SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 04, Volume 3 (April 2016) www.ijirae.com
______________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -96
Artificial Neural Content Techniques for Enhanced Intrusion
Detection and Prevention System
K.Karthikeyan 1
, Dr.R.Mala 2
1
Research Scholar, Marudupandiyar College, Vallam, Thanjavur
2
Assistant Professor, Department of Computer Science, Marudupandiyar College, Vallam, Thanjavur
Abstract- This paper presents a novel approach for detecting network intrusions based on a competitive training neural
network. In the paper, the performance of this approach is compared to that of the self-organizing map (SOM), which is a
popular unsupervised training algorithm used in intrusion detection. While obtaining a similarly accurate detection rate as
the SOM does, the proposed approach uses only one forth of the computation times of the SOM. Furthermore, the
clustering result of this method is independent of the number of the initial neurons. This approach also exhibits the ability
to detect the known and unknown network attacks. The experimental results obtained by applying this approach to the
KDD-99 data set demonstrate that the proposed approach performs exceptionally in terms of both accuracy and
computation time.
Keywords--Network Security, Network Intrusion Detection, Data Mining, Artificial Neural Network, Competitive Learning
1. INTRODUCTION
Intrusion detection is a critical process in network security. Traditional methods of network intrusion detection are based on the
saved patterns of known attacks. They detect intrusion by comparing the network connection features to the attack patterns that
are provided by human experts. The main drawback of the traditional methods is that they cannot detect unknown intrusions.
Even if a new pattern of the attacks were discovered, this new pattern would have to be manually updated into the system. On
the other hand, as the speed and complexity of networks develop rapidly, especially when these networks are open to the
public Web, the number and types of the intrusions increase dramatically. Human analysis becomes insufficient. This leads to
the interest in using data mining techniques in network intrusion detection [3, 11].
Data mining-based intrusion detection techniques canbe categorized into misuse detection and anomaly detection [11]. The
misuse detection techniques build the patterns of the attacks by learning from the labelled data. The main drawback of the
misuse detection techniques is that they cannot detect new attacks that have never occurred in the training data. On the other
hand, the anomaly detection techniques establish normal usage patterns. They can detect the unseen intrusions by investigating
their deviation from the normal patterns. The artificial neural networks provide a number of advantages in the detection of
network intrusions [2]. The application of the neural network techniques has been considered for both the misuse detection
model and the anomaly detection model [10, 15]. As an unsupervised neural network, the SOM has beenapplied in anomaly
detection. It implicitly prepares itself todetect any aberrant network activity by learning to characterizethe normal behaviours
[15]. However, the SOM has asignificant shortage: the number of neurons affects the network’sperformance. Increasing the
number of output nodeswill increase the resolution of the map, but the computationtime will dramatically increase. In this
paper, we propose anefficient clustering algorithm based on the competitive neuralnetworks. This approach obtains accuracy
similar to thatof the self-organizing map while costing much less computation time. The rest of the paper is organized as
follows. In the nextsection, we briefly review the background of the applicationof artificial neural networks to network
intrusion detection.Section 4 discusses the self-organizing maps and the proposed approach. In Session 5, experiments reveal
the speed and accuracy of the proposed approach compared to the SOM. Finally, Section 6 gives a summary and concludes the
current study.
Figure 1. Network intrusion detection using labelled data
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 04, Volume 3 (April 2016) www.ijirae.com
______________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -97
2. RELATED WORKS
An increasing amount of research has been conducted on the application of neural networks for detecting network intrusions.
The artificial neural networks have the potential to resolve a number of problems encountered by the other current approaches
in intrusion detection. The neural networks gain experience by training the system to correctly identify the preselected
examples of the problem. A Multilayer Perceptron (MLP) was used in [5] foranomaly detection. The proposed model is a
single hiddenlayer neural network. The performance of this model tested on the DARPA 1998 data set was a correct detection
rate of 77% with 2.2% false alarms.
The MLP was also applied in [12]. Generic keywords wereselected to detect the attack preparations and actions after the break-
in. The back-propagation algorithm was used inthe learning phase to adapt the weights of the neural network. This approach
obtained a detection rate of 80%when it was tested on the DARPA 1998 data set. A hybrid model of the SOM and the MLP
was proposedin [2]. In that work, the self-organizing map was combinedwith the feed-forward neural network. This model
wasdesignedto detect the dispersing and possibly collaborative attacks. The SOM was also applied to perform the clusteringof
network traffic and to detect attacks in [6, 14]. In [6],SOM was used to map the network connections onto 2-dimensional
surfaces, which were displayed to the networkadministrator. The intrusions were easily detected in thisview. However, the
approach needs a visual interpretation by the network administrator. The SOM is trained by using the normal network traffic in
[14]. The trained SOM reflects the distribution of the normal network connections. If the minimum distance between a network
connection and the neurons of the trained SOM is more than a pre-set threshold, this connection is classified as an intrusion. In
addition, artificial neural networks have also been proposed in the detection of the computer viruses. A self-organizing map
was selected in [4] for intrusion detection. In that work, the self-organizing map was designed to learn the characteristics of
normal activities. The variations from normal activities provided an indication of a virus.
3. THE DETECTION PROCESS
The data source can be labelled or unlabelled based on the learning algorithm used in the data mining-based intrusion
detections. Unsupervised algorithms can be applied to unlabelled data while supervised algorithms can only use labelled data.
In supervised learning, the training data must be labelled before they are presented to the training algorithm. Figure1 shows the
intrusion detection process using supervised learning algorithm. First, the original data must be analyzed and labelled as
normal connections or attacks by human experts. After that, the learning algorithms generalize the rules from the training data.
Finally, The classifier uses the generated rules to classify the new network connections. A difficulty of the supervised learning
is labelling the data. If a large data set is used for training, the labelling duty could be very hard. If choosing a small portion as
the training data, the selection of the training examples is crucial to the learning result.
Unlike supervised learning algorithms, which can only use labelled data, unsupervised learning algorithms have the ability to
learn from unlabelled data. The algorithm we pro pose in this paper is a clustering method, a typical unsupervised learning
algorithm. This approach can be applied on not only labelled data but also unlabelled data. The detection process using the
unlabelled data is illustrated in Figure 2. First, the training data are clustered by the clustering algorithm. Second, the clustered
weight vectors can be labelled by a labelling process. Various methods can be applied to this process. One approach to label a
cluster center is to select a sample group of the data from this cluster randomly and label this cluster with the major type of the
