Intrusion Detection System based on Enhanced PLS Feature Extraction with Hybrid classification Method
|
|
- Naomi Wood
- 5 years ago
- Views:
Transcription
1 Intrusion Detection System based on Enhanced PLS Feature Extraction with Hybrid classification Method 1 S.M.Kannathal, 1 PG Scholar Department of Computer Science and Engineering, Avinashilingam Institute for Home Science and Higher Education for Women Coimbatore, Tamil Nadu, India. Abstract -Computer technology and the popularity of internet has been increased, which leads to the attention of network security. Today network security has become a challenging task in order to protect security goals. Intrusion prevention techniques like encoding and authentication alone for not enough and detection techniques are also needed. Intrusion detection, a network security mechanism for monitoring, preventing and resisting intrusions, plays a very important role in 1. INTRODUCTION With the extensive use of Internet the possibilities of exposing sensitive information to attackers increases. Intrusion is a group of activity which try to encompass the privacy, rejection of resources or illegal use of resources in other words, any act that knowingly deviates from the normal behavior is considered as intrusion.intrusion Detection System (IDS) is used for detecting various intrusions in network environment and to prevent information from malicious attackers. Detection is not introduced to replace prevention-based techniques such as authentication and access device as an alternative, it is planned to balance existing security measures and detect actions that bypass the security monitoring and control component of the system. Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, denoted as attempts to attack or to enhance the security mechanisms of a computer or network. A good IDS identifies all possible intrusions and recommends actions to stop the attacks. When an intruder attacks a system, the ideal response of the system is to stop the activity. The design of IDS is based on the architecture that is durable and can survive when there is an outbreak. IDS can be classified into generally as misuse intrusion detection and anomaly intrusion detection systems.misuse detection catches the intrusions in terms of the characteristics of known attacks or system vulnerabilities. Misuse Detection based on known attack actions. Disadvantage cannot detect new or unknown attacks. Anomaly detection detect any action that significantly deviates from the normal ensuring network security. However many IDS are deployed, an efficient system is needed for intrusion detection. This paper uses Single Value Decomposition (SVD) to enhance Partial Least Square (PLS) feature extraction, a hybrid classifier and performance is evaluated using KDD cup 99 dataset. Keywords Feature Extraction, KDD99, Partial Least Square, Single Value Decomposition. behavior Anomaly Detection based on the normal behavior. Anomaly detection is about finding the normal usage patterns from the examination data, though misuse detection is about training and matching the intrusion patterns using the examination data. Data mining techniques are used to build an efficient IDSs. In spite of the assurance of improved detection performance and generalization ability of data mining based IDSs, there are some integral complications in the implementation and deployment of these system. We can group these difficulties into three general categories: accuracy, competence, and usability. Typically, data mining based IDSs (especially anomaly detection systems) have higher false positive rates than traditional hand-crafted signature based methods. This prevents them from being able to process audit data and detect intrusions on-line. Finally, these systems involve large amounts of training data and are significantly more complex than traditional systems. The significant theme of our approach is to apply data mining techniques to intrusion detection. The process of (automatically) extracting models from large stores of data is referred to be Data mining. The current fast development in data mining has made available a wide range of algorithms, drawn from various fields such as pattern recognition, machine learning, and etc. Dimensionality reduction is required to reduce the data. Some of the dimensionality reduction technique are feature extraction, feature selection. In feature selection only the required features are chosen according to the objective function, where as in feature extraction all the feature are used by transforming them. The transformed feature contains 1655
2 all original features in their combination. This paper proposes enhanced Partial Least Square (PLS) method for feature extraction with a hybrid classifierand their performance is evaluated. This paper is ordered as follows: Section 2 discusses about some related work; Section 3 about the dataset description; Section 4 provides the overview of the proposed framework; Section 5 describes the methodology; Section 6 gives experimental result and discussion; and finally Section 7 gives the conclusions. 2. RELATED WORK Gan Xu-Sheng et al [1] recommended a combined algorithm to increase the ability of identifying abnormality intrusions, based on Partial Least Square (PLS) feature extraction and Core Vector Machine (CVM) algorithms. By the feature extraction of PLS algorithmprincipal elements are first extracted from the data to build the feature set. Then the anomaly intrusion detection model for the feature set is built by CVM algorithm in processing large-scale sample data. PLS algorithm has roles such as dimension reduction, de-noising and multicorrelation elimination between independent variables. Wenying Feng et al [2] proposed a machinelearning based data classification algorithm that is applied to network. The basic task is to categorize network actions (in the network log) as normal or abnormal however reducing misclassification. A new algorithm Combining Support Vector with Ant Colony (CSVAC) applied to