, artificial neural network committee machines with feed-forward multilayer perceptron and back-propagation learning algorithm is used. In committee machines, a complex computational task is solved by dividing it into a number of computationally simple tasks and then combining the solutions of these computations [18]. In other words, computational simplicity is achieved by distributing the learning task among a number of experts, which in turn divide the input space into a set of subspaces. The combination of these experts is said to constitute a committee machine. Basically, it fuses knowledge acquired by experts to arrive at an overall decision that is superior to that attainable by any one of them acting alone [20]. This method reduces the FP and FN errors, and improves performance of the system [20]. IV. DATA DESCRIPTION The data used in this work is widely used KDD CUP 1999 data, which was created based on DARPA Intrusion Detection data set, collected by MIT Lincoln Laboratory [9]. The data contains 41 features, specifying packet type, protocol and so on, and class label, specifying if the packet is normal or attack. Data set contains 22 attack types, which can be divided into four main categories [9], as follows: Denial of Service (DoS) denies service to legitimate users, most commonly through overloading of existing resources. Six out of total 22 attacks fall into this group. User-to-Root (U2R), user with normal user privileges tries to exploit vulnerabilities of the system in order to gain the access to the root of the system. Four out of total 22 attack fall into this group. Remote-to-Locals (R2L), unauthorized user from a remote machine tries to access local machine by exploiting holes in local machine. Eight out of 22 attacks fall into this group. Probing (Probe), unauthorized user monitors the networks in order to obtain information and discover systems vulnerabilities. Four out of total 22 attack fall into this group. Original KDD CUP 1999 training data, consisting of about 5 million records, was too large to analyze, and for that reason, concise set known as 10% training set was used. Out of this concise set of records, records was chosen for training and 6900 records was used for testing. V. INTRUSION DETECTION MODEL Intrusion Detection Model was designed based on anomaly detection, with Committee Machine recognizing if the attack exists or not. As mentioned earlier, anomaly detection is shown to have low FNR, but in order to reduce FPR, system update is designed. Thus, proposed Intrusion Detection Model consists of three parts: Input Reduction System, Committee Machine and System Update (Figure 3). Fig. 3. Proposed Intrusion Detection Model A. Input Reduction System In systems with large dataset characterized with numerous features, input or feature reduction process should be done whenever possible. This step helps remove distracting variance from a dataset and as such improves the performance of the classifier and speeds up the classification process. In this work, single PCA neural network was chosen as a tool for feature reduction. PCA Neural Network takes original 41 inputs and reduces the input size to 13. General overview of input reduction system is shown in Figure 4. Fig. 4. Input/Feature Reduction System B. Committee Machine Committee consists of three Back-Propagating Neural Networks, set in parallel. Each neural network receives inputs from
4 Fig. 5. scheme Committee Machine with three MLP Neural Networks and voting VI. RESULTS AND DISCUSSION Simulation has shown an outstanding results for proposed model with 99.6% classification success. Following figures present results. Figure 7 shows confusion matrix for test data of third neural network. This network was trained to be an expert for data which first two neural networks within the committee machine could not recognize. the classification success was 99.6% with 0.2% FPR (4 records) and 0.3% FNR (7 records). IRS, and produces one output, which states if the attack exists or not (Figure 5). In order to train and test Committee Machine, we needed to divide test data into three sets, each containing 2300 data records. Initial training set consisting of data records was used to train the first neural network. The network was then tested with first test data set, and all test data records which failed to be classified using first neural network, were fed into the second neural network training set. Second network was then trained and tested, and all failed test data records were fed into third neural network training set. This way of training enables each neural network within committee machine to become expert for different sets of records. The voting scheme was designed to choose the output based on the agreement of at least two neural networks. C. System Update The system update consists of database, used to hold undefined new packets. Once undefined packets are detected, the system update retrains the network offline, and then updates the weights on committee machine. Figure 6 shows the flowchart for System update. Fig. 7. Confusion matrix for third neural network within Committee Machine Figure 8 shows confusion matrix for overall data, which includes training, test and validation data. The results show classification of 99.8%, with 0.1% (23 records) FPR and 0.1% (13 records) FNR. Fig. 6. System Update flowchart Fig. 8. Confusion Matrix for overall data