sample. Finally, the labelled weight vectors can be used to classify the network connections.
Figure 2. Network intrusion detection using unlabelled data
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 04, Volume 3 (April 2016) www.ijirae.com
______________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -98
(a) Initial weight vectors
(b) Clustering result
Figure 3. The principle of SCLN
The main difference between the two processes discussed above is the time and the number of examples for labelling. Unlike
the first process, in which the data must be labelled before training, the second process has the ability to organize the
unlabelled data and to provide the cluster centers for labelling. Therefore, the second process reduces the risk of selecting
improper data as the training set.
4. METHODOLOGY
This section discusses our improved competitive neural network approach for detecting network intrusions. We derive the new
approach from the Standard Competitive Learning Network (SCLN). After that, a brief review of the SOM is given since the
new approach will be compared with the SOM.
4.1. THE IMPROVED COMPETITIVE LEARNING NETWORK
The improved competitive learning network (ICLN) isbased on the SCLN. The simplest SCLN is a single-layerneural network
in which each output neuron is fullyconnectedto the input nodes. In the SCLN, the output neuronsof a neural network compete
to become active. Whena training example is presented to the network, the outputneurons compete among themselves. If a
neuron won thecompetition, its weight vector would be updated. Accordingto the standard competitive learning rule, the
weight updateis calculated by the following update rule:
Wj(n+1) = Wj(n) + ƞ(n)(x-Wj(n)) (1)
Where ƞ is the learning rate, and wj is the weight vector ofthe winning neuron j. The essence of competitive learningis
illustrated in Figure 3. The network initialized a numberof neurons randomly. The initial neurons learn by shiftingtheir
synaptic weights towards the input nodes. After training, each output neuron should represent a cluster of the input data set by
moving its own synaptic weightvector to the center of that cluster. This process shows that the SCLN has the ability of
performing clustering. However, the performance of the SCLN is heavily dependent on the number of the output neurons and
the initialization of their weight vectors. Once the number of the output neurons is set, the number of clusters is also
determined regardless of the distribution of the data.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 04, Volume 3 (April 2016) www.ijirae.com
______________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -99
On the other hand, different initial weight vectors may lead to different final clusters because the update function in Equation 1
only moves the weight vector of the winning neuron toward its local nearby examples. Figure 4 shows a scenario that reveals
the limitations of the SCLN. In this scenario, two neurons are initialized in one cluster. The SCLN will result in four clusters
although only three clusters are expected. A critical shortage of the SCLN is that it may split one cluster into many small
clusters.
(a) Initial weight vectors
(b) Clustering result
Figure 4. The shortage of SCLN a) and b)
The improved competitive learning network (ICLN) can overcome the shortages of the SCLN. Furthermore, the ICLN obtains
a better performance regarding the computation time. In this approach, the winning neuron updates its weight vector by using
the same update rule in Equation 1. At the same time, the other neurons also update their weight vectors based on the following
equation:
Wj(n+1) = Wj(n) –ƞ2(n)k(d(x,j))(x-Wj(n))(2)
Where ƞ2 is the learning rate, and K (d(x, j)) is a kernel function in which d(x, j) is the distance between the neuron j and the
input x. There are various choices of the kernel function [1], such as the inverse distance, the triangular kernel, the quadratic
kernel, and the Gausian kernel. The Gaussian Kernel is a commonly chosen kernel function:
K(d(x, j)) = e−d2(x,j)
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 04, Volume 3 (April 2016) www.ijirae.com
______________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -100
(a) Gaussian
(b) Inverse distance
(c) Triangular
(d) Quadratic
Figure 5. The curves of some kernel functions
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 04, Volume 3 (April 2016) www.ijirae.com
______________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -101
A kernel function obtains the maximum value at zero distance, and the value decays as the distance increases. The kernel
functions reflect the influence of the distance to the update rule. Figure 5 shows the curves of some commonly used kernel
functions. As a result, the updated value would be smaller if the distance between the neuron and the input were greater. The
new update rule applied to the losing neurons moves the weight vectors of these neurons away from the input pattern. The
effect of the above update rules is shown in Figure 6. This update process not only avoids the limitation of the SCLN but also
makes the clustering much faster. The algorithm of the ICLN is outlined in Figure 7.
Figure 6. The effect of the ICLN update rules
4.2. THE SELF-ORGANIZING MAPS
The SOM is one of the most popular neural network models. It is a fully connected, single-layer neural network [8]. It maps a
multi-dimensional data set onto a one or two-dimensional space. In the SOMs, data are clustered by using soft competition,
which is the term opposite to hard competition [13]. In hard competition, there is only one winner: in each competition, only
one node is active, and all of the others are inactive. Soft competition allows not only the winner but also its neighbours to be
active. That is, after competing for the presented inputs, the winner and its neighbour nodes have their weights updated by the
following rule:
Wj(n+1) = Wj(n) _+ƞ(n)hj i(x)(n)(x-Wj(n))(3)
where wj(n) denotes the weight vectors of the winning neuron and its neighbours at time n, ƞ(n) denotes the learning rate at
time n, and hj,i(x)(n) is the neighbourhood function centered at the winning node. The Gaussian function is commonly used as
the neighbourhood function:
hj,i(x)(n) = e−d2 j,i/2_2(n)
Where i is the center, ƞ2 (n) denotes the variance at time n, and dj,i represents the distance between the winning neuron i and
its neighbour node j.
Figure 7. Algorithm: improved competitive learning network (ICLN)
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 04, Volume 3 (April 2016) www.ijirae.com
______________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -102
This update process moves the winning neuron and its neighbours to the input vector. The effect of applying the neighbor hood
function is that the closer neighbours obtain the greater updates. After training, the output layer is expected to reflect the
topology or density of the input data set. It has excellent capabilities for visualizing high dimensional data onto a 1-or 2-
dimensional space. One drawback of the SOMs is that the number of neurons affects the performance of the clustering. To
obtain a better clustering result, various numbers of nodes have to be evaluated. Increasing the number of nodes could increase
the resolution of the map. However, it could increase the computation time dramatically [7].
5. EXPERIMENTS AND RESULTS
In this section, we experiment with the SOM and the ICLN by using the KDD-99 data [9] and compare the results of these two
methods. The KDD-99 dataset was used for the Third International Knowledge Discovery and Data Mining Tools
Competition. This dataset was acquired from the 1998 DARPA intrusion detection evaluation program. There were 4,898,431
connection records, of which 3,925,650 were attacks. From this data set, 501,000 records were chosen as our experimental
data. The selected connections were further split into the training set and the test set, containing 101,000 and 400,000
connections respectively. There were 21 types of intrusions in the test set, but only 7 of them were chosen in the training set.
Therefore, the selected data also challenged the ability to detect the unknown intrusions. The same data sets were used in the
experiments to evaluate the performance of the SOMs and the ICLN in the same environment.
5.1. DATA PREPARATION