the intrusion detection problem for generating classifiers with clustering. D. Dasgupta et al [3] proposedan approach that does not depend on structured illustration of the data and uses only positive data to construct a normal profile of the system. It is a general approach which can be applied to various abnormality detection problems. Ming- Xiang He [4] proposed an algorithm with the significance of weighted average of attributes and a null set as initial point, a reduction results from adding the large prominence of attribute from all uncertain attribute sets progressively. If there are many of same importance of attributes, we can select any one when adding the big one from surplus conditional attribute sets. Artificial intelligence technique are used for detecting intrusions suggested by H. Debara, et al, [5]. Explicit knowledge was necessary to build an expert system, which is not available, Artificial intelligence is used as alternate solution for treating problems. S. Mukkamala et al [6] proposed a model in neural networks as a section of an intrusion detection system. A new approach to train support vector machines or neural networks to learn the normal behavior and attack patterns was. In that variations from normal behavior are selected as attacks. It demonstrates that both SVMs and neural networks are capable of making highly precise attack/normal categorizations. Scientists regularly use Partial Least Square (PLS)[7] for grouping and there is considerable proof to recommend that it achieves well in that role. With PLS in this way has experimental support due to the association between PLS and Canonical Correlation Analysis (CCA) and the association in turn, between CCA and Linear Discriminant Analysis (LDA). PLS is to be chosen over PCA while refinement is the goal and dimension reduction is required. This paper applies artificial bee colony for anomaly-based intrusion detection systems. M. Aldwairi [8]proposed a new anomaly based intrusion detection approach based on intelligent foraging behavior of bee swarm. 3. DATA SET DESCRIPTION The KDD99 data set, the most widely used data set in the evaluation of anomaly detection, was selected. This data set was prepared by Lee and Stolfo et al. It was built based on the data produced from the 1998 DARPA Intrusion Detection Evaluation program. The KDD data [11] set consists of nearly 4,9, distinct connection vectors, each of which contains 41 features (34 continuous features and 7 discrete features). Since the data amount of KDD99 data set is too large, we chose the sample data randomly from Kddcup.data_1_percent.gz as the experiment data. The KDD training dataset consist of 1% of original dataset that is approximately 494,2 and is labeled with exact one specific attack type i.e., either normal or an attack. Deviations from normal behavior, everything that is not normal, are considered attacks. [1] Attacks labeled as normal are records with normal behavior. The simulated attack falls in one of the following four categories [9]: 1. Denial of Service Attack (DOS): In this type, the attacker makes some memory resources or computing too busy or too full to handle legitimate request, or deny legitimate user s access. DOS contains many attacks, some of them are: 'neptune', 'back', 'smurf', 'pod', 'land', and 'teardrop'. 2. Users to Root Attack (U2R): In this type, the attacker starts out with right of entry to a normal user account on the system and is able to exploit some vulnerability to obtain root access to the system. U2R contains many attacks some of them are: 'buffer overflow', 'load module', 'rootkit' and 'perl' 3. Remote to Local Attack (R2L): In this type,the attacker sends packets over a network but who does not have an account on machine, exploits some threat 1656
3 to gain local access as a user of that machine. R2L contain the attacks:'warezmaster', 'warezclient', ' multihop', ' ftp_write', 'spy', 'imap', 'guess_passwd' and 'phf' 4. Probing Attack (PROBE): In this type, the attacker try to gather information about network of computers for the apparent purpose of circumventing its security. PROBE contains the attacks: 'portsweep', 'satan', 'nmap', and 'ipsweep'. TCP, UDP, and ICMP are the protocols that are considered in KDD dataset. 4. OVER VIEW OF THE PROPOSED WORK The principle for a better intrusion detection system is to detect new attacks with high accuracy. High false positives and negatives, unable to handle increasing traffic rates, from which Existing system suffers. The proposed work analysis is based on the KDD CUP 99 dataset. Preprocessing is done for eliminating redundant, inconsistent data. After preprocessing dimensionality reduction is done by feature extraction method. Features are transformed by PLS feature extraction to achieve efficiency and further reduced by using Single value decomposition. The transformed features are then classified by a hybrid classifier. 5. METHODOLOGY This paper proposes enhanced PLS feature extraction method for dimensionality reduction. KDD CUP 99 data set has been used for experimental analysis a) ENHANCED PLS USING SINGLE VALUE DECOMPOSITION (SVD) : Partial Least Square feature extraction method reduces the dimensionality of the data, but processing takes greater time since large iterations are involved. In order to avoid to large number iterations Single Value Decomposition technique (SVD) is used as enhancement after PLS feature extraction technology. Single Value Decomposition is done after extracting principal elements from PLS method, the resultant contains three matrix; from that the matrix t is taken which contains all the information of variance. TheSVD theorem states that The SVD equation for an (m n) singular matrix A is: A = USV T (5.1) vectors in this space are thus, also mutually independent, and thus a solution for x may be now calculated. A nxp = U nxn S nxp V T pxp (5.2) where T transpose of a matrix S nxp -singular matrix, U nxn - left orthogonal matrix VTpxp right orthogonal matrix The steps followed in SVD process are: 1. Find AAT which gives the matrix U which is the left orthogonal matrix, such that UUT = I 2. Find ATA which gives the matrix V which is the right orthogonal matrix, such that VVT =I 3. Find the eigenvalues and eigenvectors of U and V. 4. The eigenvectors of ATA make up the columns of V, the eigenvectors of AAT make up the columns of U. Also, the singular values in S are square roots of eigenvalues from AAT or ATA. 5. The singular values are the diagonal entries of the S matrix and are arranged in descending order. 1657
