SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
DOI:10.5121/ijcax.2016.3302 19
SPAM FILTERING SECURITY EVALUATION
FRAMEWORK USING SVM, LR AND MILR
Kunjali Pawar1
and Madhuri Patil2
1
M.E. Student, Dr. D.Y.Patil School of Engg. And Technology, Lohegaon, Pune,
Savitribai Phule Pune University, India.
2
Assistant Professor, Dr. D.Y.Patil School of Engg. And Technology, Lohegaon, Pune,
Savitribai Phule Pune University, India.
ABSTRACT
The Pattern classification system classifies the pattern into feature space within a boundary. In case
adversarial applications use, for example Spam Filtering, the Network Intrusion Detection System (NIDS),
Biometric Authentication, the pattern classification systems are used. Spam filtering is an adversary
application in which data can be employed by humans to attenuate perspective operations. To appraise the
security issue related Spam Filtering voluminous machine learning systems. We presented a framework for
the experimental evaluation of the classifier security in an adversarial environments, that combines and
constructs on the arms race and security by design, Adversary modelling and Data distribution under
attack. Furthermore, we presented a SVM, LR and MILR classifier for classification to categorize email as
legitimate (ham) or spam emails on the basis of thee text samples.
KEYWORDS
Adversary Model, Multiple Instance Logistic Regression, Pattern Classification, Security Evaluation, Spam
Filtering
1. INTRODUCTION
This Machine learning systems bid an unparalleled resilience in acting with emerging input in a
variation of applications, such as Intrusion Detection Systems (IDS) [1] and the spam filtering of
e-mails. Whenever machine learning is used to prevent illegal or unsanctioned activity [2] and
there is an economic incentive, adversaries will attempt to avoid the stability provided.
Constraints on how adversaries can employs the training data (TR) and test data (TS) for
classifiers used to encounter incredulous behaviour make problems in this area tractable and
interesting. Pattern classification has earned eminence in different fields which contains security
concerned applications like the Spam Filtering, the Network Intrusion Detection System (NIDS),
and Biometric Authentication to distinguish between the legitimate and malicious samples [3].
In specific, there are three main clear issues can be recognized: (a) examining the weaknesses
(vulnerabilities) of classification algorithms, and the corresponding attacks; (b) creating the novel
methodologies to assess the classifier security under these attacks, which is not possible using the
classical performance evaluation methodologies; (c) establishing the design methods [4] to
guarantee the classifier security in an adversarial environment. The goal of attacker is to defeat
the normal process of spam filters so that they can send spams [5].
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
20
The respite of the paper is unionized as follows: The section II, scrutinize about the problem
definition on the Security Evaluation. The section III, discuss a proposed system framework for
Spam Filtering Security Evaluation. The section IV scrutinizes the algorithms and evaluation of
these algorithms using examples. The remainder of section V covers expected results of
classifiers. The section VI, summarize the conclusion and the future scope.
2. PROBLEM STATEMENT
2.1. Problem statement
• Existing methods address one of the main open issues of evaluating at design phase the
security of pattern classifiers.
• Even though the design phase of secure classifiers is a different issue than security
evaluation, existing framework could be exploited to this end. For instance spam filtering
existing system considers SVM and LR classifier.
• To apply an empirical security evaluation framework and provide security to Spam
Filtering application and use best classifier in our framework.
2.2. Solving approach
The proposed system focuses on multiple instance logistic regression (MILR) strategy. In the
recommended strategy, emails are treated as bags of multiple instances [6] and a logistic model at
the instance level is indirectly learned by exploiting the bag level binomial log-likelihood
function [14].
3. PROPOSED FRAMEWORK
The contribution of this paper is-
• Classification of email using SVM, LR and MILR classifiers.
• Intent to increase classification results, classifier called Multiple Instance Logistic
Regression (MILR) is used.
• MILR differs from a single instance supervised learning [7], such that by splitting an
email into several instances, a MI learner will be capable to identify the spam part of the
text mail even though text mail has been injected with good words which solve the
efficiency issue for GWI attack [14].
The data distribution gives the training data and testing data separately [8]. The testing data can
be manually generated by the user during the compose emails. The assumptions can be given with