In the KDD-99 data set, each connection is labelled as “normal” or a particular type of the attacks. A connection is represented
by 41 features, which include the basic features of the individual TCP connections, the content features within a connection
suggested by the domain knowledge, and the traffic features computed by using a two second time window [9]. The features in
columns 2, 3, and 4 in the KDD-99 data set are the protocol type, the service type, and the flag, respectively. The value of the
protocol type may be TCP, UDP, or ICMP; the service type could be one of the 70 different network services such as HTTP
and SMTP; and the flag has 11 possible values such as SF or S2.These qualitative features are mapped into quantitative
valuesin the preparation process for calculating the similaritiesof the connections.
5.2. EXPERIMENT 1: THE SOMS
In this experiment, we investigate both the accuracy and elapsed time of the SOMs. In the training phase, the SOMs were used
to cluster the training data. After training, each cluster was labelled according to the majority type of data in this cluster. For
instance, if more than 50% of the connections in a cluster were intrusions, the cluster and its centroid weight vector would be
labelled as intrusion. In the test phase, each test connection was assigned to its closest neuron, which was the center of a
cluster, and this connection was identified by the label of that cluster. Table 1 shows the effect of using various number of
initial neurons. The detail of the clustering result of the 3 × 5 SOM was further investigated. After training, 5 of the 15 initial
weight vectors were removed because they did not have any associated data to identify the connection types. The remaining 10
weight vectors were labelled as the majority types of the data in their group. The labelled weight vectors were used to detect
the connections in the test data set. The detail of clustering result generated by a 3 × 5 SOM on the training data is shown in
Table 2.
5.3. EXPERIMENT 2: THE ICLN
The performance of the ICLN was also investigated by using various numbers of the initial neurons. The results of various
trials are summarized in Table 3, in terms of the final number of the clusters discovered by the ICLN. In all of the trials, 6
clusters were discovered after training regardless the number of initial neurons. Moreover, the performances of the ICLN in
these trials are similar. This result implies that the clustering result is unaffected by the number of the initial neurons in the
ICLN algorithm. The detailed clustering result of the training data generated by a 15 neuron ICLN is shown in Table 4. After
training, 6 clusters were detected. The weight vectors of these clusters were used to identify the connections in the test data set.
TABLE 1. THE PERFORMANCE OF SOM
NO. OF INITIAL NEURONS NO. OF CLUSTERS ELAPSED TIME ACCURACY PRECISION RECALL
9 8 1057s 97.80% 98.31% 98.96%
15 10 2162s 97.89% 98.41% 98.97%
18 12 2507s 97.82% 98.33% 98.97%
20 15 3308s 97.89% 98.41% 98.97%
TABLE 2. THE RESULT OF THE 3 × 5 SOM
NO. OF INITIAL NEURONS NO. OF CLUSTERS ELAPSED TIME ACCURACY PRECISION RECALL
9 6 454s 97.89% 98.42% 98.97%
15 6 608s 97.89% 98.42% 98.97%
18 6 682s 97.89% 98.42% 98.97%
20 6 723s 97.89% 98.42% 98.97%
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 04, Volume 3 (April 2016) www.ijirae.com
______________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -103
TABLE 3. THE PERFORMANCE OF ICLN
CLUSTER
1 2 3 4 5
NORMAL 69413 26 5776 869 1422
BUFFER OVERFLOW 2
LOAD MODULE 1
PERL 1
NEPTUNE
SMURF
IPSWEEP 1 11 20
BACK 59
TABLE 4. THE RESULT OF THE ICLN
CLUSTER
6 7 8 9 10
NORMAL 54 70 1 77 180
BUFFER OVERFLOW
LOAD MODULE
PERL
NEPTUNE 30 22093
SMURF
IPSWEEP 33 859
BACK 2
CLUSTER
1 2 3 4 5 6
NORMAL 1422 70 75260 180 878 78
BUFFER OVERFLOW 2
LOAD MODULE 1
PERL 1
NEPTUNE 30
SMURF 22093
IPSWEEP 12 53 859
BACK 59 2
5.4. DISCUSSION
While obtaining similar accuracy, the ICLN requires less computation time. Figure 8 shows the computation time of the SOM
and ICLN algorithms in the training phase. The elapsed time of the SOM increases rapidly when the number of initial neurons
increases. The results demonstrate that the ICLN uses much less time than the SOM. Interestingly, the ICLN discovered
clusters similar to those discovered by the SOMs. The clusters 1, 2, and 4 in Table 4 are exactly the same as the clusters 5, 7,
and 10 in Table 2. The cluster 8 in the SOM contains only one instance. This instance moves to the nearest neighbour, cluster
9, when the weight vector of cluster 8 is removed. The reconstructed cluster becomes the same as the cluster 6 in the ICLN.
The above experiments confirmed that the performance of the ICLN is unaffected by the number of the initial output neurons.
The results also suggest that this approach has the ability to detect unseen network attacks.
Figure 8. The elapsed time of the SOM and ICLN
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 04, Volume 3 (April 2016) www.ijirae.com
______________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -104
6. CONCLUSION
A novel approach for detecting network intrusions is proposed in this paper. The proposed approach obtains a significant
improvement in speed. The experiments also show that the proposed approach has the ability to detect the unknown intrusions
by clustering the connections based on their similarities. Specifically, we compared the performance of this approach with the
SOM. The proposed approach obtains a similar accuracy as the SOM does whereas it only uses one fourth of the computation
time of the SOM. In addition, the clustering result of the proposed approach is independent of the number of initial neurons.
The experimental results on the KDD-99 data set demonstrates that the developed algorithm is successful in terms of not only
accuracy but also efficiency in network intrusion detection.
REFERENCES
[1] C. G. Atkeson, A. W. Moore, and S. Schaal. Locally weighted learning. Artificial Intelligence Review, 11(1–5):11 – 73,
1996.
[2] J. Cannady. Artificial neural networks for misuse detection. In Proceedings of the 1998 National Information Systems
Security Conference (NISSC’98) October 5-8 1998. Arlington, VA., pages 443–456, 1998.
[3] P. Dokas, L. Ertoz, V. Kumar, A. Lazarevic, J. Srivastava, and P. Tan. Data mining for network intrusion detection. In
Proc.NSF Workshop on Next Generation Data Mining, 2012.
[4] K. Fox, R. Henning, J. Reed, and R. Simonian. A neural network approach towards intrusion detection. In In
Proceedingsof the 13th National Computer Security Conference, 1990.
[5] A. K. Ghosh and A. Schwartzbard. A study in using neural networks for anomaly and misuse detection. In In Proceedings
of USENIX Security Symposium, 1999.
[6] L. Girardin. An eye on network intruder-administrator shootouts. In Proceedings of the Workshop on Intrusion Detection
and Network Monitoring (ID’99), pages 19–28, Berkeley, CA, USA, 1999. USENIX Association.
[7] Y. Guan, A. A. Ghorbani, and N. Belacel. Y-means: A clustering method for intrusion detection. In IEEE Canadian
Conference on Electrical and Computer Engineering, proceeding, page 1083, 2003.
[8] S. Haykin. Neural networks: A comprehensive foundation. Second Edition, Prentice Hall Inc., 1999. [9] S. Hettich and
S. D. Bay. The uci kdd archive, 1999.
[10] S. Lee and D. Heinbuch. Training a neural-network basedintrusion detector to recognize novel attacks. IEEE
Transactionson Systems, Man & Cybernetics, Part A (Systems &Humans), 31(4):294 – 9, July 2011.
[11] W. Lee and S. Stolfo. Data mining approaches for intrusiondetection. In Proceedings of the 7th USENIX Security
Symposium,San Antonio, TX, 1998.
[12] R. P. Lippmann and R. K. Cunningham. Improving intrusiondetection performance using keyword selection and
neuralnetworks. Computer Networks (Amsterdam, Netherlands:1999), 34(4):597–603, 2008.
[13] J. C. Principle, N. Eulano, and W. C. Lefebvre. Neural andadaptive systems: Fundamentals through simulations.
JohnWiley & Sons, Inc., 2011.
[14] M. Ramadas, S. Ostermann, and B. Tjaden. Detectinganomalous network traffic with self-organizing maps. In
RecentAdvances in Intrusion Detection, 6th International Symposium,RAID 2003, pages 36–54, 2013.
[15] B. C. Rhodes, J. A. Mahaffey, and J. D. Cannady. Multipleself-organizing maps for intrusion detection. In Proceedingsof
the 23rd National Information Systems Security Conference,2009.

