SlideShare a Scribd company logo
1
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
April - May 2019
ISLAMIC AZAD UNIVERSITY OF RASHT
In The NameOf GOD
Faculty of Engineering
Improved competitive learning neural networks for network intrusion and fraud detection
Benyamin Moadab , Saba Zahedi Rad
Profesoor : Elham Khoshkerdar
2
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V EA TT R A C T I V E
Table
of
Contents
1. The basic concepts (Machine learning , Clustering , classification , Artificial
Neural Networks , Competitive learning , Intrusion Detection System )
2. Introduction
3. Background
4. Algorithm
5. Experimental comparisons
6. Evaluation metrics
7. Discussions
8. Conclusion
3
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
Machine
learningMachine learning (ML) is the scientific study of algorithms and statistical models that computer systems use to effectively
perform a specific task without using explicit instructions, relying on patterns and inference instead. It is seen as a subset of
artificial intelligence.
A TT R A C T I V E
4
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V EA TT R A C T I V E
Types of machine learning
5
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
classification
In machine learning and statistics, classification is
the problem of identifying to which of a set of
categories (sub-populations) a new observation
belongs, on the basis of a training set of data
containing observations (or instances) whose
category membership is known.
6
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
Clustering
In cluster analysis or clustering, the grouping of
a set of objects takes place in such a way that
objects in a group (called cluster) are more
similar than other clusters.
This is the main task of
exploratory data mining and is a
common method for analyzing
statistical data that is used in
many areas, including machine
learning, pattern recognition,
image analysis, data retrieval,
bioinformatics, data compression,
and computer graphics.
7
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
Types of clustering
Clustering algorithms can be classified according to the cluster model. Here are some prominent examples of clustering algorithms, because there are
probably more than 100 published clustering algorithms. All models are not described for their clusters, so they can not be easily categorized.
Members
Connection clustering
(hierarchical clustering)
single linkage on Gaussian data
Centroid based clustering
Isolation of K-means data in Voronoi-cells
Distribution clustering
For the Gaussian data , em has worked well.
Density clustering
Density clustering with DBSCAN
8
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
Artificial Neural
Networks - ANNArtificial Neural Networks (ANN) or, more simply, neural networks, new computing systems and computing methods for machine
learning, knowledge representation, and, finally, applying knowledge to the vast majority of output responses from complex
systems. The main idea behind these networks is to some extent inspired by the way the biological nervous system functions to
process data and information in order to learn and create knowledge. The key element of this idea is to create new structures for
the information processing system.
A TT R A C T I V E
9
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
10
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
Artificial Neural
Networks - ANNComplex neural network
11
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
Competitive learning
Competitive learning is a form of unsupervised
learning in artificial neural networks, in which nodes
compete for the right to respond to a subset of the
input data.
A variant of Hebbian learning, competitive learning
works by increasing the specialization of each node
in the network. It is well suited to finding clusters
within data.
VIEW
12
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
Host Based IDS
The task of identifying and detecting any unauthorized use of the
system is either abusive or harmful by both internal and external
users. Detecting and preventing infiltration today is considered as
one of the main mechanisms in achieving security of networks and
computer systems and are generally used beside firewalls and
complementary security.
Architecture of Intrusion Detection Systems
Different architectures of penetration detection system are:
1. Host Based Intrusion Detection System (HIDS)
2. Network Based Intrusion Detection System (NIDS)
3. Distributed Intrusion Detection System (DIDS)
Intrusion
Detection
System
Log File Monitoring File Integrity
Checker
Network Based
IDS
Types of penetration
detection systems
13
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
• Fraud detections and network intrusion detections are extremely
critical to e-Commerce business.
Both the credit card fraud-detection and network intrusion
detection domains present the following challenges to data
mining:
• There are millions of transactions each day.
• The data are highly skewed.
• Data labels are not immediately available.
• It is hard to track users' behaviors.
 ICLN
 SICLN
 Introduction
14
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
Scam
Statement
Place order
Deduct money
Dispute charge
Chargeback
 Fraud report procedure
15
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
 Background
• The techniques for fraud detection and intrusion detections fall into two categories:
“ statistical techniques “ and “ data mining techniques “.
• Data mining based network intrusion detection techniques can be categorized into
“ misuse detection “ and “ anomaly detection” .
 Multilayer Perceptron (MLP)
 Self Organizing Projects (SOM)
 Unconscious Integration Clustering (UNC)
 Hybrid model
16
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
One-layer perceptron
W1*X1 + W2*X2 + θ
= 0
17
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
Multilayer Perceptron
18
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
Improved competitive learning network
(ICLN)
1. The limitation of SCLN
2. New update rules in ICLN