the help of Adversary Model [9]. Modelling the adversary is dependent on the attack scenarios. It
consists of goal, knowledge, capability, strategies of the adversary as shown in figure 1.
The classification application can be authenticated by authenticator. It consists of three classifiers
like SVM, LR and MILR. The classifiers acts like an algorithms. These classifiers give its
classification results either the email is spam or legitimate or normal. The training data can be
already trained by admin. This user can be an attacker or an authorized person. For this
application user can perform classification techniques (SVM, LR, and MILR) by means of
analysis. This training region subsists of all types of mails such as spam or ham. For classification
of testing part/mail using training part, different classifiers are used. SVM, LR and MILR
classifiers are used for classification and result analysis [11].
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
21
Figure1. Security Evaluation Framework using Spam Filtering
The Pattern classifier classifies or distinguishes the pattern (which is combination of feature
which can be characterized by the individuals) into the feature space or word space within a
boundary [10], [12], [13]. The goal is to partition the feature or word space in the class labeled
decision regions. Therefore, for the ambition of model selection considers that the developer
wants to appoint a Support Vector Machine (SVM) with a linear kernel, a Logistic Regression
(LR) classifier, and Multiple Instance Logistic Regression (MILR). In the proposed system, for
the classification purpose SVMs are actualized with the LibSVM, Logistic Regression (LR) and
Multiple Instance Logistic Regression (MILR) is used for practical analysis.
4. ALGORITHMS WITH EXAMPLE
Firstly, a framework is presented for the empirical evaluation of classifier based on simulation of
potential attack scenarios. The existing system considers SVM and LR classifiers [11]. The
proposed system focuses on multiple instance logistic regression (MILR) strategy.
4.1. SVM Classifier
Algorithm: SVM classifier
Input:
Set of email data ,
(Combination of positively and negatively labeled data)
Output: Classified email data (Spam/Ham)
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
22
Process:
Step1: Distribution of positively and negatively labeled data according to features.
Step2: Compute Mapping function Ø().
Step3: Set bias as 1 to every vectors
Step4: Compute dot (.) products equations
Step5: Calculate the value of discriminate Hyperplanes α1, α2, α3,..
Step6: Predict positive and negative samples
Example:
Figure 2 shows the evaluation of SVM classifier with an example.
Figure2. SVM example
4.2. LR Classifier
Algorithm: LR classifier
Consider y= 1, if word spam and y=0, if word is not Spam (Ham).
For Spam Filtering, classification of words as spam or ham
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
23
The probability of word is
The probability for spam per word is
The probability for ham per word is
And
Example:
Figure 3 shows the evaluation of LR classifier with an example.
Figure3. LR example
4.2. MILR Classifier
Algorithm: MILR classifier
Input:
Set of email data ,
Be probability that the ith
email is Positive,
Be probability that the ith
email is Negative
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
24
Is a vector of the word frequency counts (or tf-idf weight) of unique terms in every email.
Process:
Step 1: Binomial log-likelihood function is:
Step 2: In a single instance setting, probability has sigmoid response function as:
Step 3: In multiple instances, setting estimate the instance-level class probabilities
has a sigmoidal response function as:
Where, is the jth
instance in the ith
data, and and are the parameters that need to be
estimated.
Step 4: In a single instance setting, probability has sigmoid response function as:
Step 5: In multiple instance setting estimate the instance-level class probabilities
has a sigmoidal response function as:
5. EXPECTED RESULTS
The experimental results of the classification of legitimate (normal) and Spam e-mails are
computed using the accuracy of the classifiers. The input of the proposed system is the number of
testing samples. The computations of results are based on different mails. Some mails are trained
before test and some new mails are also tested in proposed system. The analysis shows that MILR
approach perform better as compare to SVM and LR algorithm by considering parameters like
time, mean absolute error, etc. The accuracy can be calculated using following formula,
Classification accuracy:
t
c
N
N
Ac =
Where, = Number of words which are correctly classified
= Total number of words
In this experiment, the efficiency of SVM, LR and MILR [11], [14] is evaluated to test the ability
of classifiers [15]. Figure2 shows the output of accuracy on every classifier. Here we use the
Spring Tool Suite (STS) with wampserver for database connectivity. Table 1 shows the accuracy
result for queries M1, M2, M3 and M4 mail in terms of percentage (%).