More Related Content

What's hot

Analysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTAnalysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTIJERA Editor
 
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived VideosIRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived VideosIRJET Journal
 
A Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection SystemsA Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection Systemsijsrd.com
 
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...IJMER
 
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...IJCSIS Research Publications
 
Yolinda chiramba Survey Paper
Yolinda chiramba Survey PaperYolinda chiramba Survey Paper
Yolinda chiramba Survey PaperYolinda Chiramba
 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networksrahulmonikasharma
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainIJCI JOURNAL
 
Correlation of artificial neural network classification and nfrs attribute fi...
Correlation of artificial neural network classification and nfrs attribute fi...Correlation of artificial neural network classification and nfrs attribute fi...
Correlation of artificial neural network classification and nfrs attribute fi...eSAT Journals
 
Machine Learning Algorithm & Anomaly detection 2021
Machine Learning Algorithm & Anomaly detection 2021Machine Learning Algorithm & Anomaly detection 2021
Machine Learning Algorithm & Anomaly detection 2021Chakrit Phain
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 
Semi-supervised learning approach using modified self-training algorithm to c...
Semi-supervised learning approach using modified self-training algorithm to c...Semi-supervised learning approach using modified self-training algorithm to c...
Semi-supervised learning approach using modified self-training algorithm to c...IJECEIAES
 
Probabilistic models for anomaly detection based on usage of network traffic
Probabilistic models for anomaly detection based on usage of network trafficProbabilistic models for anomaly detection based on usage of network traffic
Probabilistic models for anomaly detection based on usage of network trafficAlexander Decker
 
Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...
Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...
Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...IOSRjournaljce
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmeSAT Journals
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmeSAT Publishing House
 
Anomaly Detection using multidimensional reduction Principal Component Analysis
Anomaly Detection using multidimensional reduction Principal Component AnalysisAnomaly Detection using multidimensional reduction Principal Component Analysis
Anomaly Detection using multidimensional reduction Principal Component AnalysisIOSR Journals
 

What's hot (20)

Ij2514951500
Ij2514951500Ij2514951500
Ij2514951500
 
Analysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTAnalysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOT
 
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived VideosIRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived Videos
 
A Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection SystemsA Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection Systems
 
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
 
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
 
My
MyMy
My
 
Yolinda chiramba Survey Paper
Yolinda chiramba Survey PaperYolinda chiramba Survey Paper
Yolinda chiramba Survey Paper
 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chain
 
Correlation of artificial neural network classification and nfrs attribute fi...
Correlation of artificial neural network classification and nfrs attribute fi...Correlation of artificial neural network classification and nfrs attribute fi...
Correlation of artificial neural network classification and nfrs attribute fi...
 
Data mining techniques
Data mining techniquesData mining techniques
Data mining techniques
 
Machine Learning Algorithm & Anomaly detection 2021
Machine Learning Algorithm & Anomaly detection 2021Machine Learning Algorithm & Anomaly detection 2021
Machine Learning Algorithm & Anomaly detection 2021
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
Semi-supervised learning approach using modified self-training algorithm to c...
Semi-supervised learning approach using modified self-training algorithm to c...Semi-supervised learning approach using modified self-training algorithm to c...
Semi-supervised learning approach using modified self-training algorithm to c...
 