5 Figure 9 shows receiver operating characteristics (ROC) for each output class, which represent sensitivity against 1- specificity values associated with the observations predicted event probabilities. According to [24], the more ROC curve approaches the left top edge of the plot, the better the classification. From the Figure is clear than after 0.1% of FPR, the classification is almost maximum. Input reduction system is based on PCA, and it reduces the number of inputs from 41 to 13. Intrusion detection system was based on committee machine, which performs attack classification. It consists of three feed-forward multilayer perceptron neural networks with back-propagation learning, and voting scheme that is based on the combination of best outputs. The system update should be done offline once the threshold for recorded unknown packets is reached. Generally, the system update retrains the neural networks for new unknown attacks. The overall system showed the classification of 99.8%, with 0.1% both, false positive and false negative rate, and mean square error of REFERENCES Fig. 9. Receiver Operating Characteristics Last figure (Figure 10) shows the mean squared error (mse) for our classification. It has been shown that the best classification was obtained at epoch 37 with mse. At this point, test and validation data gets the best common minimum. Fig. 10. Mean Squared Error (mse) VII. CONCLUSION In this paper we have proposed a new model for Intrusion Detection System. The model consists of three parts: Input reduction system, intrusion detection system and offline system update. [1] S. Chavan, K. Shah, N. Dave, S. Mukherjee, A. Abraham, and S. Sanyal, Adaptive neuro-fuzzy intrusion detection systems, in Information Technology: Coding and Computing, Proceedings. ITCC International Conference on, vol. 1, 2004, pp Vol.1. [2] P. Kachurka and V. Golovko, Neural network approach to realtime network intrusion detection and recognition, in Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), 2011 IEEE 6th International Conference on, vol. 1, 2011, pp [3] J. Zhao, M. Chen, and Q. Luo, Research of intrusion detection system based on neural networks, in Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, 2011, pp [4] D.-X. Xia, S.-H. Yang, and C.-G. Li, Intrusion detection system based on principal component analysis and grey neural networks, in Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on, vol. 2, 2010, pp [5] M. Muna and M. Mehrotra, Design network intrusion detection system using hybrid fuzzy-neural network, International Journal of Computer Science and Security, vol. 4, no. 3, p , [6] F. Song, Z. Guo, and D. Mei, Feature selection using principal component analysis, in System Science, Engineering Design and Manufacturing Informatization (ICSEM), 2010 International Conference on, vol. 1, 2010, pp [7] D.-K. Kang, D. Fuller, and V. Honavar, Learning classifiers for misuse and anomaly detection using a bag of system calls representation, in Information Assurance Workshop, IAW 05. Proceedings from the Sixth Annual IEEE SMC, 2005, pp [8] G. Wang, J. Hao, J. Ma, and L. Huang, A new approach to intrusion detection using artificial neural networks and fuzzy clustering, Expert Systems with Applications, vol. 37, no. 9, pp , [9] (1999, October) Kdd cup 99 competition. [Online]. Available: [10] C. Zhang, J. Jiang, and M. Kamel, Intrusion detection using hierarchical neural networks, Pattern Recognition Letters, vol. 26, no. 6, pp , [11] U. Ahmed and A. Masood, Host based intrusion detection using rbf neural networks, in Emerging Technologies, ICET International Conference on, 2009, pp [12] S. Lakhina, S. Joseph, and B. Verma, Feature reduction using principal component analysis for effective anomalybased intrusion detection on nsl-kdd, International Journal of Engineering Science and Technology, vol. 2, no. 6, pp , [13] F. Li, Hybrid neural network intrusion detection system using genetic algorithm, in Multimedia Technology (ICMT), 2010 International Conference on, 2010, pp [14] A. N. Toosi and M. Kahani, A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers, Computer Communications, vol. 30, no. 10, pp , [15] S. Mukkamala, G. Janoski, and A. Sung, Intrusion detection using neural networks and support vector machines, in Neural Networks, IJCNN 02. Proceedings of the 2002 International Joint Conference on, vol. 2, 2002, pp
6 [16] K. I. Diamantaras and S. Y. Kung, Principal Component Neural Networks. John Wiley & Sons, New York., [17] I. Jolliffe, Principal Component Analysis. Springer-Verlag, [18] S. Haykin, Neural Networks A Comprehensive Foundation, 2nd ed. Prentice-Hall, Inc. Simon & Schuster, A Viacom Company Upper Saddle River, New Jersey 07458, [19] J. Goldsmith, Unsupervised learning of the morphology of a natural language, Computational Linguistics, vol. 27, no. 2, pp , [20] S. Selman and A. Husagic-Selman, Multilayered feedforward neural networks as a tool for distinction of the authors of texts, in Information, Communication and Automation Technologies (ICAT), 2011 XXIII International Symposium on, 2011, pp [21] R. E. Schapire, The strength of weak learnability, Machine Learning, vol. 5, pp , [22] M. F. Mller, A scaled conjugate gradient algorithm for fast supervised learning, Neural Networks, vol. 6, no. 4, pp , [23] N. J. Nilsson, Learning Machines: Foundations of Trainable Pattern- Classifying Systems. McGraw-Hill, New York, [24] M. H. Beale, M. T. Hagan, and H. B. Demuth, Neural Networks Toolbox. User s Guide, MatLab R2012a. MathWorks Inc., 2012.