3. The ICLN algorithm
Algorithm
Supervised improved competitive learning network
(SICLN)
standard competitive learning network
(S CLN )
1. The objective function
2. The SICLN algorithm
3. The SiCLN vs. the iCLN
19
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
1. The limitation of SCLN
 The SCLN consists of two layers of neurons: the distance measure layer and the competitive layer.
The distance measure layer consists of m weight vectors W = {w1,w2, ...,wm}.
The distances calculated in the distance measure layer become the input of the competitive layer.
Each bit of the output vector is either 0 or 1
The update is calculated by the standard competitive learning rule:
wj(r +1) = wj(r) + z(r)(x-wj(r))
Improved competitive learning network
20
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
The drawback of the SCLN
(a) Initial weight vectors (b) Clustering result
21
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
2. New update rules in ICLN
The ICLN changes the SCLN's reward-only rule to reward punish rule.
The lone neuron update formula:
wj(r+1)= w,(r)-Z2(r)K (d(xj))(x-wj(r))
The effect of the ICLN update rules
22
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
Supervised improved competitive learning network
1. The objective function
 The SICLN uses an objective function Obj(X,W) to measure the quality of the
clustering result.
• Obj(X, W) = a x Imp(X, W)+b x Sct(X,W)
 The purpose of the objective function is to minimize the impurity of the result
clusters and keep a minimum number of clusters
 The impurity of the whole result is the weighted average of the
impurity of each cluster:
• Imp(X,W ) = Ei = 1 |wi | x Imp(X,Wi)
23
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
w1 and w5 are labeled as "Black" because their black point members are
more than gray point members.
w2and w4are labeled as "Gray“ because gray points of their members are
more than black points.
w3 is labeled as "unknown" because all of its members are missing
label.
w6is labeled as "unknown" because it has no data member.
After the learning step, the SICLN will reconstruct a new
network based on the trained network.
In the reconstruction step, a neuron is split into two new neurons if it
contains many members belonging to other classes.
On the other hand, two neighboring neurons are merged into one if they
belong to the same class.
1
2
3
6
4
5
24
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
3. The SiCLN vs. the iCLN
 While ICLN has the capability to cluster data in its nature groups.
 The SICLN uses labels to guide the clustering process.
 The ICLN groups data into clusters by gathering closer data points into the same group.
 As a supervised clustering algorithm, the SICLN minimizes the impurity of the groups and the
number of groups.
25
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
Regina Aurora
Designer
“Ut wisi enim ad minim veniam
In this section, we compare the performance of
the SICLN and the ICLN with the k-means and
SOM on three data sets:
 The Iris data
 The KDD 1999 data
 The Vesta transaction data
Experimental
comparisons
26
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V EA TT R A C T I V E
Evaluation metrics
The outputs of a prediction or detection model fall into four categories:
1)true positive (TP)
2)true negative (TN)
3)false positive (FP)
4) false negative (FN)
27
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E Performance comparison on the Iris data
k-Means SOM ICLN SICLN
28
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
Performance of the SICLN on Iris data with missing labels
29
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
Network intrusion detection: KDD-99 data
Algoritm Num Of
Clusters
Accuracy Precision Recall
K-means 10 99.57% 98.60% 99.54%
Som 10 99.62% 98.89% 99.45%
ICLN 5 99.58% 98.59% 99.59%
SICLN 9 99.66% 98.92% 99.60%
Each connection is labeled as "normal" or a particular type of the attacks:
 neptune
 Smurf
 Ip sweep
 Back DoS
30
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
ROC curves of SICLN, k-means, SOM, and ICLN on KDD-99 data
SICLN
SOM
ICLN
k-means
31
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E Misclassify rate on individual class
32
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E Data flow of Vesta data for fraud analysis
OLAP
OLTP
33
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
Discussions
34
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
1
2
4
3
35
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
is able toclassify highly skew data
4
is completely independent
from the initial number of
clusters
6has the capability to
identify unseen
patterns
5
has the capability to achieve high
performance even when part of
data labels are missing
3
able to deal with both
labeled and unlabeled data
2achieves low misclassification
rate in solving classification
problems;
1
 We have proposed and developed two clustering algorithms:
(1)The ICLN, an unsupervised clustering algorithm improving from
the standard competitive learning neural network,
(2) The SICLN, a supervised clustering algorithm, which introduces
supervised mechanism to the ICLN.
 The SICLN is a supervised clustering algorithm derived from the ICLN.
 The reconstruction step enables the SICLN to become completely
independent from the number of initial clusters.
 The experimental comparison demonstrates the SICLN has excellent
performance in solving classification problems using clustering
approaches.
 The experimental comparison demonstrates the SICLN has
excellent performance in solving classification problems using
clustering approaches.
Conclu
sion
36
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
09116997485
CALL US
Beny.modab@gmail.com
EMAIL
Islamic Azad University Of Rasht
ADDRESS
Many thanks to the students of Computer Engineering (Information Technology and Software) at Rasht University of Technology.
Prepared by : Students at Azad University of Rasht
Contact Us
37
W W W . W E B S I T E . C O
M
ATT R A C T I V E 2 0 1 7 . A L L R I G H T S
A TT R A C T I V E
F O R Y O U R A T T E N T I O N
A TT R A C T I V E