Probabilistic models for anomaly detection based on usage of network traffic
Probabilistic models for anomaly detection based on usage of network trafficProbabilistic models for anomaly detection based on usage of network traffic
Probabilistic models for anomaly detection based on usage of network traffic
 
Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...
Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...
Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
 
Anomaly Detection using multidimensional reduction Principal Component Analysis
Anomaly Detection using multidimensional reduction Principal Component AnalysisAnomaly Detection using multidimensional reduction Principal Component Analysis
Anomaly Detection using multidimensional reduction Principal Component Analysis
 

Viewers also liked (10)

scan0332
scan0332scan0332
scan0332
 
Peta's resume - Copy (2)
Peta's resume - Copy (2)Peta's resume - Copy (2)
Peta's resume - Copy (2)
 
Evolucion de la web
Evolucion de la webEvolucion de la web
Evolucion de la web
 
First aid
First aid First aid
First aid
 
Alcaldía de iribarren
Alcaldía de iribarrenAlcaldía de iribarren
Alcaldía de iribarren
 
Slide 11 WestCal Political Science 5 Western Political Thought 2016
Slide 11 WestCal Political Science 5 Western Political Thought 2016Slide 11 WestCal Political Science 5 Western Political Thought 2016
Slide 11 WestCal Political Science 5 Western Political Thought 2016
 
AL IV-E Conf Key Note (8 5 16) 2
AL IV-E Conf Key Note (8 5 16) 2AL IV-E Conf Key Note (8 5 16) 2
AL IV-E Conf Key Note (8 5 16) 2
 
Презентация к установке памятника Г.А. Потемкину
Презентация к установке памятника Г.А. ПотемкинуПрезентация к установке памятника Г.А. Потемкину
Презентация к установке памятника Г.А. Потемкину
 
Valerio pedro
Valerio pedroValerio pedro
Valerio pedro
 
Sumegha Pahwa - cv
Sumegha Pahwa - cvSumegha Pahwa - cv
Sumegha Pahwa - cv
 

Similar to Artificial Neural Content Techniques for Enhanced Intrusion Detection and Prevention System

A comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan dataA comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan dataIAEME Publication
 
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion ApproachEnhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion ApproachIJCI JOURNAL
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...IDES Editor
 
Visualize network anomaly detection by using k means clustering algorithm
Visualize network anomaly detection by using k means clustering algorithmVisualize network anomaly detection by using k means clustering algorithm
Visualize network anomaly detection by using k means clustering algorithmIJCNCJournal
 
Data Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient TechniquesData Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient TechniquesIJAEMSJORNAL
 
Intrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An OverviewIntrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An OverviewIRJET Journal
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Techniqueijsrd.com
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Journals
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Publishing House
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques IJMER
 
Anomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyAnomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyeSAT Publishing House
 
Potato Leaf Disease Detection Using Machine Learning
Potato Leaf Disease Detection Using Machine LearningPotato Leaf Disease Detection Using Machine Learning
Potato Leaf Disease Detection Using Machine LearningIRJET Journal
 
Real Time Intrusion Detection System Using Computational Intelligence and Neu...
Real Time Intrusion Detection System Using Computational Intelligence and Neu...Real Time Intrusion Detection System Using Computational Intelligence and Neu...
Real Time Intrusion Detection System Using Computational Intelligence and Neu...ijtsrd
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...IJNSA Journal
 
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORKA PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORKIRJET Journal
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...IJMER
 

Similar to Artificial Neural Content Techniques for Enhanced Intrusion Detection and Prevention System (20)

A comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan dataA comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan data
 
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion ApproachEnhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
 
Visualize network anomaly detection by using k means clustering algorithm
Visualize network anomaly detection by using k means clustering algorithmVisualize network anomaly detection by using k means clustering algorithm
Visualize network anomaly detection by using k means clustering algorithm
 
Data Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient TechniquesData Mining Framework for Network Intrusion Detection using Efficient Techniques
Data Mining Framework for Network Intrusion Detection using Efficient Techniques
 
Intrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An OverviewIntrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An Overview
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Technique
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
 
Anomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyAnomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a survey
 
Potato Leaf Disease Detection Using Machine Learning
Potato Leaf Disease Detection Using Machine LearningPotato Leaf Disease Detection Using Machine Learning
Potato Leaf Disease Detection Using Machine Learning
 
Real Time Intrusion Detection System Using Computational Intelligence and Neu...
Real Time Intrusion Detection System Using Computational Intelligence and Neu...Real Time Intrusion Detection System Using Computational Intelligence and Neu...
Real Time Intrusion Detection System Using Computational Intelligence and Neu...
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
 
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORKA PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
 

More from AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNAM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESAM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONAM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNAM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTAM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTAM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
 

More from AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 

Artificial Neural Content Techniques for Enhanced Intrusion Detection and Prevention System