Performance Analysis of Network Intrusion Detection System using Back Propagation for Feed Forward Neural Network in MATLAB/SIMULINK
ISSN (e): 2250 3005 Volume, 08 Issue, 5 May 2018 International Journal of Computational Engineering Research (IJCER) Performance Analysis of Network Intrusion Detection System using Back Propagation for
More informationReview on Methods of Selecting Number of Hidden Nodes in Artificial Neural Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationA Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence
2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da
More informationIntrusion Detection System based on Support Vector Machine and BN-KDD Data Set
Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set Razieh Baradaran, Department of information technology, university of Qom, Qom, Iran R.baradaran@stu.qom.ac.ir Mahdieh HajiMohammadHosseini,
More informationIntrusion Detection System Using Hybrid Approach by MLP and K-Means Clustering
Intrusion Detection System Using Hybrid Approach by MLP and K-Means Clustering Archana A. Kadam, Prof. S. P. Medhane M.Tech Student, Bharati Vidyapeeth Deemed University, College of Engineering, Pune,
More informationAn Ensemble Data Mining Approach for Intrusion Detection in a Computer Network
International Journal of Science and Engineering Investigations vol. 6, issue 62, March 2017 ISSN: 2251-8843 An Ensemble Data Mining Approach for Intrusion Detection in a Computer Network Abisola Ayomide
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN
1 Review: Boosting Classifiers For Intrusion Detection Richa Rawat, Anurag Jain ABSTRACT Network and host intrusion detection systems monitor malicious activities and the management station is a technique
More informationHybrid Feature Selection for Modeling Intrusion Detection Systems
Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,
More informationIntrusion Detection System with FGA and MLP Algorithm
Intrusion Detection System with FGA and MLP Algorithm International Journal of Engineering Research & Technology (IJERT) Miss. Madhuri R. Yadav Department Of Computer Engineering Siddhant College Of Engineering,
More informationDynamic Analysis of Structures Using Neural Networks
Dynamic Analysis of Structures Using Neural Networks Alireza Lavaei Academic member, Islamic Azad University, Boroujerd Branch, Iran Alireza Lohrasbi Academic member, Islamic Azad University, Boroujerd
More informationModeling Intrusion Detection Systems With Machine Learning And Selected Attributes
Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes Thaksen J. Parvat USET G.G.S.Indratrastha University Dwarka, New Delhi 78 pthaksen.sit@sinhgad.edu Abstract Intrusion
More informationA Neuro-Fuzzy Classifier for Intrusion Detection Systems
. 11 th International CSI Computer Conference (CSICC 2006), School of Computer Science, IPM, Jan. 24-26, 2006, Tehran, Iran. A Neuro-Fuzzy Classifier for Intrusion Detection Systems Adel Nadjaran Toosi
More informationFACE RECOGNITION USING FUZZY NEURAL NETWORK
FACE RECOGNITION USING FUZZY NEURAL NETWORK TADI.CHANDRASEKHAR Research Scholar, Dept. of ECE, GITAM University, Vishakapatnam, AndraPradesh Assoc. Prof., Dept. of. ECE, GIET Engineering College, Vishakapatnam,
More informationA study on fuzzy intrusion detection
A study on fuzzy intrusion detection J.T. Yao S.L. Zhao L. V. Saxton Department of Computer Science University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: [jtyao,zhao200s,saxton]@cs.uregina.ca
More informationImage Compression: An Artificial Neural Network Approach
Image Compression: An Artificial Neural Network Approach Anjana B 1, Mrs Shreeja R 2 1 Department of Computer Science and Engineering, Calicut University, Kuttippuram 2 Department of Computer Science and
More informationSimulation of Zhang Suen Algorithm using Feed- Forward Neural Networks
Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks Ritika Luthra Research Scholar Chandigarh University Gulshan Goyal Associate Professor Chandigarh University ABSTRACT Image Skeletonization
More informationFlow-based Anomaly Intrusion Detection System Using Neural Network
Flow-based Anomaly Intrusion Detection System Using Neural Network tational power to analyze only the basic characteristics of network flow, so as to Intrusion Detection systems (KBIDES) classify the data
More informationArgha Roy* Dept. of CSE Netaji Subhash Engg. College West Bengal, India.
Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Training Artificial
More informationAn Algorithm For Training Multilayer Perceptron (MLP) For Image Reconstruction Using Neural Network Without Overfitting.
An Algorithm For Training Multilayer Perceptron (MLP) For Image Reconstruction Using Neural Network Without Overfitting. Mohammad Mahmudul Alam Mia, Shovasis Kumar Biswas, Monalisa Chowdhury Urmi, Abubakar
More informationDetermining the Number of Hidden Neurons in a Multi Layer Feed Forward Neural Network
Determining the Number of Hidden Neurons in a Multi Layer Feed Forward Neural Network Lynn Ray University of Maryland University College 3501 University Blvd East Adelphi, MD 20783. USA ABSTRACT: A neural
More informationEfficient Method for Intrusion Detection in Multitenanat Data Center; A Review
Efficient Method for Intrusion Detection in Multitenanat Data Center; A Review S. M. Jawahire Dept. of Computer Engineering J.S.C.O.E.,Hadapsar Pune, India H. A. Hingoliwala Dept. of Computer Engineering
More informationTraffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers
Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers A. Salhi, B. Minaoui, M. Fakir, H. Chakib, H. Grimech Faculty of science and Technology Sultan Moulay Slimane
More informationAn Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data
An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data Nian Zhang and Lara Thompson Department of Electrical and Computer Engineering, University
More informationEnsemble of Soft Computing Techniques for Intrusion Detection. Ensemble of Soft Computing Techniques for Intrusion Detection
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 13 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationComparison of variable learning rate and Levenberg-Marquardt back-propagation training algorithms for detecting attacks in Intrusion Detection Systems
Comparison of variable learning rate and Levenberg-Marquardt back-propagation training algorithms for detecting attacks in Intrusion Detection Systems Tummala Pradeep 1 IV th Year Student, Department of
More informationOptimization Model of K-Means Clustering Using Artificial Neural Networks to Handle Class Imbalance Problem
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Optimization Model of K-Means Clustering Using Artificial Neural Networks to Handle Class Imbalance Problem To cite this article:
More information1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra
Pattern Recall Analysis of the Hopfield Neural Network with a Genetic Algorithm Susmita Mohapatra Department of Computer Science, Utkal University, India Abstract: This paper is focused on the implementation
More informationA *69>H>N6 #DJGC6A DG C<>C::G>C<,8>:C8:H /DA 'D 2:6G, ()-"&"3 -"(' ( +-" " " % '.+ % ' -0(+$,
The structure is a very important aspect in neural network design, it is not only impossible to determine an optimal structure for a given problem, it is even impossible to prove that a given structure
More informationCombination of Three Machine Learning Algorithms for Intrusion Detection Systems in Computer Networks
Vol. () December, pp. 9-8 ISSN95-9X Combination of Three Machine Learning Algorithms for Intrusion Detection Systems in Computer Networks Ali Reza Zebarjad, Mohmmad Mehdi Lotfinejad Dapartment of Computer,
More informationKINEMATIC ANALYSIS OF ADEPT VIPER USING NEURAL NETWORK
Proceedings of the National Conference on Trends and Advances in Mechanical Engineering, YMCA Institute of Engineering, Faridabad, Haryana., Dec 9-10, 2006. KINEMATIC ANALYSIS OF ADEPT VIPER USING NEURAL
More informationCOMBINING NEURAL NETWORKS FOR SKIN DETECTION
COMBINING NEURAL NETWORKS FOR SKIN DETECTION Chelsia Amy Doukim 1, Jamal Ahmad Dargham 1, Ali Chekima 1 and Sigeru Omatu 2 1 School of Engineering and Information Technology, Universiti Malaysia Sabah,
More informationYuki Osada Andrew Cannon
Yuki Osada Andrew Cannon 1 Humans are an intelligent species One feature is the ability to learn The ability to learn comes down to the brain The brain learns from experience Research shows that the brain
More informationCHAPTER VI BACK PROPAGATION ALGORITHM
6.1 Introduction CHAPTER VI BACK PROPAGATION ALGORITHM In the previous chapter, we analysed that multiple layer perceptrons are effectively applied to handle tricky problems if trained with a vastly accepted
More informationA study of Intrusion Detection System for Cloud Network Using FC-ANN Algorithm