4 Algorithm 1: Partial Least Square Feature Extraction Technique Input: n instances and each has 41 features. Method: 1. Divide independent (p) and dependent (q) features using their correlation dependency value 2. Calculate a linear combination of independent (t1) and dependent features (u1) which contains the independent and dependent column as matrix. for X = i,.n calculate max variance of t1 for Y = j,.n calculate max variance u1 for X = k,.n Y = l n calculate correlation for X = p,.n Y = o n calculate co- variance endfor endfor endfor endfor if m< A Calculate principle element for each feature in X, Y Endif b) CORE VECTOR MACHINE (CVM) WITH PARTICLE SWARM OPTIMIZATION (PSO) The proposed CVM-PSO system for classification, initially aims at optimizing the accuracy of CVM classifier by detecting the subset of best informative features and estimating the best values for regularization of kernel parameters for CVM model. In order to achieve this PSO based optimized framework is used. Particle swarm optimization is used in CVM in order to choose the boundary value which will give accurate results. CVM is used to avoid QP problem in SVM, which is modified as MBE. PSO is used to optimize the radius of the ball forming efficient clustering which will cover all points. The number of iteration specifies the split of dataset and number of particles denote the particles taken for calculation. 1658
5 Enhanced PLS Feature Extraction using SVD with Hybrid classifier 1. INPUT : Dataset with n features 2. OUTPUT: Significant features 3. BEGIN Divide the features as dependent and independent (X, Y) Compute covariance by equation (1). Extract Principal component elements (PCA) based on Eigen vector. Apply Neutralization. Find transpose of the matrix obtained A Find U, V, where U=AA T,V=A T A Find S Specify Number of particles and iterations and apply CVM-PSO Evaluate their performance 4. END 6. EXPERIMENTAL RESULTS DISSCUSSION Four training sets, named PROBE, U2R, R2L, DOS combined with 1% normal data are selected from Kddcup.data_1_percent.gz, are constructed as well as their corresponding four test sets with random samples. The sample data are preprocessed for removing redundancy and inconsistent data. After that enhanced Partial Least Square (PLS) using Single Value Decomposition (SVD) method is used for feature extraction. The number of attributes or features selected after applying enhanced PLS feature extraction using SVD method are illustrated in Table 1. Table 1. Number features present after applying Enhanced PLS SVD feature extraction Data subsets based on category of attacks Features selected in PLS method Features selected in PLS-SVD method DOS+1%normal PROBE+1%normal R2L+1%normal False alarm rate Calculated in percentage 6. Execution rate Calculated in milliseconds CVM_PLS CVM _PLS-SVD CVM-PSO_PLS CVM-PSO_PLS-SVD SVM-PSO_PLS SVM-PSO_PLS-SVD The performance is evaluated with classifiers accordingly, as after feature extraction and before feature extraction. The performance is found to be good in CVM- PSO_PLS-SVD classifier. U2R+1%normal The performance is evaluated with classifiers accordingly, using performance metrics like 1. Accuracy Calculated in percentage 2. Precision Calculated in percentage 3. Recall Calculated in percentage 4. Detection rate Calculated in percentage 1659
6 ACCURACY IN PERCENTAGE International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 6, June ACCURACY Figure 1 Comparison of Accuracy PRECISION IN PERCENTAGE Accuracy of CVM_PSO is for all data sets PLS_SVD found to be better PRECISION Figure 2 Comparison of Precision RECALL IN PERCENTAGE Precision of PLS_SVD CVM and PLS_SVD PLS_SVD-CVM_PSO is found to be higher for Dos+1%normal, +1%normal, for all other datasets except CVM-PLS and PLS_SVDSVM_PSOfound to be better. RECALL Figure 3 Comparison of Recall DETECTION RATE IN PERCENTAGE Recall PLS_SVD-CVM_PSO CVM_PSO is found to be comparatively lesser than other methods for all datasets except U2L+1% normal DETECTION RATE 166
7 Figure 4 Comparison of Detection rate Detection rate of PLS_SVD-CVM_PSO is found to be comparatively higher than other methods for all datasets. FALSE ALARM RATE IN PERCENTAGE FALSE ALARM RATE Figure 5 Comparison of False alarm rate False alarm rate of PLS_SVD-CVM_PSO is found to be comparatively lesser than other methods for all datasets MILLl SECONDS EXECUTION TIME Figure 6 Execution time Execution time after reducing the datasets by SVD method for all datasets and classifiers found to be lesser. 7. CONCLUSION In order to solve the problem of anomaly intrusion detection, a combined intrusion detection algorithm was proposed based on PLS algorithm and hybrid classifiers. PLS algorithm has roles in dimension reduction, de-noising and multi-correlation elimination between independent variables. Performance comparison of data subsets with PLS feature extraction and after applying enhanced PLS (PLS-SVD) method are analyzed. PLS-SVD method reduces data efficiently which leads to higher accuracy while comparing with PLS. Performance comparison is done for datasets with different classifiers SVM-PSO, SVM, CVM and proposed hybrid classifier CVM-PSO.Among them CVM and CVM-PSO are found to be more efficient. CVM-PSO with PS-SVD provides a significant improvement on accuracy, detection rate and execution time compared with other algorithms. 8. REFERENCES 1) Gan Xu-Sheng, et al, Anomaly intrusion detection based on PLS feature extraction and core vector machine, Knowledge-Based Systems, vol. 4, pp.1-6, ) Abraham, C. Grosan, C.M. Vide, Evolutionary design of intrusion detection programs, International Journal of Network Security, vol. 4, pp , March 3, 27. 3) S.X. Wu, W. Banzhaf, The use of computational intelligence in intrusion detection systems: a review, Applied Soft Computing vol. 1, pp. 1 35, January 1,,