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
25
M1: Code demonstrates how to get input from user.
M2: This is too dirty place. Please clean otherwise wash it.
M3: I hate you idiot. I will kill you idiot.
M4: The Indian Mujahideen claimed responsibility for the Jaipur bombings through an email sent
to Indian media and declared open war against India.
TABLE I: Classification Accuracy
Figure2. Graphical representation of classification accuracy
M1 M2 M3 M4
SVM 58.93 61.24 74.49 58.93
LR 55.24 60.2 65.48 58.93
MILR 64.73 68.75 73.33 64.58
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
26
6. CONCLUSION
This paper focused on experimental security evaluation of the pattern classifiers which improve
prediction accuracy of spam filtering application. For classification and analysis three classifiers
are used, are called SVM, LR and MILR. The proposed framework acquainted on a model of the
adversary, and on a model of data distribution; accommodates an analytical approach for the
training and testing sets generation that accredits security evaluation and can furnish the
application distinct techniques. In the future, we will extend the data classification algorithm that
will improve accuracy and performance of the system by means of spam detection.
ACKNOWLEDGEMENTS
We would like to thank the researchers as well as publishers for making their resources available
and teachers for their guidance. We are thankful to the authorities of Savitribai Phule Pune
University and concern members for their constant guidelines and support. We are also thankful
to reviewer for their valuable suggestions and also thank the college authorities for providing the
required infrastructure and support.
REFERENCES
[1] A. A. Cardenas, J.S. Baras, and K. Seamon, A Framework for the Evaluation of Intrusion Detection
Systems, Proc. IEEE Symp. Security and Privacy, pp. 63-77, 2006.
[2] D.B. Skillicorn, Adversarial Knowledge Discovery, IEEE Intelligent Systems, vol. 24, no. 6,
Nov./Dec. 2009.
[3] M. Barreno, B. Nelson, R. Sears, A.D. Joseph, and J.D. Tygar, Can Machine Learning be Secure?
Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 16-25, 2006.
[4] Kunjali Pawar and Madhuri Patil, A Review on Security Evaluation for Pattern Classifier against
Attack, International Journal of Computer Applications (IJCA) Proceedings on National Conference
on Advances in Computing NCAC-2015(4): 19-22, December 2015. (ISSN: 0975-8887).
[5] Y. Song, Z. Zhuang, W. C. Lee, H. Li, C.L. Giles and J. Li Q. Zhao, Real-Time Automatic Tag
Recommendation, Proc. 31st Ann. Intl ACM SIGIR Conf. Research and Development in
Information Retrieval (SIGIR 08), pp. 515-522, 2008.
[6] A. Kolcz and C.H. Teo, Feature Weighting for Improved Classifier Robustness, Proc. Sixth Conf.
Email and Anti- Spam, 2009.
[7] P. Laskov and R. Lippmann, Machine Learning in Adversarial Environments, Machine Learning,
vol. 81, pp. 115- 119, 2010.
[8] M. Barreno, B. Nelson, A. Joseph, and J. Tygar, The Security of Machine Learning, Machine
Learning, vol. 81, pp. 121- 148, 2010.
[9] D.B. Skillicorn, Adversarial Knowledge Discovery, IEEE Intelligent Systems, vol. 24, no. 6,
Nov./Dec. 2009.
[10] P. Laskov and M. Kloft, A Framework for Quantitative Security Analysis of Machine Learning,
Proc. Second ACM Workshop Security and Artificial Intelligence, pp. 1-4, 2009.
[11] B. Biggio, G. Fumera, and F. Roli, Security Evaluation of Pattern Classifiers under Attack, IEEE
Transactions On knowledge and Data engg., vol. 26, No. 4, April 2014.
[12] D. Lowd and C. Meek, Good Word Attacks on Statistical Spam Filters, Proc. Second Conf. Email
and Anti-Spam, 2005.
[13] R.O. Duda, P.E. Hart, and D.G. Stork, Pattern Classification, Wiley-Interscience Publication, 2000.
[14] Z. Jorgensen, Y. Zhou, and M. Inge, A Multiple Instance Learning Strategy for Combating Good
Word Attacks on Spam Filters, J. Machine Learning Research, vol. 9, pp. 1115-1146, 2008.
[15] Kunjali Pawar and Madhuri Patil, Pattern Classification under Attack on Spam Filtering, IEEE
International Conference on Research in Computational Intelligence and Communication Networks
(ICRCICN-2015), November 2015.
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
27
AUTHORS
Ms. Kunjali Pawar received Bachelor of Engineering degree in Computer Science &
Engineering in 2014 and now pursuing Post Graduation (M.E.) in the department of
Computer Engineering from Dr. D.Y.Patil School of Engineering and Technology in
the current academic year 2015-16. She is now studying for the domain Data Mining
and Information Retrieval as research purpose on Security Evaluation of Pattern
Classifier against attack using Spam filtering during her academic year.
Prof. Mrs. Madhuri Patil. She is presently working as an Assistant Professor in the
department of computer engineering, Dr. D. Y. Patil School of Engineering and
Technology, Pune, Maharashtra, India. She has 6 years experience in teaching field and
her research area is Data Mining and Information Retrieval.