A study of Intrusion Detection System for Cloud Network Using FC-ANN Algorithm Gayatri K. Chaturvedi 1, Arjun K. Chaturvedi 2, Varsha R. More 3 (MECOMP-Lecturer) 1, (BEIT-Student) 2, (BEE&TC-Student) 3
More informationResearch Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6)
International Journals of Advanced Research in Computer Science and Software Engineering Research Article June 17 Artificial Neural Network in Classification A Comparison Dr. J. Jegathesh Amalraj * Assistant
More informationReview on Data Mining Techniques for Intrusion Detection System
Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,
More informationClassification and Regression using Linear Networks, Multilayer Perceptrons and Radial Basis Functions
ENEE 739Q SPRING 2002 COURSE ASSIGNMENT 2 REPORT 1 Classification and Regression using Linear Networks, Multilayer Perceptrons and Radial Basis Functions Vikas Chandrakant Raykar Abstract The aim of the
More informationA Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction
A Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction Hanghang Tong 1, Chongrong Li 2, and Jingrui He 1 1 Department of Automation, Tsinghua University, Beijing 100084,
More informationCS6220: DATA MINING TECHNIQUES
CS6220: DATA MINING TECHNIQUES Image Data: Classification via Neural Networks Instructor: Yizhou Sun yzsun@ccs.neu.edu November 19, 2015 Methods to Learn Classification Clustering Frequent Pattern Mining
More informationContents Machine Learning concepts 4 Learning Algorithm 4 Predictive Model (Model) 4 Model, Classification 4 Model, Regression 4 Representation
Contents Machine Learning concepts 4 Learning Algorithm 4 Predictive Model (Model) 4 Model, Classification 4 Model, Regression 4 Representation Learning 4 Supervised Learning 4 Unsupervised Learning 4
More informationIntrusion detection in computer networks through a hybrid approach of data mining and decision trees
WALIA journal 30(S1): 233237, 2014 Available online at www.waliaj.com ISSN 10263861 2014 WALIA Intrusion detection in computer networks through a hybrid approach of data mining and decision trees Tayebeh
More informationNEURAL NETWORK BASED REGRESSION TESTING
NEURAL NETWORK BASED REGRESSION TESTING Esha Khanna Assistant Professor, IT Department, D. A.V Institute of Management, (India) ABSTRACT Regression testing re-executes all the test cases in order to ensure
More informationNeural Networks. CE-725: Statistical Pattern Recognition Sharif University of Technology Spring Soleymani
Neural Networks CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Biological and artificial neural networks Feed-forward neural networks Single layer
More informationKeywords Intrusion Detection System, Artificial Neural Network, Multi-Layer Perceptron. Apriori algorithm
Volume 3, Issue 6, June 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Detecting and Classifying
More informationA Review on Performance Comparison of Artificial Intelligence Techniques Used for Intrusion Detection
A Review on Performance Comparison of Artificial Intelligence Techniques Used for Intrusion Detection Navaneet Kumar Sinha 1, Gulshan Kumar 2 and Krishan Kumar 3 1 Department of Computer Science & Engineering,
More informationLearning Fuzzy Cognitive Maps by a Hybrid Method Using Nonlinear Hebbian Learning and Extended Great Deluge Algorithm
Learning Fuzzy Cognitive Maps by a Hybrid Method Using Nonlinear Hebbian Learning and Extended Great Deluge Algorithm Zhaowei Ren School of Electronic and Computing Systems University of Cincinnati 600
More informationAn Intelligent Technique for Image Compression
An Intelligent Technique for Image Compression Athira Mayadevi Somanathan 1, V. Kalaichelvi 2 1 Dept. Of Electronics and Communications Engineering, BITS Pilani, Dubai, U.A.E. 2 Dept. Of Electronics and
More informationClassifier C-Net. 2D Projected Images of 3D Objects. 2D Projected Images of 3D Objects. Model I. Model II
Advances in Neural Information Processing Systems 7. (99) The MIT Press, Cambridge, MA. pp.949-96 Unsupervised Classication of 3D Objects from D Views Satoshi Suzuki Hiroshi Ando ATR Human Information
More informationData Mining. Neural Networks
Data Mining Neural Networks Goals for this Unit Basic understanding of Neural Networks and how they work Ability to use Neural Networks to solve real problems Understand when neural networks may be most
More informationCLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS
CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of
More informationCluster Based detection of Attack IDS using Data Mining
Cluster Based detection of Attack IDS using Data Mining 1 Manisha Kansra, 2 Pankaj Dev Chadha 1 Research scholar, 2 Assistant Professor, 1 Department of Computer Science Engineering 1 Geeta Institute of
More informationFEATURE SELECTION TECHNIQUES
CHAPTER-2 FEATURE SELECTION TECHNIQUES 2.1. INTRODUCTION Dimensionality reduction through the choice of an appropriate feature subset selection, results in multiple uses including performance upgrading,
More informationPerformance Analysis of Data Mining Classification Techniques
Performance Analysis of Data Mining Classification Techniques Tejas Mehta 1, Dr. Dhaval Kathiriya 2 Ph.D. Student, School of Computer Science, Dr. Babasaheb Ambedkar Open University, Gujarat, India 1 Principal
More informationEE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR
EE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR 1.Introductıon. 2.Multi Layer Perception.. 3.Fuzzy C-Means Clustering.. 4.Real
More informationInternational Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X
Analysis about Classification Techniques on Categorical Data in Data Mining Assistant Professor P. Meena Department of Computer Science Adhiyaman Arts and Science College for Women Uthangarai, Krishnagiri,
More informationAvailable online at ScienceDirect. Procedia Computer Science 89 (2016 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 89 (2016 ) 117 123 Twelfth International Multi-Conference on Information Processing-2016 (IMCIP-2016) Performance Evaluation
More informationApplying Neural Network Architecture for Inverse Kinematics Problem in Robotics
J. Software Engineering & Applications, 2010, 3: 230-239 doi:10.4236/jsea.2010.33028 Published Online March 2010 (http://www.scirp.org/journal/jsea) Applying Neural Network Architecture for Inverse Kinematics
More informationA Neural Network Model Of Insurance Customer Ratings
A Neural Network Model Of Insurance Customer Ratings Jan Jantzen 1 Abstract Given a set of data on customers the engineering problem in this study is to model the data and classify customers
More informationAnomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model
264 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.8, August 2008 Anomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model M. Bahrololum and M. Khaleghi
More informationFinding Dominant Parameters For Fault Diagnosis Of a Single Bearing System Using Back Propagation Neural Network
International Journal of Mechanical & Mechatronics Engineering IJMME-IJENS Vol:13 No:01 40 Finding Dominant Parameters For Fault Diagnosis Of a Single Bearing System Using Back Propagation Neural Network
More information11/14/2010 Intelligent Systems and Soft Computing 1
Lecture 7 Artificial neural networks: Supervised learning Introduction, or how the brain works The neuron as a simple computing element The perceptron Multilayer neural networks Accelerated learning in
More informationIN recent years, neural networks have attracted considerable attention
Multilayer Perceptron: Architecture Optimization and Training Hassan Ramchoun, Mohammed Amine Janati Idrissi, Youssef Ghanou, Mohamed Ettaouil Modeling and Scientific Computing Laboratory, Faculty of Science
More informationAutomatic Modularization of ANNs Using Adaptive Critic Method
Automatic Modularization of ANNs Using Adaptive Critic Method RUDOLF JAKŠA Kyushu Institute of Design 4-9-1 Shiobaru, Minami-ku, Fukuoka, 815-8540 JAPAN Abstract: - We propose automatic modularization
More informationFace Detection Using Radial Basis Function Neural Networks With Fixed Spread Value
Detection Using Radial Basis Function Neural Networks With Fixed Value Khairul Azha A. Aziz Faculty of Electronics and Computer Engineering, Universiti Teknikal Malaysia Melaka, Ayer Keroh, Melaka, Malaysia.
More informationA Data Classification Algorithm of Internet of Things Based on Neural Network
A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To
More informationVisual object classification by sparse convolutional neural networks
Visual object classification by sparse convolutional neural networks Alexander Gepperth 1 1- Ruhr-Universität Bochum - Institute for Neural Dynamics Universitätsstraße 150, 44801 Bochum - Germany Abstract.