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 04, Volume 3 (April 2016) www.ijirae.com ______________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -96 Artificial Neural Content Techniques for Enhanced Intrusion Detection and Prevention System K.Karthikeyan 1 , Dr.R.Mala 2 1 Research Scholar, Marudupandiyar College, Vallam, Thanjavur 2 Assistant Professor, Department of Computer Science, Marudupandiyar College, Vallam, Thanjavur Abstract- This paper presents a novel approach for detecting network intrusions based on a competitive training neural network. In the paper, the performance of this approach is compared to that of the self-organizing map (SOM), which is a popular unsupervised training algorithm used in intrusion detection. While obtaining a similarly accurate detection rate as the SOM does, the proposed approach uses only one forth of the computation times of the SOM. Furthermore, the clustering result of this method is independent of the number of the initial neurons. This approach also exhibits the ability to detect the known and unknown network attacks. The experimental results obtained by applying this approach to the KDD-99 data set demonstrate that the proposed approach performs exceptionally in terms of both accuracy and computation time. Keywords--Network Security, Network Intrusion Detection, Data Mining, Artificial Neural Network, Competitive Learning 1. INTRODUCTION Intrusion detection is a critical process in network security. Traditional methods of network intrusion detection are based on the saved patterns of known attacks. They detect intrusion by comparing the network connection features to the attack patterns that are provided by human experts. The main drawback of the traditional methods is that they cannot detect unknown intrusions. Even if a new pattern of the attacks were discovered, this new pattern would have to be manually updated into the system. On the other hand, as the speed and complexity of networks develop rapidly, especially when these networks are open to the public Web, the number and types of the intrusions increase dramatically. Human analysis becomes insufficient. This leads to the interest in using data mining techniques in network intrusion detection [3, 11]. Data mining-based intrusion detection techniques canbe categorized into misuse detection and anomaly detection [11]. The misuse detection techniques build the patterns of the attacks by learning from the labelled data. The main drawback of the misuse detection techniques is that they cannot detect new attacks that have never occurred in the training data. On the other hand, the anomaly detection techniques establish normal usage patterns. They can detect the unseen intrusions by investigating their deviation from the normal patterns. The artificial neural networks provide a number of advantages in the detection of network intrusions [2]. The application of the neural network techniques has been considered for both the misuse detection model and the anomaly detection model [10, 15]. As an unsupervised neural network, the SOM has beenapplied in anomaly detection. It implicitly prepares itself todetect any aberrant network activity by learning to characterizethe normal behaviours [15]. However, the SOM has asignificant shortage: the number of neurons affects the network’sperformance. Increasing the number of output nodeswill increase the resolution of the map, but the computationtime will dramatically increase. In this paper, we propose anefficient clustering algorithm based on the competitive neuralnetworks. This approach obtains accuracy similar to thatof the self-organizing map while costing much less computation time. The rest of the paper is organized as follows. In the nextsection, we briefly review the background of the applicationof artificial neural networks to network intrusion detection.Section 4 discusses the self-organizing maps and the proposed approach. In Session 5, experiments reveal the speed and accuracy of the proposed approach compared to the SOM. Finally, Section 6 gives a summary and concludes the current study. Figure 1. Network intrusion detection using labelled data
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 04, Volume 3 (April 2016) www.ijirae.com ______________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -97 2. RELATED WORKS An increasing amount of research has been conducted on the application of neural networks for detecting network intrusions. The artificial neural networks have the potential to resolve a number of problems encountered by the other current approaches in intrusion detection. The neural networks gain experience by training the system to correctly identify the preselected examples of the problem. A Multilayer Perceptron (MLP) was used in [5] foranomaly detection. The proposed model is a single hiddenlayer neural network. The performance of this model tested on the DARPA 1998 data set was a correct detection rate of 77% with 2.2% false alarms. The MLP was also applied in [12]. Generic keywords wereselected to detect the attack preparations and actions after the break- in. The back-propagation algorithm was used inthe learning phase to adapt the weights of the neural network. This approach obtained a detection rate of 80%when it was tested on the DARPA 1998 data set. A hybrid model of the SOM and the MLP was proposedin [2]. In that work, the self-organizing map was combinedwith the feed-forward neural network. This model wasdesignedto detect the dispersing and possibly collaborative attacks. The SOM was also applied to perform the clusteringof network traffic and to detect attacks in [6, 14]. In [6],SOM was used to map the network connections onto 2-dimensional surfaces, which were displayed to the networkadministrator. The intrusions were easily detected in thisview. However, the approach needs a visual interpretation by the network administrator. The SOM is trained by using the normal network traffic in [14]. The trained SOM reflects the distribution of the normal network connections. If the minimum distance between a network connection and the neurons of the trained SOM is more than a pre-set threshold, this connection is classified as an intrusion. In addition, artificial neural networks have also been proposed in the detection of the computer viruses. A self-organizing map was selected in [4] for intrusion detection. In that work, the self-organizing map was designed to learn the characteristics of normal activities. The variations from normal activities provided an indication of a virus. 3. THE DETECTION PROCESS The data source can be labelled or unlabelled based on the learning algorithm used in the data mining-based intrusion detections. Unsupervised algorithms can be applied to unlabelled data while supervised algorithms can only use labelled data. In supervised learning, the training data must be labelled before they are presented to the training algorithm. Figure1 shows the intrusion detection process using supervised learning algorithm. First, the original data must be analyzed and labelled as normal connections or attacks by human experts. After that, the learning algorithms generalize the rules from the training data. Finally, The classifier uses the generated rules to classify the new network connections. A difficulty of the supervised learning is labelling the data. If a large data set is used for training, the labelling duty could be very hard. If choosing a small portion as the training data, the selection of the training examples is crucial to the learning result. Unlike supervised learning algorithms, which can only use labelled data, unsupervised learning algorithms have the ability to learn from unlabelled data. The algorithm we pro pose in this paper is a clustering method, a typical unsupervised learning algorithm. This approach can be applied on not only labelled data but also unlabelled data. The detection process using the unlabelled data is illustrated in Figure 2. First, the training data are clustered by the clustering algorithm. Second, the clustered weight vectors can be labelled by a labelling process. Various methods can be applied to this process. One approach to label a cluster center is to select a sample group of the data from this cluster randomly and label this cluster with the major type of the sample. Finally, the labelled weight vectors can be used to classify the network connections. Figure 2. Network intrusion detection using unlabelled data