More Related Content

What's hot

IRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using YoloIRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using Yolo
IRJET Journal
 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
IJCNCJournal
 
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
inventionjournals
 
KaoNet: Face Recognition and Generation App using Deep Learning
KaoNet: Face Recognition and Generation App using Deep LearningKaoNet: Face Recognition and Generation App using Deep Learning
KaoNet: Face Recognition and Generation App using Deep Learning
Van Huy
 
Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...
Wesley De Neve
 
Predictive Metabonomics
Predictive MetabonomicsPredictive Metabonomics
Predictive MetabonomicsMarilyn Arceo
 
20141003.journal club
20141003.journal club20141003.journal club
20141003.journal clubHayaru SHOUNO
 
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
ieijjournal1
 
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET Journal
 
Bayesian Autoencoders for anomaly detection in industrial environments
Bayesian Autoencoders for anomaly detection in industrial environmentsBayesian Autoencoders for anomaly detection in industrial environments
Bayesian Autoencoders for anomaly detection in industrial environments
Bang Xiang Yong
 
Neural Networks for Pattern Recognition
Neural Networks for Pattern RecognitionNeural Networks for Pattern Recognition
Neural Networks for Pattern Recognition
Vipra Singh
 
Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Editor IJARCET
 
A systematic review on sequence-to-sequence learning with neural network and ...
A systematic review on sequence-to-sequence learning with neural network and ...A systematic review on sequence-to-sequence learning with neural network and ...
A systematic review on sequence-to-sequence learning with neural network and ...
IJECEIAES
 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster
Venkat Projects
 
Bayesian Autoencoders (BAE) & Honest Thoughts on research
Bayesian Autoencoders (BAE) & Honest Thoughts on research Bayesian Autoencoders (BAE) & Honest Thoughts on research
Bayesian Autoencoders (BAE) & Honest Thoughts on research
Bang Xiang Yong
 
PPT - Deep and Confident Prediction For Time Series at Uber
PPT - Deep and Confident Prediction For Time Series at UberPPT - Deep and Confident Prediction For Time Series at Uber
PPT - Deep and Confident Prediction For Time Series at Uber
Jisang Yoon
 
40120140507007
4012014050700740120140507007
40120140507007
IAEME Publication
 

What's hot (19)

IRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using YoloIRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using Yolo
 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
 
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
 
KaoNet: Face Recognition and Generation App using Deep Learning
KaoNet: Face Recognition and Generation App using Deep LearningKaoNet: Face Recognition and Generation App using Deep Learning
KaoNet: Face Recognition and Generation App using Deep Learning
 
Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...Learning biologically relevant features using convolutional neural networks f...
Learning biologically relevant features using convolutional neural networks f...
 