More informationNEURAL NETWORK-BASED SEGMENTATION OF TEXTURES USING GABOR FEATURES
NEURAL NETWORK-BASED SEGMENTATION OF TEXTURES USING GABOR FEATURES A. G. Ramakrishnan, S. Kumar Raja, and H. V. Raghu Ram Dept. of Electrical Engg., Indian Institute of Science Bangalore - 560 012, India
More informationApproach Using Genetic Algorithm for Intrusion Detection System
Approach Using Genetic Algorithm for Intrusion Detection System 544 Abhijeet Karve Government College of Engineering, Aurangabad, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra-
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013
Application of Neural Network for Different Learning Parameter in Classification of Local Feature Image Annie anak Joseph, Chong Yung Fook Universiti Malaysia Sarawak, Faculty of Engineering, 94300, Kota
More informationInternational Journal of Electrical and Computer Engineering 4: Application of Neural Network in User Authentication for Smart Home System
Application of Neural Network in User Authentication for Smart Home System A. Joseph, D.B.L. Bong, and D.A.A. Mat Abstract Security has been an important issue and concern in the smart home systems. Smart
More informationDEVELOPMENT OF NEURAL NETWORK TRAINING METHODOLOGY FOR MODELING NONLINEAR SYSTEMS WITH APPLICATION TO THE PREDICTION OF THE REFRACTIVE INDEX
DEVELOPMENT OF NEURAL NETWORK TRAINING METHODOLOGY FOR MODELING NONLINEAR SYSTEMS WITH APPLICATION TO THE PREDICTION OF THE REFRACTIVE INDEX THESIS CHONDRODIMA EVANGELIA Supervisor: Dr. Alex Alexandridis,
More informationResearch on Evaluation Method of Product Style Semantics Based on Neural Network
Research Journal of Applied Sciences, Engineering and Technology 6(23): 4330-4335, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: September 28, 2012 Accepted:
More informationRadial Basis Function Neural Network Classifier
Recognition of Unconstrained Handwritten Numerals by a Radial Basis Function Neural Network Classifier Hwang, Young-Sup and Bang, Sung-Yang Department of Computer Science & Engineering Pohang University
More informationBased on the fusion of neural network algorithm in the application of the anomaly detection
, pp.28-34 http://dx.doi.org/10.14257/astl.2016.134.05 Based on the fusion of neural network algorithm in the application of the anomaly detection Zhu YuanZhong Electrical and Information Engineering Department
More informationComparison Deep Learning Method to Traditional Methods Using for Network Intrusion Detection
2016 8th IEEE International Conference on Communication Softw are and N etw ork s Comparison Deep Learning Method to Traditional Methods Using for Network Intrusion Detection Bo Dong Computing Center of
More informationAn Optimized Genetic Algorithm with Classification Approach used for Intrusion Detection
International Journal of Computer Networks and Communications Security VOL. 3, NO. 1, JANUARY 2015, 6 10 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) An Optimized
More informationMultiple Classifier Fusion With Cuttlefish Algorithm Based Feature Selection
Multiple Fusion With Cuttlefish Algorithm Based Feature Selection K.Jayakumar Department of Communication and Networking k_jeyakumar1979@yahoo.co.in S.Karpagam Department of Computer Science and Engineering,
More informationIdentification of Multisensor Conversion Characteristic Using Neural Networks
Sensors & Transducers 3 by IFSA http://www.sensorsportal.com Identification of Multisensor Conversion Characteristic Using Neural Networks Iryna TURCHENKO and Volodymyr KOCHAN Research Institute of Intelligent
More informationNOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION
NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION * Prof. Dr. Ban Ahmed Mitras ** Ammar Saad Abdul-Jabbar * Dept. of Operation Research & Intelligent Techniques ** Dept. of Mathematics. College
More informationCharacter Recognition Using Convolutional Neural Networks
Character Recognition Using Convolutional Neural Networks David Bouchain Seminar Statistical Learning Theory University of Ulm, Germany Institute for Neural Information Processing Winter 2006/2007 Abstract
More informationGP Ensemble for Distributed Intrusion Detection Systems
GP Ensemble for Distributed Intrusion Detection Systems Gianluigi Folino, Clara Pizzuti and Giandomenico Spezzano ICAR-CNR, Via P.Bucci 41/C, Univ. della Calabria 87036 Rende (CS), Italy {folino,pizzuti,spezzano}@icar.cnr.it
More informationA Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation
A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:
More informationA Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection
A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection S. Revathi Ph.D. Research Scholar PG and Research, Department of Computer Science Government Arts