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 04, Volume 3 (April 2016) www.ijirae.com ______________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -98 (a) Initial weight vectors (b) Clustering result Figure 3. The principle of SCLN The main difference between the two processes discussed above is the time and the number of examples for labelling. Unlike the first process, in which the data must be labelled before training, the second process has the ability to organize the unlabelled data and to provide the cluster centers for labelling. Therefore, the second process reduces the risk of selecting improper data as the training set. 4. METHODOLOGY This section discusses our improved competitive neural network approach for detecting network intrusions. We derive the new approach from the Standard Competitive Learning Network (SCLN). After that, a brief review of the SOM is given since the new approach will be compared with the SOM. 4.1. THE IMPROVED COMPETITIVE LEARNING NETWORK The improved competitive learning network (ICLN) isbased on the SCLN. The simplest SCLN is a single-layerneural network in which each output neuron is fullyconnectedto the input nodes. In the SCLN, the output neuronsof a neural network compete to become active. Whena training example is presented to the network, the outputneurons compete among themselves. If a neuron won thecompetition, its weight vector would be updated. Accordingto the standard competitive learning rule, the weight updateis calculated by the following update rule: Wj(n+1) = Wj(n) + ƞ(n)(x-Wj(n)) (1) Where ƞ is the learning rate, and wj is the weight vector ofthe winning neuron j. The essence of competitive learningis illustrated in Figure 3. The network initialized a numberof neurons randomly. The initial neurons learn by shiftingtheir synaptic weights towards the input nodes. After training, each output neuron should represent a cluster of the input data set by moving its own synaptic weightvector to the center of that cluster. This process shows that the SCLN has the ability of performing clustering. However, the performance of the SCLN is heavily dependent on the number of the output neurons and the initialization of their weight vectors. Once the number of the output neurons is set, the number of clusters is also determined regardless of the distribution of the data.
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 04, Volume 3 (April 2016) www.ijirae.com ______________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -99 On the other hand, different initial weight vectors may lead to different final clusters because the update function in Equation 1 only moves the weight vector of the winning neuron toward its local nearby examples. Figure 4 shows a scenario that reveals the limitations of the SCLN. In this scenario, two neurons are initialized in one cluster. The SCLN will result in four clusters although only three clusters are expected. A critical shortage of the SCLN is that it may split one cluster into many small clusters. (a) Initial weight vectors (b) Clustering result Figure 4. The shortage of SCLN a) and b) The improved competitive learning network (ICLN) can overcome the shortages of the SCLN. Furthermore, the ICLN obtains a better performance regarding the computation time. In this approach, the winning neuron updates its weight vector by using the same update rule in Equation 1. At the same time, the other neurons also update their weight vectors based on the following equation: Wj(n+1) = Wj(n) –ƞ2(n)k(d(x,j))(x-Wj(n))(2) Where ƞ2 is the learning rate, and K (d(x, j)) is a kernel function in which d(x, j) is the distance between the neuron j and the input x. There are various choices of the kernel function [1], such as the inverse distance, the triangular kernel, the quadratic kernel, and the Gausian kernel. The Gaussian Kernel is a commonly chosen kernel function: K(d(x, j)) = e−d2(x,j)
  • 5. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 04, Volume 3 (April 2016) www.ijirae.com ______________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -100 (a) Gaussian (b) Inverse distance (c) Triangular (d) Quadratic Figure 5. The curves of some kernel functions
  • 6. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 04, Volume 3 (April 2016) www.ijirae.com ______________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -101 A kernel function obtains the maximum value at zero distance, and the value decays as the distance increases. The kernel functions reflect the influence of the distance to the update rule. Figure 5 shows the curves of some commonly used kernel functions. As a result, the updated value would be smaller if the distance between the neuron and the input were greater. The new update rule applied to the losing neurons moves the weight vectors of these neurons away from the input pattern. The effect of the above update rules is shown in Figure 6. This update process not only avoids the limitation of the SCLN but also makes the clustering much faster. The algorithm of the ICLN is outlined in Figure 7. Figure 6. The effect of the ICLN update rules 4.2. THE SELF-ORGANIZING MAPS The SOM is one of the most popular neural network models. It is a fully connected, single-layer neural network [8]. It maps a multi-dimensional data set onto a one or two-dimensional space. In the SOMs, data are clustered by using soft competition, which is the term opposite to hard competition [13]. In hard competition, there is only one winner: in each competition, only one node is active, and all of the others are inactive. Soft competition allows not only the winner but also its neighbours to be active. That is, after competing for the presented inputs, the winner and its neighbour nodes have their weights updated by the following rule: Wj(n+1) = Wj(n) _+ƞ(n)hj i(x)(n)(x-Wj(n))(3) where wj(n) denotes the weight vectors of the winning neuron and its neighbours at time n, ƞ(n) denotes the learning rate at time n, and hj,i(x)(n) is the neighbourhood function centered at the winning node. The Gaussian function is commonly used as the neighbourhood function: hj,i(x)(n) = e−d2 j,i/2_2(n) Where i is the center, ƞ2 (n) denotes the variance at time n, and dj,i represents the distance between the winning neuron i and its neighbour node j. Figure 7. Algorithm: improved competitive learning network (ICLN)
  • 7. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 04, Volume 3 (April 2016) www.ijirae.com ______________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -102 This update process moves the winning neuron and its neighbours to the input vector. The effect of applying the neighbor hood function is that the closer neighbours obtain the greater updates. After training, the output layer is expected to reflect the topology or density of the input data set. It has excellent capabilities for visualizing high dimensional data onto a 1-or 2- dimensional space. One drawback of the SOMs is that the number of neurons affects the performance of the clustering. To obtain a better clustering result, various numbers of nodes have to be evaluated. Increasing the number of nodes could increase the resolution of the map. However, it could increase the computation time dramatically [7]. 5. EXPERIMENTS AND RESULTS In this section, we experiment with the SOM and the ICLN by using the KDD-99 data [9] and compare the results of these two methods. The KDD-99 dataset was used for the Third International Knowledge Discovery and Data Mining Tools Competition. This dataset was acquired from the 1998 DARPA intrusion detection evaluation program. There were 4,898,431 connection records, of which 3,925,650 were attacks. From this data set, 501,000 records were chosen as our experimental data. The selected connections were further split into the training set and the test set, containing 101,000 and 400,000 connections respectively. There were 21 types of intrusions in the test set, but only 7 of them were chosen in the training set. Therefore, the selected data also challenged the ability to detect the unknown intrusions. The same data sets were used in the experiments to evaluate the performance of the SOMs and the ICLN in the same environment. 