8 4) Jiawei Han and Micheline Kamber, Data Mining: Concepts and Techniques, Morgan Kufmann, 3rd edition, ) Ahmed Youssef and Ahmed Emam, Network Intrusion Detection using Data Mining and Network Behaviour Analysis, International Journal of Computer Science & Information Technology (IJCSIT), vol 3, no. 6, Dec ) S.A.Joshi, Varsha S.Pimprale, Network Intrusion Detection System (NIDS) based on Data Mining, International Journal of Engineering Science and Innovative Technology (IJESIT)vol 2,no. 1, January ) Ming-Xiang He, A Intrusion Detection Method Based on Neighborhood Rough Set, TELKOMNIKA, vol. 11 no. 7, pp , ) C. J. Lin, Trust Region Newton Methods for Large- Scale Logistic Regression, Journal of Machine Learning Research vol. 9, pp , 28. 9) M. Barker, W. Rayens, Partial Least Squares for discrimination, Journal of chemo metrics vol. 17, pp , 23. 1) Z. M. Yang et al., Feature Selection Based on Linear Twin Support Vector Machines, Proceeding in Computer Science vol. 17, pp , ) Y. J. Lee et al., Anomaly Detection via Online Oversampling Principal Component Analysis, IEEE transactions on knowledge and data engineering, vol.7 no.25, pp , ) M. Zhu, J. Song, An Embedded Backward Feature Selection Method for MCLP Classification Algorithm, proceeding in computer science, vol. 17, pp , ) Abdolhossein Sarrafzadeh et al., ReliefF Based Feature Selection In Content-Based Image Retrieval, proceedings of the International Multiconference of engineers and Computer Scientists 212, vol I, IMECS 212, March 14-16, 212, Hong Kong. 14) Asha Gowda Karegowda, A.S.Manjunath and M.A.Jayaram, Comparative Study of Attribute Selection using Gain Ratio and Correlation Based Feature Selection, International Journal of Information Technology and Knowledge Management July-December 21, vol. 2, no. 2, pp ) Hiep-Thuan Do, Nguyen-Khang Pham and Thanh-Nghi Do, A Simple, Fast Support Vector Machine Algorithm for Data Mining, Fundamental & Applied IT Research Symposium ) I.W. Tsang et al., Simpler Core Vector Machines with Enclosing Balls, in proceedings of the Twenty-Fourth International conference on machine Learning (ICML), corvilis, Oregon, USA, June ) P. Schere, Using SVM and Clustering Algorithms in IDS Systems, pp , ) M. Aldwairi, Application of artificial bee colony for intrusion detection systems in Security and Communication Networks Wiley Online Library, (212). 19) Wenying Feng et al., Mining network data for intrusion detection through combining SVMs with ant colony networks, Future Generation Computer Systems, pp. 1-14, ) Xuemei Li, Ming Shao, Lixing Ding, Gang Xu, Jibin Li, Particle Swarm Optimization-based LS-SVM for Building Cooling Load Prediction, Journal of Computers, vol 5, no. 4, pp , Apr ) W. Tsang, Core Vector Machines: Fast SVM Training on Very Large Data Sets, Journal of Machine Learning Research vol. 6, pp , ) Rong-En Fan et al., Working Set Selection Using Second Order Information for Training Support Vector Machines, Journal of Machine Learning Vol. 6, pp , ) An Efficient Classification Mechanism Using Machine Learning Techniques For Attack Detection From Large Dataset International Journal of Innovative Research in Science, Engineering and Technology, vol. (1)2, pp , ) YasharMaali and Adel Al-Jumaily, Hierarchical Parallel PSO-SVM Based Subject-Independent Sleep Apnea Classification, Neural Information Processing vol. 7666, pp. 5-57, ) Qinghua He et al.,classification of Electronic Nose Data in Wound Infection Detection Based on PSO-SVM Combined with Wavelet Transfor, Intelligent Automation, Soft Computing vol. 18, no. 7, pp ,
9 SM.Kannathal is a P.G student in the Department of Computer science and engineering, Avinashilingam Institute of Home Science and Higher Education for women, Faculty of Engineering, India. Presented a research paper titled Intrusion Detection Based on Partial Least Square Feature Extraction with Classifiers in the International conference on Communication and Computer Networks of the future COMNET 214 at P.S.G College of Technology, Coimbatore sponsored by Computer Society of India (CSI). 1663
A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence
2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da
More informationIDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach
International Journal of Network Security, Vol.17, No.6, PP.754-770, Nov. 2015 754 IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach Ghazaleh Javadzadeh 1, Reza Azmi 2 (Corresponding
More informationSelecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets
Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets H. Günes Kayacık, A. Nur Zincir-Heywood, Malcolm I. Heywood Dalhousie University, Faculty
More informationCHAPTER V KDD CUP 99 DATASET. With the widespread use of computer networks, the number of attacks has grown
CHAPTER V KDD CUP 99 DATASET With the widespread use of computer networks, the number of attacks has grown extensively, and many new hacking tools and intrusive methods have appeared. Using an intrusion
More informationAnomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model
264 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.8, August 2008 Anomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model M. Bahrololum and M. Khaleghi
More informationIntrusion detection system with decision tree and combine method algorithm
International Academic Institute for Science and Technology International Academic Journal of Science and Engineering Vol. 3, No. 8, 2016, pp. 21-31. ISSN 2454-3896 International Academic Journal of Science
More informationA Rough Set Based Feature Selection on KDD CUP 99 Data Set
Vol.8, No.1 (2015), pp.149-156 http://dx.doi.org/10.14257/ijdta.2015.8.1.16 A Rough Set Based Feature Selection on KDD CUP 99 Data Set Vinod Rampure 1 and Akhilesh Tiwari 2 Department of CSE & IT, Madhav