More Related Content

Similar to SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR

IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...IEEEFINALYEARSTUDENTPROJECTS
 
Evasion Attack Detection using Adaboost Learning Classifier
Evasion Attack Detection using Adaboost Learning ClassifierEvasion Attack Detection using Adaboost Learning Classifier
Evasion Attack Detection using Adaboost Learning ClassifierIRJET Journal
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Papitha Velumani
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...IJMER
 
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...IRJET Journal
 
A web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tamA web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tameSAT Journals
 
Intelligent Intrusion Detection System Based on MLP, RBF and SVM Classificati...
Intelligent Intrusion Detection System Based on MLP, RBF and SVM Classificati...Intelligent Intrusion Detection System Based on MLP, RBF and SVM Classificati...
Intelligent Intrusion Detection System Based on MLP, RBF and SVM Classificati...IJCSIS Research Publications
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectioneSAT Publishing House
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectioneSAT Journals
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectioneSAT Publishing House
 
Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Drjabez
 
Improved spambase dataset prediction using svm rbf kernel with adaptive boost
Improved spambase dataset prediction using svm rbf kernel with adaptive boostImproved spambase dataset prediction using svm rbf kernel with adaptive boost
Improved spambase dataset prediction using svm rbf kernel with adaptive boosteSAT Journals
 
Email Spam Detection Using Machine Learning
Email Spam Detection Using Machine LearningEmail Spam Detection Using Machine Learning
Email Spam Detection Using Machine LearningIRJET Journal
 
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion DetectionMulti Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion DetectionIJNSA Journal
 
Adversarial Attacks and Defenses in Malware Classification: A Survey
Adversarial Attacks and Defenses in Malware Classification: A SurveyAdversarial Attacks and Defenses in Malware Classification: A Survey
Adversarial Attacks and Defenses in Malware Classification: A SurveyCSCJournals
 
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTSUSING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTSijseajournal
 
Fuzzy Rule Base System for Software Classification
Fuzzy Rule Base System for Software ClassificationFuzzy Rule Base System for Software Classification
Fuzzy Rule Base System for Software Classificationijcsit
 
Progress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection SystemsProgress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection Systemsijcisjournal
 
11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...
11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...
11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...ijcisjournal
 

Similar to SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR (20)

IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
 
Evasion Attack Detection using Adaboost Learning Classifier
Evasion Attack Detection using Adaboost Learning ClassifierEvasion Attack Detection using Adaboost Learning Classifier
Evasion Attack Detection using Adaboost Learning Classifier
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
 
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
 
A web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tamA web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tam
 
Intelligent Intrusion Detection System Based on MLP, RBF and SVM Classificati...
Intelligent Intrusion Detection System Based on MLP, RBF and SVM Classificati...Intelligent Intrusion Detection System Based on MLP, RBF and SVM Classificati...
Intelligent Intrusion Detection System Based on MLP, RBF and SVM Classificati...
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
 
Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools
 
Improved spambase dataset prediction using svm rbf kernel with adaptive boost
Improved spambase dataset prediction using svm rbf kernel with adaptive boostImproved spambase dataset prediction using svm rbf kernel with adaptive boost
Improved spambase dataset prediction using svm rbf kernel with adaptive boost
 
Email Spam Detection Using Machine Learning
Email Spam Detection Using Machine LearningEmail Spam Detection Using Machine Learning
Email Spam Detection Using Machine Learning
 
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion DetectionMulti Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
 
Ij2514951500
Ij2514951500Ij2514951500
Ij2514951500
 
Adversarial Attacks and Defenses in Malware Classification: A Survey
Adversarial Attacks and Defenses in Malware Classification: A SurveyAdversarial Attacks and Defenses in Malware Classification: A Survey
Adversarial Attacks and Defenses in Malware Classification: A Survey
 
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTSUSING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
USING CATEGORICAL FEATURES IN MINING BUG TRACKING SYSTEMS TO ASSIGN BUG REPORTS
 
Fuzzy Rule Base System for Software Classification
Fuzzy Rule Base System for Software ClassificationFuzzy Rule Base System for Software Classification
Fuzzy Rule Base System for Software Classification
 
Progress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection SystemsProgress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection Systems
 
11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...
11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...
11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...
 

More from ijcax

NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGESNEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGESijcax
 
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEMTHE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEMijcax
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...ijcax
 
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation ijcax
 
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems ijcax
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING ijcax
 
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR ijcax
 
BLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDBLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDijcax
 
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...ijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
TRACE LENGTH CALCULATION ON PCBS
TRACE LENGTH CALCULATION ON PCBSTRACE LENGTH CALCULATION ON PCBS
TRACE LENGTH CALCULATION ON PCBSijcax
 
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...ijcax
 
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...ijcax
 
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...ijcax
 
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...ijcax
 
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...ijcax
 
BLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDBLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDijcax
 
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION ijcax
 
IMPROVING REAL TIME TASK AND HARNESSING ENERGY USING CSBTS IN VIRTUALIZED CLOUD
IMPROVING REAL TIME TASK AND HARNESSING ENERGY USING CSBTS IN VIRTUALIZED CLOUDIMPROVING REAL TIME TASK AND HARNESSING ENERGY USING CSBTS IN VIRTUALIZED CLOUD
IMPROVING REAL TIME TASK AND HARNESSING ENERGY USING CSBTS IN VIRTUALIZED CLOUDijcax
 

More from ijcax (20)

NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGESNEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
 
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEMTHE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
 
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
 
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
 
BLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDBLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLIND
 
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
TRACE LENGTH CALCULATION ON PCBS
TRACE LENGTH CALCULATION ON PCBSTRACE LENGTH CALCULATION ON PCBS
TRACE LENGTH CALCULATION ON PCBS
 
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
 
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
 
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
 
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
 
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
 
BLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDBLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLIND
 
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
 
IMPROVING REAL TIME TASK AND HARNESSING ENERGY USING CSBTS IN VIRTUALIZED CLOUD
IMPROVING REAL TIME TASK AND HARNESSING ENERGY USING CSBTS IN VIRTUALIZED CLOUDIMPROVING REAL TIME TASK AND HARNESSING ENERGY USING CSBTS IN VIRTUALIZED CLOUD
IMPROVING REAL TIME TASK AND HARNESSING ENERGY USING CSBTS IN VIRTUALIZED CLOUD
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR

  • 1. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 DOI:10.5121/ijcax.2016.3302 19 SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR Kunjali Pawar1 and Madhuri Patil2 1 M.E. Student, Dr. D.Y.Patil School of Engg. And Technology, Lohegaon, Pune, Savitribai Phule Pune University, India. 2 Assistant Professor, Dr. D.Y.Patil School of Engg. And Technology, Lohegaon, Pune, Savitribai Phule Pune University, India. ABSTRACT The Pattern classification system classifies the pattern into feature space within a boundary. In case adversarial applications use, for example Spam Filtering, the Network Intrusion Detection System (NIDS), Biometric Authentication, the pattern classification systems are used. Spam filtering is an adversary application in which data can be employed by humans to attenuate perspective operations. To appraise the security issue related Spam Filtering voluminous machine learning systems. We presented a framework for the experimental evaluation of the classifier security in an adversarial environments, that combines and constructs on the arms race and security by design, Adversary modelling and Data distribution under attack. Furthermore, we presented a SVM, LR and MILR classifier for classification to categorize email as legitimate (ham) or spam emails on the basis of thee text samples. KEYWORDS Adversary Model, Multiple Instance Logistic Regression, Pattern Classification, Security Evaluation, Spam Filtering 1. INTRODUCTION This Machine learning systems bid an unparalleled resilience in acting with emerging input in a variation of applications, such as Intrusion Detection Systems (IDS) [1] and the spam filtering of e-mails. Whenever machine learning is used to prevent illegal or unsanctioned activity [2] and there is an economic incentive, adversaries will attempt to avoid the stability provided. Constraints on how adversaries can employs the training data (TR) and test data (TS) for classifiers used to encounter incredulous behaviour make problems in this area tractable and interesting. Pattern classification has earned eminence in different fields which contains security concerned applications like the Spam Filtering, the Network Intrusion Detection System (NIDS), and Biometric Authentication to distinguish between the legitimate and malicious samples [3]. In specific, there are three main clear issues can be recognized: (a) examining the weaknesses (vulnerabilities) of classification algorithms, and the corresponding attacks; (b) creating the novel methodologies to assess the classifier security under these attacks, which is not possible using the classical performance evaluation methodologies; (c) establishing the design methods [4] to guarantee the classifier security in an adversarial environment. The goal of attacker is to defeat the normal process of spam filters so that they can send spams [5].
  • 2. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 20 The respite of the paper is unionized as follows: The section II, scrutinize about the problem definition on the Security Evaluation. The section III, discuss a proposed system framework for Spam Filtering Security Evaluation. The section IV scrutinizes the algorithms and evaluation of these algorithms using examples. The remainder of section V covers expected results of classifiers. The section VI, summarize the conclusion and the future scope. 2. PROBLEM STATEMENT 2.1. Problem statement • Existing methods address one of the main open issues of evaluating at design phase the security of pattern classifiers. • Even though the design phase of secure classifiers is a different issue than security evaluation, existing framework could be exploited to this end. For instance spam filtering existing system considers SVM and LR classifier. • To apply an empirical security evaluation framework and provide security to Spam Filtering application and use best classifier in our framework. 2.2. Solving approach The proposed system focuses on multiple instance logistic regression (MILR) strategy. In the recommended strategy, emails are treated as bags of multiple instances [6] and a logistic model at the instance level is indirectly learned by exploiting the bag level binomial log-likelihood function [14]. 3. PROPOSED FRAMEWORK The contribution of this paper is- • Classification of email using SVM, LR and MILR classifiers. • Intent to increase classification results, classifier called Multiple Instance Logistic Regression (MILR) is used. • MILR differs from a single instance supervised learning [7], such that by splitting an email into several instances, a MI learner will be capable to identify the spam part of the text mail even though text mail has been injected with good words which solve the efficiency issue for GWI attack [14]. The data distribution gives the training data and testing data separately [8]. The testing data can be manually generated by the user during the compose emails. The assumptions can be given with the help of Adversary Model [9]. Modelling the adversary is dependent on the attack scenarios. It consists of goal, knowledge, capability, strategies of the adversary as shown in figure 1. The classification application can be authenticated by authenticator. It consists of three classifiers like SVM, LR and MILR. The classifiers acts like an algorithms. These classifiers give its classification results either the email is spam or legitimate or normal. The training data can be already trained by admin. This user can be an attacker or an authorized person. For this application user can perform classification techniques (SVM, LR, and MILR) by means of analysis. This training region subsists of all types of mails such as spam or ham. For classification of testing part/mail using training part, different classifiers are used. SVM, LR and MILR classifiers are used for classification and result analysis [11].
  • 3. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 21 Figure1. Security Evaluation Framework using Spam Filtering The Pattern classifier classifies or distinguishes the pattern (which is combination of feature which can be characterized by the individuals) into the feature space or word space within a boundary [10], [12], [13]. The goal is to partition the feature or word space in the class labeled decision regions. Therefore, for the ambition of model selection considers that the developer wants to appoint a Support Vector Machine (SVM) with a linear kernel, a Logistic Regression (LR) classifier, and Multiple Instance Logistic Regression (MILR). In the proposed system, for the classification purpose SVMs are actualized with the LibSVM, Logistic Regression (LR) and Multiple Instance Logistic Regression (MILR) is used for practical analysis. 4. ALGORITHMS WITH EXAMPLE Firstly, a framework is presented for the empirical evaluation of classifier based on simulation of potential attack scenarios. The existing system considers SVM and LR classifiers [11]. The proposed system focuses on multiple instance logistic regression (MILR) strategy. 4.1. SVM Classifier Algorithm: SVM classifier Input: Set of email data , (Combination of positively and negatively labeled data) Output: Classified email data (Spam/Ham)
  • 4. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 22 Process: Step1: Distribution of positively and negatively labeled data according to features. Step2: Compute Mapping function Ø(). Step3: Set bias as 1 to every vectors Step4: Compute dot (.) products equations Step5: Calculate the value of discriminate Hyperplanes α1, α2, α3,.. Step6: Predict positive and negative samples Example: Figure 2 shows the evaluation of SVM classifier with an example. Figure2. SVM example 4.2. LR Classifier Algorithm: LR classifier Consider y= 1, if word spam and y=0, if word is not Spam (Ham). For Spam Filtering, classification of words as spam or ham
  • 5. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 23 The probability of word is The probability for spam per word is The probability for ham per word is And Example: Figure 3 shows the evaluation of LR classifier with an example. Figure3. LR example 4.2. MILR Classifier Algorithm: MILR classifier Input: Set of email data , Be probability that the ith email is Positive, Be probability that the ith email is Negative
  • 6. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 24 Is a vector of the word frequency counts (or tf-idf weight) of unique terms in every email. Process: Step 1: Binomial log-likelihood function is: Step 2: In a single instance setting, probability has sigmoid response function as: Step 3: In multiple instances, setting estimate the instance-level class probabilities has a sigmoidal response function as: Where, is the jth instance in the ith data, and and are the parameters that need to be estimated. Step 4: In a single instance setting, probability has sigmoid response function as: Step 5: In multiple instance setting estimate the instance-level class probabilities has a sigmoidal response function as: 5. EXPECTED RESULTS The experimental results of the classification of legitimate (normal) and Spam e-mails are computed using the accuracy of the classifiers. The input of the proposed system is the number of testing samples. The computations of results are based on different mails. Some mails are trained before test and some new mails are also tested in proposed system. The analysis shows that MILR approach perform better as compare to SVM and LR algorithm by considering parameters like time, mean absolute error, etc. The accuracy can be calculated using following formula, Classification accuracy: t c N N Ac = Where, = Number of words which are correctly classified = Total number of words In this experiment, the efficiency of SVM, LR and MILR [11], [14] is evaluated to test the ability of classifiers [15]. Figure2 shows the output of accuracy on every classifier. Here we use the Spring Tool Suite (STS) with wampserver for database connectivity. Table 1 shows the accuracy result for queries M1, M2, M3 and M4 mail in terms of percentage (%).