5.1. DATA PREPARATION In the KDD-99 data set, each connection is labelled as “normal” or a particular type of the attacks. A connection is represented by 41 features, which include the basic features of the individual TCP connections, the content features within a connection suggested by the domain knowledge, and the traffic features computed by using a two second time window [9]. The features in columns 2, 3, and 4 in the KDD-99 data set are the protocol type, the service type, and the flag, respectively. The value of the protocol type may be TCP, UDP, or ICMP; the service type could be one of the 70 different network services such as HTTP and SMTP; and the flag has 11 possible values such as SF or S2.These qualitative features are mapped into quantitative valuesin the preparation process for calculating the similaritiesof the connections. 5.2. EXPERIMENT 1: THE SOMS In this experiment, we investigate both the accuracy and elapsed time of the SOMs. In the training phase, the SOMs were used to cluster the training data. After training, each cluster was labelled according to the majority type of data in this cluster. For instance, if more than 50% of the connections in a cluster were intrusions, the cluster and its centroid weight vector would be labelled as intrusion. In the test phase, each test connection was assigned to its closest neuron, which was the center of a cluster, and this connection was identified by the label of that cluster. Table 1 shows the effect of using various number of initial neurons. The detail of the clustering result of the 3 × 5 SOM was further investigated. After training, 5 of the 15 initial weight vectors were removed because they did not have any associated data to identify the connection types. The remaining 10 weight vectors were labelled as the majority types of the data in their group. The labelled weight vectors were used to detect the connections in the test data set. The detail of clustering result generated by a 3 × 5 SOM on the training data is shown in Table 2. 5.3. EXPERIMENT 2: THE ICLN The performance of the ICLN was also investigated by using various numbers of the initial neurons. The results of various trials are summarized in Table 3, in terms of the final number of the clusters discovered by the ICLN. In all of the trials, 6 clusters were discovered after training regardless the number of initial neurons. Moreover, the performances of the ICLN in these trials are similar. This result implies that the clustering result is unaffected by the number of the initial neurons in the ICLN algorithm. The detailed clustering result of the training data generated by a 15 neuron ICLN is shown in Table 4. After training, 6 clusters were detected. The weight vectors of these clusters were used to identify the connections in the test data set. TABLE 1. THE PERFORMANCE OF SOM NO. OF INITIAL NEURONS NO. OF CLUSTERS ELAPSED TIME ACCURACY PRECISION RECALL 9 8 1057s 97.80% 98.31% 98.96% 15 10 2162s 97.89% 98.41% 98.97% 18 12 2507s 97.82% 98.33% 98.97% 20 15 3308s 97.89% 98.41% 98.97% TABLE 2. THE RESULT OF THE 3 × 5 SOM NO. OF INITIAL NEURONS NO. OF CLUSTERS ELAPSED TIME ACCURACY PRECISION RECALL 9 6 454s 97.89% 98.42% 98.97% 15 6 608s 97.89% 98.42% 98.97% 18 6 682s 97.89% 98.42% 98.97% 20 6 723s 97.89% 98.42% 98.97%
  • 8. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 04, Volume 3 (April 2016) www.ijirae.com ______________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -103 TABLE 3. THE PERFORMANCE OF ICLN CLUSTER 1 2 3 4 5 NORMAL 69413 26 5776 869 1422 BUFFER OVERFLOW 2 LOAD MODULE 1 PERL 1 NEPTUNE SMURF IPSWEEP 1 11 20 BACK 59 TABLE 4. THE RESULT OF THE ICLN CLUSTER 6 7 8 9 10 NORMAL 54 70 1 77 180 BUFFER OVERFLOW LOAD MODULE PERL NEPTUNE 30 22093 SMURF IPSWEEP 33 859 BACK 2 CLUSTER 1 2 3 4 5 6 NORMAL 1422 70 75260 180 878 78 BUFFER OVERFLOW 2 LOAD MODULE 1 PERL 1 NEPTUNE 30 SMURF 22093 IPSWEEP 12 53 859 BACK 59 2 5.4. DISCUSSION While obtaining similar accuracy, the ICLN requires less computation time. Figure 8 shows the computation time of the SOM and ICLN algorithms in the training phase. The elapsed time of the SOM increases rapidly when the number of initial neurons increases. The results demonstrate that the ICLN uses much less time than the SOM. Interestingly, the ICLN discovered clusters similar to those discovered by the SOMs. The clusters 1, 2, and 4 in Table 4 are exactly the same as the clusters 5, 7, and 10 in Table 2. The cluster 8 in the SOM contains only one instance. This instance moves to the nearest neighbour, cluster 9, when the weight vector of cluster 8 is removed. The reconstructed cluster becomes the same as the cluster 6 in the ICLN. The above experiments confirmed that the performance of the ICLN is unaffected by the number of the initial output neurons. The results also suggest that this approach has the ability to detect unseen network attacks. Figure 8. The elapsed time of the SOM and ICLN
  • 9. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 04, Volume 3 (April 2016) www.ijirae.com ______________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -104 6. CONCLUSION A novel approach for detecting network intrusions is proposed in this paper. The proposed approach obtains a significant improvement in speed. The experiments also show that the proposed approach has the ability to detect the unknown intrusions by clustering the connections based on their similarities. Specifically, we compared the performance of this approach with the SOM. The proposed approach obtains a similar accuracy as the SOM does whereas it only uses one fourth of the computation time of the SOM. In addition, the clustering result of the proposed approach is independent of the number of initial neurons. The experimental results on the KDD-99 data set demonstrates that the developed algorithm is successful in terms of not only accuracy but also efficiency in network intrusion detection. REFERENCES [1] C. G. Atkeson, A. W. Moore, and S. Schaal. Locally weighted learning. Artificial Intelligence Review, 11(1–5):11 – 73, 1996. [2] J. Cannady. Artificial neural networks for misuse detection. In Proceedings of the 1998 National Information Systems Security Conference (NISSC’98) October 5-8 1998. Arlington, VA., pages 443–456, 1998. [3] P. Dokas, L. Ertoz, V. Kumar, A. Lazarevic, J. Srivastava, and P. Tan. Data mining for network intrusion detection. In Proc.NSF Workshop on Next Generation Data Mining, 2012. [4] K. Fox, R. Henning, J. Reed, and R. Simonian. A neural network approach towards intrusion detection. In In Proceedingsof the 13th National Computer Security Conference, 1990. [5] A. K. Ghosh and A. Schwartzbard. A study in using neural networks for anomaly and misuse detection. In In Proceedings of USENIX Security Symposium, 1999. [6] L. Girardin. An eye on network intruder-administrator shootouts. In Proceedings of the Workshop on Intrusion Detection and Network Monitoring (ID’99), pages 19–28, Berkeley, CA, USA, 1999. USENIX Association. [7] Y. Guan, A. A. Ghorbani, and N. Belacel. Y-means: A clustering method for intrusion detection. In IEEE Canadian Conference on Electrical and Computer Engineering, proceeding, page 1083, 2003. [8] S. Haykin. Neural networks: A comprehensive foundation. Second Edition, Prentice Hall Inc., 1999. [9] S. Hettich and S. D. Bay. The uci kdd archive, 1999. [10] S. Lee and D. Heinbuch. Training a neural-network basedintrusion detector to recognize novel attacks. IEEE Transactionson Systems, Man & Cybernetics, Part A (Systems &Humans), 31(4):294 – 9, July 2011. [11] W. Lee and S. Stolfo. Data mining approaches for intrusiondetection. In Proceedings of the 7th USENIX Security Symposium,San Antonio, TX, 1998. [12] R. P. Lippmann and R. K. Cunningham. Improving intrusiondetection performance using keyword selection and neuralnetworks. Computer Networks (Amsterdam, Netherlands:1999), 34(4):597–603, 2008. [13] J. C. Principle, N. Eulano, and W. C. Lefebvre. Neural andadaptive systems: Fundamentals through simulations. JohnWiley & Sons, Inc., 2011. [14] M. Ramadas, S. Ostermann, and B. Tjaden. Detectinganomalous network traffic with self-organizing maps. In RecentAdvances in Intrusion Detection, 6th International Symposium,RAID 2003, pages 36–54, 2013. [15] B. C. Rhodes, J. A. Mahaffey, and J. D. Cannady. Multipleself-organizing maps for intrusion detection. In Proceedingsof the 23rd National Information Systems Security Conference,2009.