Predictive Metabonomics
Predictive MetabonomicsPredictive Metabonomics
Predictive Metabonomics
 
20141003.journal club
20141003.journal club20141003.journal club
20141003.journal club
 
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
 
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
 
Bayesian Autoencoders for anomaly detection in industrial environments
Bayesian Autoencoders for anomaly detection in industrial environmentsBayesian Autoencoders for anomaly detection in industrial environments
Bayesian Autoencoders for anomaly detection in industrial environments
 
Fulltext02
Fulltext02Fulltext02
Fulltext02
 
L026070074
L026070074L026070074
L026070074
 
Neural Networks for Pattern Recognition
Neural Networks for Pattern RecognitionNeural Networks for Pattern Recognition
Neural Networks for Pattern Recognition
 
Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368
 
A systematic review on sequence-to-sequence learning with neural network and ...
A systematic review on sequence-to-sequence learning with neural network and ...A systematic review on sequence-to-sequence learning with neural network and ...
A systematic review on sequence-to-sequence learning with neural network and ...
 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster
 
Bayesian Autoencoders (BAE) & Honest Thoughts on research
Bayesian Autoencoders (BAE) & Honest Thoughts on research Bayesian Autoencoders (BAE) & Honest Thoughts on research
Bayesian Autoencoders (BAE) & Honest Thoughts on research
 
PPT - Deep and Confident Prediction For Time Series at Uber
PPT - Deep and Confident Prediction For Time Series at UberPPT - Deep and Confident Prediction For Time Series at Uber
PPT - Deep and Confident Prediction For Time Series at Uber
 
40120140507007
4012014050700740120140507007
40120140507007
 

Similar to Attractive light wid

Neural Networks in Data Mining - “An Overview”
Neural Networks  in Data Mining -   “An Overview”Neural Networks  in Data Mining -   “An Overview”
Neural Networks in Data Mining - “An Overview”
Dr.(Mrs).Gethsiyal Augasta
 
Early detection of adult valve disease mitral stenosis
Early detection of adult valve disease mitral stenosisEarly detection of adult valve disease mitral stenosis
Early detection of adult valve disease mitral stenosisIAEME Publication
 
Early detection of adult valve disease mitral stenosis using the elman artifi...
Early detection of adult valve disease mitral stenosis using the elman artifi...Early detection of adult valve disease mitral stenosis using the elman artifi...
Early detection of adult valve disease mitral stenosis using the elman artifi...iaemedu
 
Early detection of adult valve disease–mitral
Early detection of adult valve disease–mitralEarly detection of adult valve disease–mitral
Early detection of adult valve disease–mitralIAEME Publication
 
machinelearningengineeringslideshare-160909192132 (1).pdf
machinelearningengineeringslideshare-160909192132 (1).pdfmachinelearningengineeringslideshare-160909192132 (1).pdf
machinelearningengineeringslideshare-160909192132 (1).pdf
ShivareddyGangam
 
Deep learning: Cutting through the Myths and Hype
Deep learning: Cutting through the Myths and HypeDeep learning: Cutting through the Myths and Hype
Deep learning: Cutting through the Myths and Hype
Siby Jose Plathottam
 
PADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHM
PADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHMPADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHM
PADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHM
IRJET Journal
 
Applications in Machine Learning
Applications in Machine LearningApplications in Machine Learning
Applications in Machine Learning
Joel Graff
 
Open CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural NetworksOpen CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural Networks
ijceronline
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural networkSumeet Kakani
 
Fuzzy Logic Final Report
Fuzzy Logic Final ReportFuzzy Logic Final Report
Fuzzy Logic Final ReportShikhar Agarwal
 
Effective data mining for proper
Effective data mining for properEffective data mining for proper
Effective data mining for proper
IJDKP
 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural network
Alexander Decker
 
Artificial Neural Networks in Human Life: Future Challenges and its Applications
Artificial Neural Networks in Human Life: Future Challenges and its ApplicationsArtificial Neural Networks in Human Life: Future Challenges and its Applications
Artificial Neural Networks in Human Life: Future Challenges and its Applications
IRJET Journal
 
Intrusion Detection Model using Self Organizing Maps.
Intrusion Detection Model using Self Organizing Maps.Intrusion Detection Model using Self Organizing Maps.
Intrusion Detection Model using Self Organizing Maps.
Tushar Shinde
 
self operating maps
self operating mapsself operating maps
self operating maps
AltafSMT
 
Face Recognition Based Intelligent Door Control System
Face Recognition Based Intelligent Door Control SystemFace Recognition Based Intelligent Door Control System
Face Recognition Based Intelligent Door Control System
ijtsrd
 
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network AlgorithmsWeb Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
aciijournal
 

Similar to Attractive light wid (20)