  • 7. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 25 M1: Code demonstrates how to get input from user. M2: This is too dirty place. Please clean otherwise wash it. M3: I hate you idiot. I will kill you idiot. M4: The Indian Mujahideen claimed responsibility for the Jaipur bombings through an email sent to Indian media and declared open war against India. TABLE I: Classification Accuracy Figure2. Graphical representation of classification accuracy M1 M2 M3 M4 SVM 58.93 61.24 74.49 58.93 LR 55.24 60.2 65.48 58.93 MILR 64.73 68.75 73.33 64.58
  • 8. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 26 6. CONCLUSION This paper focused on experimental security evaluation of the pattern classifiers which improve prediction accuracy of spam filtering application. For classification and analysis three classifiers are used, are called SVM, LR and MILR. The proposed framework acquainted on a model of the adversary, and on a model of data distribution; accommodates an analytical approach for the training and testing sets generation that accredits security evaluation and can furnish the application distinct techniques. In the future, we will extend the data classification algorithm that will improve accuracy and performance of the system by means of spam detection. ACKNOWLEDGEMENTS We would like to thank the researchers as well as publishers for making their resources available and teachers for their guidance. We are thankful to the authorities of Savitribai Phule Pune University and concern members for their constant guidelines and support. We are also thankful to reviewer for their valuable suggestions and also thank the college authorities for providing the required infrastructure and support. REFERENCES [1] A. A. Cardenas, J.S. Baras, and K. Seamon, A Framework for the Evaluation of Intrusion Detection Systems, Proc. IEEE Symp. Security and Privacy, pp. 63-77, 2006. [2] D.B. Skillicorn, Adversarial Knowledge Discovery, IEEE Intelligent Systems, vol. 24, no. 6, Nov./Dec. 2009. [3] M. Barreno, B. Nelson, R. Sears, A.D. Joseph, and J.D. Tygar, Can Machine Learning be Secure? Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 16-25, 2006. [4] Kunjali Pawar and Madhuri Patil, A Review on Security Evaluation for Pattern Classifier against Attack, International Journal of Computer Applications (IJCA) Proceedings on National Conference on Advances in Computing NCAC-2015(4): 19-22, December 2015. (ISSN: 0975-8887). [5] Y. Song, Z. Zhuang, W. C. Lee, H. Li, C.L. Giles and J. Li Q. Zhao, Real-Time Automatic Tag Recommendation, Proc. 31st Ann. Intl ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR 08), pp. 515-522, 2008. [6] A. Kolcz and C.H. Teo, Feature Weighting for Improved Classifier Robustness, Proc. Sixth Conf. Email and Anti- Spam, 2009. [7] P. Laskov and R. Lippmann, Machine Learning in Adversarial Environments, Machine Learning, vol. 81, pp. 115- 119, 2010. [8] M. Barreno, B. Nelson, A. Joseph, and J. Tygar, The Security of Machine Learning, Machine Learning, vol. 81, pp. 121- 148, 2010. [9] D.B. Skillicorn, Adversarial Knowledge Discovery, IEEE Intelligent Systems, vol. 24, no. 6, Nov./Dec. 2009. [10] P. Laskov and M. Kloft, A Framework for Quantitative Security Analysis of Machine Learning, Proc. Second ACM Workshop Security and Artificial Intelligence, pp. 1-4, 2009. [11] B. Biggio, G. Fumera, and F. Roli, Security Evaluation of Pattern Classifiers under Attack, IEEE Transactions On knowledge and Data engg., vol. 26, No. 4, April 2014. [12] D. Lowd and C. Meek, Good Word Attacks on Statistical Spam Filters, Proc. Second Conf. Email and Anti-Spam, 2005. [13] R.O. Duda, P.E. Hart, and D.G. Stork, Pattern Classification, Wiley-Interscience Publication, 2000. [14] Z. Jorgensen, Y. Zhou, and M. Inge, A Multiple Instance Learning Strategy for Combating Good Word Attacks on Spam Filters, J. Machine Learning Research, vol. 9, pp. 1115-1146, 2008. [15] Kunjali Pawar and Madhuri Patil, Pattern Classification under Attack on Spam Filtering, IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN-2015), November 2015.
  • 9. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 27 AUTHORS Ms. Kunjali Pawar received Bachelor of Engineering degree in Computer Science & Engineering in 2014 and now pursuing Post Graduation (M.E.) in the department of Computer Engineering from Dr. D.Y.Patil School of Engineering and Technology in the current academic year 2015-16. She is now studying for the domain Data Mining and Information Retrieval as research purpose on Security Evaluation of Pattern Classifier against attack using Spam filtering during her academic year. Prof. Mrs. Madhuri Patil. She is presently working as an Assistant Professor in the department of computer engineering, Dr. D. Y. Patil School of Engineering and Technology, Pune, Maharashtra, India. She has 6 years experience in teaching field and her research area is Data Mining and Information Retrieval.