More informationFast Feature Reduction in Intrusion Detection Datasets
MIPRO 2012, May 21-25,2012, Opatija, Croatia Fast Feature Reduction in Intrusion Detection Datasets Shafigh Parsazad *, Ehsan Saboori **, Amin Allahyar * * Department Of Computer Engineering, Ferdowsi
More informationINTRUSION DETECTION MODEL IN DATA MINING BASED ON ENSEMBLE APPROACH
INTRUSION DETECTION MODEL IN DATA MINING BASED ON ENSEMBLE APPROACH VIKAS SANNADY 1, POONAM GUPTA 2 1Asst.Professor, Department of Computer Science, GTBCPTE, Bilaspur, chhattisgarh, India 2Asst.Professor,
More informationIntrusion Detection Based On Clustering Algorithm
International Journal of Electronics and Computer Science Engineering 1059 Available Online at www.ijecse.org ISSN- 2277-1956 Intrusion Detection Based On Clustering Algorithm Nadya El MOUSSAID 1, Ahmed
More informationKeywords Intrusion Detection System, Artificial Neural Network, Multi-Layer Perceptron. Apriori algorithm
Volume 3, Issue 6, June 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Detecting and Classifying
More informationCombination of Three Machine Learning Algorithms for Intrusion Detection Systems in Computer Networks
Vol. () December, pp. 9-8 ISSN95-9X Combination of Three Machine Learning Algorithms for Intrusion Detection Systems in Computer Networks Ali Reza Zebarjad, Mohmmad Mehdi Lotfinejad Dapartment of Computer,
More informationIntrusion Detection System based on Support Vector Machine and BN-KDD Data Set
Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set Razieh Baradaran, Department of information technology, university of Qom, Qom, Iran R.baradaran@stu.qom.ac.ir Mahdieh HajiMohammadHosseini,
More informationINTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) PROPOSED HYBRID-MULTISTAGES NIDS TECHNIQUES
INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 ISSN 0976 6464(Print)
More informationReview on Data Mining Techniques for Intrusion Detection System
Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,
More informationINTRUSION DETECTION WITH TREE-BASED DATA MINING CLASSIFICATION TECHNIQUES BY USING KDD DATASET
INTRUSION DETECTION WITH TREE-BASED DATA MINING CLASSIFICATION TECHNIQUES BY USING KDD DATASET Bilal Ahmad Department of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics,
More informationTwo Level Anomaly Detection Classifier
Two Level Anomaly Detection Classifier Azeem Khan Dublin City University School of Computing Dublin, Ireland raeeska2@computing.dcu.ie Shehroz Khan Department of Information Technology National University
More informationAn Ensemble Data Mining Approach for Intrusion Detection in a Computer Network
International Journal of Science and Engineering Investigations vol. 6, issue 62, March 2017 ISSN: 2251-8843 An Ensemble Data Mining Approach for Intrusion Detection in a Computer Network Abisola Ayomide
More informationComparison of variable learning rate and Levenberg-Marquardt back-propagation training algorithms for detecting attacks in Intrusion Detection Systems
Comparison of variable learning rate and Levenberg-Marquardt back-propagation training algorithms for detecting attacks in Intrusion Detection Systems Tummala Pradeep 1 IV th Year Student, Department of
More informationHybrid Feature Selection for Modeling Intrusion Detection Systems
Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,
More informationAnalysis of neural networks usage for detection of a new attack in IDS
Annales UMCS Informatica AI X, 1 (2010) 51-59 DOI: 10.2478/v10065-010-0035-7 Analysis of neural networks usage for detection of a new attack in IDS Przemysław Kukiełka 1, Zbigniew Kotulski 2 1 Institute
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN
1 Review: Boosting Classifiers For Intrusion Detection Richa Rawat, Anurag Jain ABSTRACT Network and host intrusion detection systems monitor malicious activities and the management station is a technique
More informationFlow-based Anomaly Intrusion Detection System Using Neural Network
Flow-based Anomaly Intrusion Detection System Using Neural Network tational power to analyze only the basic characteristics of network flow, so as to Intrusion Detection systems (KBIDES) classify the data
More informationIntrusion Detection Using Data Mining Technique (Classification)
Intrusion Detection Using Data Mining Technique (Classification) Dr.D.Aruna Kumari Phd 1 N.Tejeswani 2 G.Sravani 3 R.Phani Krishna 4 1 Associative professor, K L University,Guntur(dt), 2 B.Tech(1V/1V),ECM,
More informationEnhanced Multivariate Correlation Analysis (MCA) Based Denialof-Service
International Journal of Computer Science & Mechatronics A peer reviewed International Journal Article Available online www.ijcsm.in smsamspublications.com Vol.1.Issue 2. 2015 Enhanced Multivariate Correlation
More informationComparative Analysis of Classification Algorithms on KDD 99 Data Set
I. J. Computer Network and Information Security, 2016, 9, 34-40 Published Online September 2016 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2016.09.05 Comparative Analysis of Classification
More informationApproach Using Genetic Algorithm for Intrusion Detection System
Approach Using Genetic Algorithm for Intrusion Detection System 544 Abhijeet Karve Government College of Engineering, Aurangabad, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra-
More informationDetection of Network Intrusions with PCA and Probabilistic SOM
Detection of Network Intrusions with PCA and Probabilistic SOM Palakollu Srinivasarao M.Tech, Computer Networks and Information Security, MVGR College Of Engineering, AP, INDIA ---------------------------------------------------------------------***---------------------------------------------------------------------
More informationINTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM Project Trainee Muduy Shilpa B.Tech Pre-final year Electrical Engineering IIT Kharagpur, Kharagpur Supervised By: Dr.V.Radha Assistant Professor, IDRBT-Hyderabad Guided By: Mr.