More informationNonlinear dimensionality reduction of large datasets for data exploration
Data Mining VII: Data, Text and Web Mining and their Business Applications 3 Nonlinear dimensionality reduction of large datasets for data exploration V. Tomenko & V. Popov Wessex Institute of Technology,
More informationProcedia Computer Science
Procedia Computer Science 3 (2011) 584 588 Procedia Computer Science 00 (2010) 000 000 Procedia Computer Science www.elsevier.com/locate/procedia www.elsevier.com/locate/procedia WCIT 2010 Diagnosing internal
More informationA Survey And Comparative Analysis Of Data
A Survey And Comparative Analysis Of Data Mining Techniques For Network Intrusion Detection Systems In Information Security, intrusion detection is the act of detecting actions that attempt to In 11th
More informationIntelligent Risk Identification and Analysis in IT Network Systems
Intelligent Risk Identification and Analysis in IT Network Systems Masoud Mohammadian University of Canberra, Faculty of Information Sciences and Engineering, Canberra, ACT 2616, Australia masoud.mohammadian@canberra.edu.au
More informationSelf-Organizing Maps for Analysis of Expandable Polystyrene Batch Process
International Journal of Computers, Communications & Control Vol. II (2007), No. 2, pp. 143-148 Self-Organizing Maps for Analysis of Expandable Polystyrene Batch Process Mikko Heikkinen, Ville Nurminen,
More informationResearch on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a
International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) Research on Applications of Data Mining in Electronic Commerce Xiuping YANG 1, a 1 Computer Science Department,
More informationDDoS Detection in SDN Switches using Support Vector Machine Classifier
Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) DDoS Detection in SDN Switches using Support Vector Machine Classifier Xue Li1, a *, Dongming Yuan2,b, Hefei
More informationMining Audit Data for Intrusion Detection Systems Using Support Vector Machines and Neural Networks
Journal on Information Sciences and Computing, Vol.1, No.1, December 2007 Mining Audit Data for Intrusion Detection Systems Using Support Vector Machines and Neural Networks 47 Ramamoorthy Subbureddiar,
More informationCursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network
Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Utkarsh Dwivedi 1, Pranjal Rajput 2, Manish Kumar Sharma 3 1UG Scholar, Dept. of CSE, GCET, Greater Noida,
More informationEuropean Journal of Science and Engineering Vol. 1, Issue 1, 2013 ADAPTIVE NEURO-FUZZY INFERENCE SYSTEM IDENTIFICATION OF AN INDUCTION MOTOR
ADAPTIVE NEURO-FUZZY INFERENCE SYSTEM IDENTIFICATION OF AN INDUCTION MOTOR Ahmed A. M. Emam College of Engineering Karrary University SUDAN ahmedimam1965@yahoo.co.in Eisa Bashier M. Tayeb College of Engineering
More informationApplication of the Generic Feature Selection Measure in Detection of Web Attacks
Application of the Generic Feature Selection Measure in Detection of Web Attacks Hai Thanh Nguyen 1, Carmen Torrano-Gimenez 2, Gonzalo Alvarez 2 Slobodan Petrović 1, and Katrin Franke 1 1 Norwegian Information
More informationDETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN
DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN 1 Shipra Diwakar, 2 Dr. R. Kashyup 1 Research Scholar, 2 HOD ECE Rayat Bahara University Ropar, Punjab ABSTRACT Security in Wireless Sensor
More informationA Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks
A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks K.Q. Yan, S.C. Wang, C.W. Liu Abstract Recent advances in Wireless Sensor Networks (WSNs) have made them extremely useful in
More informationAPPLICATIONS OF INTELLIGENT HYBRID SYSTEMS IN MATLAB
APPLICATIONS OF INTELLIGENT HYBRID SYSTEMS IN MATLAB Z. Dideková, S. Kajan Institute of Control and Industrial Informatics, Faculty of Electrical Engineering and Information Technology, Slovak University
More informationLecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations
Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations Prateek Saxena March 3 2008 1 The Problems Today s lecture is on the discussion of the critique on 1998 and 1999 DARPA IDS evaluations conducted
More informationINTELLIGENT transportation systems have a significant
INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 205, VOL. 6, NO. 4, PP. 35 356 Manuscript received October 4, 205; revised November, 205. DOI: 0.55/eletel-205-0046 Efficient Two-Step Approach for Automatic
More informationClassification of Face Images for Gender, Age, Facial Expression, and Identity 1
Proc. Int. Conf. on Artificial Neural Networks (ICANN 05), Warsaw, LNCS 3696, vol. I, pp. 569-574, Springer Verlag 2005 Classification of Face Images for Gender, Age, Facial Expression, and Identity 1
More information