More informationAn Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data
An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data Nian Zhang and Lara Thompson Department of Electrical and Computer Engineering, University
More informationUnsupervised clustering approach for network anomaly detection
Unsupervised clustering approach for network anomaly detection Iwan Syarif 1,2, Adam Prugel-Bennett 1, Gary Wills 1 1 School of Electronics and Computer Science, University of Southampton, UK {is1e08,apb,gbw}@ecs.soton.ac.uk
More informationModeling Intrusion Detection Systems With Machine Learning And Selected Attributes
Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes Thaksen J. Parvat USET G.G.S.Indratrastha University Dwarka, New Delhi 78 pthaksen.sit@sinhgad.edu Abstract Intrusion
More informationA study on fuzzy intrusion detection
A study on fuzzy intrusion detection J.T. Yao S.L. Zhao L. V. Saxton Department of Computer Science University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: [jtyao,zhao200s,saxton]@cs.uregina.ca
More informationRUSMA MULYADI. Advisor: Dr. Daniel Zeng
Evaluating Classification Algorithms for Intrusion Detection Systems RUSMA MULYADI Advisor: Dr. Daniel Zeng A Master Project Report Submitted to the Department of Management Information Systems In Partial
More informationIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm Syam Akhil Repalle 1, Venkata Ratnam Kolluru 2 1 Student, Department of Electronics and Communication Engineering, Koneru Lakshmaiah Educational
More informationMultiple Classifier Fusion With Cuttlefish Algorithm Based Feature Selection
Multiple Fusion With Cuttlefish Algorithm Based Feature Selection K.Jayakumar Department of Communication and Networking k_jeyakumar1979@yahoo.co.in S.Karpagam Department of Computer Science and Engineering,
More informationA Neuro-Fuzzy Classifier for Intrusion Detection Systems
. 11 th International CSI Computer Conference (CSICC 2006), School of Computer Science, IPM, Jan. 24-26, 2006, Tehran, Iran. A Neuro-Fuzzy Classifier for Intrusion Detection Systems Adel Nadjaran Toosi
More informationUsing Artificial Anomalies to Detect Unknown and Known Network Intrusions
Using Artificial Anomalies to Detect Unknown and Known Network Intrusions Wei Fan IBM T.J.Watson Research Hawthorne, NY 1532 weifan@us.ibm.com Wenke Lee College of Computing, Georgia Tech Atlanta, GA 3332
More informationStudy of Machine Learning Based Intrusion Detection System
ISSN 2395-1621 Study of Machine Learning Based Intrusion Detection System #1 Prashant Wakhare, #2 Dr S.T.Singh 1 Prashant_mitr@rediffmail.com 2 stsingh47@gmail.com Computer Engineering, Savitribai Phule
More informationRobust Lossless Image Watermarking in Integer Wavelet Domain using SVD
Robust Lossless Image Watermarking in Integer Domain using SVD 1 A. Kala 1 PG scholar, Department of CSE, Sri Venkateswara College of Engineering, Chennai 1 akala@svce.ac.in 2 K. haiyalnayaki 2 Associate
More informationFeature Selection. CE-725: Statistical Pattern Recognition Sharif University of Technology Spring Soleymani
Feature Selection CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Dimensionality reduction Feature selection vs. feature extraction Filter univariate
More informationRanking and Filtering the Selected Attributes for Intrusion Detection System
Ranking and Filtering the Selected Attributes for Intrusion Detection System Phyu Thi Htun and Kyaw Thet Khaing Abstract Many researchers have been focused on improving the performance, especially in accuracy
More informationANOMALY DETECTION IN COMMUNICTION NETWORKS
Anomaly Detection Summer School Lecture 2014 ANOMALY DETECTION IN COMMUNICTION NETWORKS Prof. D.J.Parish and Francisco Aparicio-Navarro Loughborough University (School of Electronic, Electrical and Systems
More informationIntrusion Detection System with FGA and MLP Algorithm
Intrusion Detection System with FGA and MLP Algorithm International Journal of Engineering Research & Technology (IJERT) Miss. Madhuri R. Yadav Department Of Computer Engineering Siddhant College Of Engineering,
More informationA study of Intrusion Detection System for Cloud Network Using FC-ANN Algorithm
A study of Intrusion Detection System for Cloud Network Using FC-ANN Algorithm Gayatri K. Chaturvedi 1, Arjun K. Chaturvedi 2, Varsha R. More 3 (MECOMP-Lecturer) 1, (BEIT-Student) 2, (BEE&TC-Student) 3
More informationAN IMPROVED HYBRIDIZED K- MEANS CLUSTERING ALGORITHM (IHKMCA) FOR HIGHDIMENSIONAL DATASET & IT S PERFORMANCE ANALYSIS
AN IMPROVED HYBRIDIZED K- MEANS CLUSTERING ALGORITHM (IHKMCA) FOR HIGHDIMENSIONAL DATASET & IT S PERFORMANCE ANALYSIS H.S Behera Department of Computer Science and Engineering, Veer Surendra Sai University
More informationImportant Roles Of Data Mining Techniques For Anomaly Intrusion Detection System
Important Roles Of Data Mining Techniques For Anomaly Intrusion Detection System Phyu Thi Htun and Kyaw Thet Khaing Abstract Today, there are so many information interchanges are performed in that internet
More informationA Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection
A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection S. Revathi Ph.D. Research Scholar PG and Research, Department of Computer Science Government Arts
More informationAn Optimized Genetic Algorithm with Classification Approach used for Intrusion Detection
International Journal of Computer Networks and Communications Security VOL. 3, NO. 1, JANUARY 2015, 6 10 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) An Optimized
More informationCyber Attack Detection and Classification Using Parallel Support Vector Machine
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 4, Number 2 (2012), pp. 51-58 International Research Publication House http://www.irphouse.com Cyber Attack Detection and
More informationA Feature Selection Method to Handle Imbalanced Data in Text Classification
A Feature Selection Method to Handle Imbalanced Data in Text Classification Fengxiang Chang 1*, Jun Guo 1, Weiran Xu 1, Kejun Yao 2 1 School of Information and Communication Engineering Beijing University
More informationAn advanced data leakage detection system analyzing relations between data leak activity
An advanced data leakage detection system analyzing relations between data leak activity Min-Ji Seo 1 Ph. D. Student, Software Convergence Department, Soongsil University, Seoul, 156-743, Korea. 1 Orcid
More informationA Survey on Intrusion Detection Using Outlier Detection Techniques
A Survey on Intrusion Detection Using Detection Techniques V. Gunamani, M. Abarna Abstract- In a network unauthorised access to a computer is more prevalent that involves a choice of malicious activities.
More informationFEATURE SELECTION TECHNIQUES
CHAPTER-2 FEATURE SELECTION TECHNIQUES 2.1. INTRODUCTION Dimensionality reduction through the choice of an appropriate feature subset selection, results in multiple uses including performance upgrading,
More informationData Mining Approaches for Network Intrusion Detection: from Dimensionality Reduction to Misuse and Anomaly Detection
Data Mining Approaches for Network Intrusion Detection: from Dimensionality Reduction to Misuse and Anomaly Detection Iwan Syarif 1,2, Adam Prugel-Bennett 1, Gary Wills 1 1 School of Electronics and Computer
More informationDimension Reduction CS534
Dimension Reduction CS534 Why dimension reduction? High dimensionality large number of features E.g., documents represented by thousands of words, millions of bigrams Images represented by thousands of
More informationIteration Reduction K Means Clustering Algorithm
Iteration Reduction K Means Clustering Algorithm Kedar Sawant 1 and Snehal Bhogan 2 1 Department of Computer Engineering, Agnel Institute of Technology and Design, Assagao, Goa 403507, India 2 Department
More informationDetermining the Number of Hidden Neurons in a Multi Layer Feed Forward Neural Network
Determining the Number of Hidden Neurons in a Multi Layer Feed Forward Neural Network Lynn Ray University of Maryland University College 3501 University Blvd East Adelphi, MD 20783. USA ABSTRACT: A neural
More informationCHAPTER 4 DATA PREPROCESSING AND FEATURE SELECTION
55 CHAPTER 4 DATA PREPROCESSING AND FEATURE SELECTION In this work, an intelligent approach for building an efficient NIDS which involves data preprocessing, feature extraction and classification has been
More informationCHAPTER 2 DARPA KDDCUP99 DATASET
44 CHAPTER 2 DARPA KDDCUP99 DATASET 2.1 THE DARPA INTRUSION-DETECTION EVALUATION PROGRAM The number of intrusions is to be found in any computer and network audit data are plentiful as well as ever-changing.
More informationSPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION
SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION D. AMBIKA *, Research Scholar, Department of Computer Science, Avinashilingam Institute
More informationHybrid Network Intrusion Detection for DoS Attacks
I J C T A, 9(26) 2016, pp. 15-22 International Science Press Hybrid Network Intrusion Detection for DoS Attacks K. Pradeep Mohan Kumar 1 and M. Aramuthan 2 ABSTRACT The growing use of computer networks,
More informationmanufacturing process.
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 203-207 203 Open Access Identifying Method for Key Quality Characteristics in Series-Parallel
More informationFisher Score Dimensionality Reduction for Svm Classification Arunasakthi. K, KamatchiPriya.L, Askerunisa.A
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationMining Audit Data for Intrusion Detection Systems Using Support Vector Machines and Neural Networks
Journal on Information Sciences and Computing, Vol.1, No.1, December 2007 Mining Audit Data for Intrusion Detection Systems Using Support Vector Machines and Neural Networks 47 Ramamoorthy Subbureddiar,
More informationBayesian Learning Networks Approach to Cybercrime Detection
Bayesian Learning Networks Approach to Cybercrime Detection N S ABOUZAKHAR, A GANI and G MANSON The Centre for Mobile Communications Research (C4MCR), University of Sheffield, Sheffield Regent Court, 211
More informationImproved Detection of Low-Profile Probes and Denial-of-Service Attacks*
Improved Detection of Low-Profile Probes and Denial-of-Service Attacks* William W. Streilein Rob K. Cunningham, Seth E. Webster Workshop on Statistical and Machine Learning Techniques in Computer Intrusion
More informationClassification Of Attacks In Network Intrusion Detection System
International Journal of Scientific & Engineering Research Volume 4, Issue 2, February-2013 1 Classification Of Attacks In Network Intrusion Detection System 1 Shwetambari Ramesh Patil, 2 Dr.Pradeep Deshmukh,
More informationFeature Selection Using Modified-MCA Based Scoring Metric for Classification
2011 International Conference on Information Communication and Management IPCSIT vol.16 (2011) (2011) IACSIT Press, Singapore Feature Selection Using Modified-MCA Based Scoring Metric for Classification
More informationDDoS Attack Detection Using Moment in Statistics with Discriminant Analysis
DDoS Attack Detection Using Moment in Statistics with Discriminant Analysis Pradit Pitaksathienkul 1 and Pongpisit Wuttidittachotti 2 King Mongkut s University of Technology North Bangkok, Thailand 1 praditp9@gmail.com
More informationANOMALY-BASED INTRUSION DETECTION THROUGH K- MEANS CLUSTERING AND NAIVES BAYES CLASSIFICATION
ANOMALY-BASED INTRUSION DETECTION THROUGH K- MEANS CLUSTERING AND NAIVES BAYES CLASSIFICATION Warusia Yassin, Nur Izura Udzir 1, Zaiton Muda, and Md. Nasir Sulaiman 1 Faculty of Computer Science and Information
More informationMahalanobis Distance Map Approach for Anomaly Detection
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2010 Mahalanobis Distance Map Approach for Anomaly Detection Aruna Jamdagnil
More informationFeature Selection in the Corrected KDD -dataset
Feature Selection in the Corrected KDD -dataset ZARGARI, Shahrzad Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/17048/ This document is the author deposited
More informationNetwork Intrusion Detection Using Fast k-nearest Neighbor Classifier
Network Intrusion Detection Using Fast k-nearest Neighbor Classifier K. Swathi 1, D. Sree Lakshmi 2 1,2 Asst. Professor, Prasad V. Potluri Siddhartha Institute of Technology, Vijayawada Abstract: Fast
More informationNetwork Traffic Measurements and Analysis
DEIB - Politecnico di Milano Fall, 2017 Introduction Often, we have only a set of features x = x 1, x 2,, x n, but no associated response y. Therefore we are not interested in prediction nor classification,
More informationModel Redundancy vs. Intrusion Detection
Model Redundancy vs. Intrusion Detection Zhuowei Li, Amitabha Das, and Sabu Emmanuel School of Computer Engineering, Nanyang Technological University, 50, Nanyang Avenue, Singapore 639798 zhwei.li@pmail.ntu.edu.sg
More information2. INTRUDER DETECTION SYSTEMS
1. INTRODUCTION It is apparent that information technology is the backbone of many organizations, small or big. Since they depend on information technology to drive their business forward, issues regarding
More informationUNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK
UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK Dr G.Charles Babu Professor MRE College Secunderabad, India. charlesbabu26@gmail.com N.Chennakesavulu Assoc.Professor Wesley PG
More informationA Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and Forensics
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and Forensics Abhishek choudhary 1, Swati Sharma 2, Pooja
More informationAnomaly Detection on Data Streams with High Dimensional Data Environment
Anomaly Detection on Data Streams with High Dimensional Data Environment Mr. D. Gokul Prasath 1, Dr. R. Sivaraj, M.E, Ph.D., 2 Department of CSE, Velalar College of Engineering & Technology, Erode 1 Assistant
More informationKEYWORDS: Clustering, RFPCM Algorithm, Ranking Method, Query Redirection Method.
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY IMPROVED ROUGH FUZZY POSSIBILISTIC C-MEANS (RFPCM) CLUSTERING ALGORITHM FOR MARKET DATA T.Buvana*, Dr.P.krishnakumari *Research
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 4, Issue 7, January 2015
Intrusion Detection System using Bayesian Approach S. Saravanan, Dr. R M. Chandrasekaran Department of Computer Science & Engineering, Annamalai University Annamalainagar 608 00, Tamil Nadu, India. Abstract
More informationPATTERN RECOGNITION USING NEURAL NETWORKS
PATTERN RECOGNITION USING NEURAL NETWORKS Santaji Ghorpade 1, Jayshree Ghorpade 2 and Shamla Mantri 3 1 Department of Information Technology Engineering, Pune University, India santaji_11jan@yahoo.co.in,
More informationKeywords: Intrusion Detection System, k-nearest neighbor, Support Vector Machine, Primal Dual, Particle Swarm Optimization
University of Maiduguri Faculty of Engineering Seminar Series Volume 8, march 2017 A Hybridized SVM-kNN-pdAPSO Approach to Intrusion Detection System E.G. Dada Department of Computer Engineering, Faculty
More informationLinear Discriminant Analysis in Ottoman Alphabet Character Recognition
Linear Discriminant Analysis in Ottoman Alphabet Character Recognition ZEYNEB KURT, H. IREM TURKMEN, M. ELIF KARSLIGIL Department of Computer Engineering, Yildiz Technical University, 34349 Besiktas /
More informationA Study on Different Challenges in Facial Recognition Methods
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521
More informationAn Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm
I. J. Communications, Network and System Sciences, 2008, 4, 285-385 Published Online November 2008 in SciRes (http://www.scirp.org/journal/ijcns/). An Active Rule Approach for Network Intrusion Detection
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based
More informationAnomaly Detection in Communication Networks
Anomaly Detection in Communication Networks Prof. D. J. Parish High Speed networks Group Department of Electronic and Electrical Engineering D.J.Parish@lboro.ac.uk Loughborough University Overview u u
More informationEnsemble of Soft Computing Techniques for Intrusion Detection. Ensemble of Soft Computing Techniques for Intrusion Detection
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 13 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationClassification of Attacks in Data Mining
Classification of Attacks in Data Mining Bhavneet Kaur Department of Computer Science and Engineering GTBIT, New Delhi, Delhi, India Abstract- Intrusion Detection and data mining are the major part of
More informationINTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK
INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK Abinesh Kamal K. U. and Shiju Sathyadevan Amrita Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa
More informationAnalysis of Feature Selection Techniques: A Data Mining Approach
Analysis of Feature Selection Techniques: A Data Mining Approach Sheena M.Tech Scholar CSE, SBSSTC Krishan Kumar Associate Professor CSE, SBSSTC Gulshan Kumar Assistant Professor MCA, SBSSTC ABSTRACT Feature
More informationInternational Journal of Advancements in Research & Technology, Volume 2, Issue 8, August ISSN
International Journal of Advancements in Research & Technology, Volume 2, Issue 8, August-2013 244 Image Compression using Singular Value Decomposition Miss Samruddhi Kahu Ms. Reena Rahate Associate Engineer
More informationWrapper Feature Selection using Discrete Cuckoo Optimization Algorithm Abstract S.J. Mousavirad and H. Ebrahimpour-Komleh* 1 Department of Computer and Electrical Engineering, University of Kashan, Kashan,
More informationFeature selection using closeness to centers for network intrusion detection
Feature selection using closeness to centers for network intrusion detection 1 S. Sethuramalingam, 2 Dr. E.R. Naganathan 1 Department of Computer Science, Aditanar College, Tiruchur, India 2 Department
More informationThe Curse of Dimensionality
The Curse of Dimensionality ACAS 2002 p1/66 Curse of Dimensionality The basic idea of the curse of dimensionality is that high dimensional data is difficult to work with for several reasons: Adding more
More informationDetecting Harmful Hand Behaviors with Machine Learning from Wearable Motion Sensor Data
Detecting Harmful Hand Behaviors with Machine Learning from Wearable Motion Sensor Data Lingfeng Zhang and Philip K. Chan Florida Institute of Technology, Melbourne, FL 32901 lingfeng2013@my.fit.edu, pkc@cs.fit.edu
More informationNetwork attack analysis via k-means clustering
Network attack analysis via k-means clustering - By Team Cinderella Chandni Pakalapati cp6023@rit.edu Priyanka Samanta ps7723@rit.edu Dept. of Computer Science CONTENTS Recap of project overview Analysis
More informationAnalysis of TCP Segment Header Based Attack Using Proposed Model
Chapter 4 Analysis of TCP Segment Header Based Attack Using Proposed Model 4.0 Introduction Though TCP has been extensively used for the wired network but is being used for mobile Adhoc network in the
More information