Neural Networks in Data Mining - “An Overview”
Neural Networks  in Data Mining -   “An Overview”Neural Networks  in Data Mining -   “An Overview”
Neural Networks in Data Mining - “An Overview”
 
Early detection of adult valve disease mitral stenosis
Early detection of adult valve disease mitral stenosisEarly detection of adult valve disease mitral stenosis
Early detection of adult valve disease mitral stenosis
 
Early detection of adult valve disease mitral stenosis using the elman artifi...
Early detection of adult valve disease mitral stenosis using the elman artifi...Early detection of adult valve disease mitral stenosis using the elman artifi...
Early detection of adult valve disease mitral stenosis using the elman artifi...
 
Early detection of adult valve disease–mitral
Early detection of adult valve disease–mitralEarly detection of adult valve disease–mitral
Early detection of adult valve disease–mitral
 
Project Report -Vaibhav
Project Report -VaibhavProject Report -Vaibhav
Project Report -Vaibhav
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
machinelearningengineeringslideshare-160909192132 (1).pdf
machinelearningengineeringslideshare-160909192132 (1).pdfmachinelearningengineeringslideshare-160909192132 (1).pdf
machinelearningengineeringslideshare-160909192132 (1).pdf
 
Deep learning: Cutting through the Myths and Hype
Deep learning: Cutting through the Myths and HypeDeep learning: Cutting through the Myths and Hype
Deep learning: Cutting through the Myths and Hype
 
PADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHM
PADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHMPADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHM
PADDY CROP DISEASE DETECTION USING SVM AND CNN ALGORITHM
 
Applications in Machine Learning
Applications in Machine LearningApplications in Machine Learning
Applications in Machine Learning
 
Open CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural NetworksOpen CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural Networks
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
Fuzzy Logic Final Report
Fuzzy Logic Final ReportFuzzy Logic Final Report
Fuzzy Logic Final Report
 
Effective data mining for proper
Effective data mining for properEffective data mining for proper
Effective data mining for proper
 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural network
 
Artificial Neural Networks in Human Life: Future Challenges and its Applications
Artificial Neural Networks in Human Life: Future Challenges and its ApplicationsArtificial Neural Networks in Human Life: Future Challenges and its Applications
Artificial Neural Networks in Human Life: Future Challenges and its Applications
 
Intrusion Detection Model using Self Organizing Maps.
Intrusion Detection Model using Self Organizing Maps.Intrusion Detection Model using Self Organizing Maps.
Intrusion Detection Model using Self Organizing Maps.
 
self operating maps
self operating mapsself operating maps
self operating maps
 
Face Recognition Based Intelligent Door Control System
Face Recognition Based Intelligent Door Control SystemFace Recognition Based Intelligent Door Control System
Face Recognition Based Intelligent Door Control System
 
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network AlgorithmsWeb Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
 

Recently uploaded

Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 

Recently uploaded (20)

Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 

Attractive light wid

  • 1. 1 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E April - May 2019 ISLAMIC AZAD UNIVERSITY OF RASHT In The NameOf GOD Faculty of Engineering Improved competitive learning neural networks for network intrusion and fraud detection Benyamin Moadab , Saba Zahedi Rad Profesoor : Elham Khoshkerdar
  • 2. 2 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V EA TT R A C T I V E Table of Contents 1. The basic concepts (Machine learning , Clustering , classification , Artificial Neural Networks , Competitive learning , Intrusion Detection System ) 2. Introduction 3. Background 4. Algorithm 5. Experimental comparisons 6. Evaluation metrics 7. Discussions 8. Conclusion
  • 3. 3 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Machine learningMachine learning (ML) is the scientific study of algorithms and statistical models that computer systems use to effectively perform a specific task without using explicit instructions, relying on patterns and inference instead. It is seen as a subset of artificial intelligence. A TT R A C T I V E
  • 4. 4 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V EA TT R A C T I V E Types of machine learning
  • 5. 5 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E classification In machine learning and statistics, classification is the problem of identifying to which of a set of categories (sub-populations) a new observation belongs, on the basis of a training set of data containing observations (or instances) whose category membership is known.
  • 6. 6 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Clustering In cluster analysis or clustering, the grouping of a set of objects takes place in such a way that objects in a group (called cluster) are more similar than other clusters. This is the main task of exploratory data mining and is a common method for analyzing statistical data that is used in many areas, including machine learning, pattern recognition, image analysis, data retrieval, bioinformatics, data compression, and computer graphics.
  • 7. 7 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Types of clustering Clustering algorithms can be classified according to the cluster model. Here are some prominent examples of clustering algorithms, because there are probably more than 100 published clustering algorithms. All models are not described for their clusters, so they can not be easily categorized. Members Connection clustering (hierarchical clustering) single linkage on Gaussian data Centroid based clustering Isolation of K-means data in Voronoi-cells Distribution clustering For the Gaussian data , em has worked well. Density clustering Density clustering with DBSCAN
  • 8. 8 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Artificial Neural Networks - ANNArtificial Neural Networks (ANN) or, more simply, neural networks, new computing systems and computing methods for machine learning, knowledge representation, and, finally, applying knowledge to the vast majority of output responses from complex systems. The main idea behind these networks is to some extent inspired by the way the biological nervous system functions to process data and information in order to learn and create knowledge. The key element of this idea is to create new structures for the information processing system. A TT R A C T I V E
  • 9. 9 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E
  • 10. 10 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Artificial Neural Networks - ANNComplex neural network
  • 11. 11 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Competitive learning Competitive learning is a form of unsupervised learning in artificial neural networks, in which nodes compete for the right to respond to a subset of the input data. A variant of Hebbian learning, competitive learning works by increasing the specialization of each node in the network. It is well suited to finding clusters within data. VIEW
  • 12. 12 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Host Based IDS The task of identifying and detecting any unauthorized use of the system is either abusive or harmful by both internal and external users. Detecting and preventing infiltration today is considered as one of the main mechanisms in achieving security of networks and computer systems and are generally used beside firewalls and complementary security. Architecture of Intrusion Detection Systems Different architectures of penetration detection system are: 1. Host Based Intrusion Detection System (HIDS) 2. Network Based Intrusion Detection System (NIDS) 3. Distributed Intrusion Detection System (DIDS) Intrusion Detection System Log File Monitoring File Integrity Checker Network Based IDS Types of penetration detection systems
  • 13. 13 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E • Fraud detections and network intrusion detections are extremely critical to e-Commerce business. Both the credit card fraud-detection and network intrusion detection domains present the following challenges to data mining: • There are millions of transactions each day. • The data are highly skewed. • Data labels are not immediately available. • It is hard to track users' behaviors.  ICLN  SICLN  Introduction
  • 14. 14 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Scam Statement Place order Deduct money Dispute charge Chargeback  Fraud report procedure
  • 15. 15 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E  Background • The techniques for fraud detection and intrusion detections fall into two categories: “ statistical techniques “ and “ data mining techniques “. • Data mining based network intrusion detection techniques can be categorized into “ misuse detection “ and “ anomaly detection” .  Multilayer Perceptron (MLP)  Self Organizing Projects (SOM)  Unconscious Integration Clustering (UNC)  Hybrid model
  • 16. 16 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E One-layer perceptron W1*X1 + W2*X2 + θ = 0
  • 17. 17 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Multilayer Perceptron
  • 18. 18 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Improved competitive learning network (ICLN) 1. The limitation of SCLN 2. New update rules in ICLN 3. The ICLN algorithm Algorithm Supervised improved competitive learning network (SICLN) standard competitive learning network (S CLN ) 1. The objective function 2. The SICLN algorithm 3. The SiCLN vs. the iCLN
  • 19. 19 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E 1. The limitation of SCLN  The SCLN consists of two layers of neurons: the distance measure layer and the competitive layer. The distance measure layer consists of m weight vectors W = {w1,w2, ...,wm}. The distances calculated in the distance measure layer become the input of the competitive layer. Each bit of the output vector is either 0 or 1 The update is calculated by the standard competitive learning rule: wj(r +1) = wj(r) + z(r)(x-wj(r)) Improved competitive learning network
  • 20. 20 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E The drawback of the SCLN (a) Initial weight vectors (b) Clustering result
  • 21. 21 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E 2. New update rules in ICLN The ICLN changes the SCLN's reward-only rule to reward punish rule. The lone neuron update formula: wj(r+1)= w,(r)-Z2(r)K (d(xj))(x-wj(r)) The effect of the ICLN update rules
  • 22. 22 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Supervised improved competitive learning network 1. The objective function  The SICLN uses an objective function Obj(X,W) to measure the quality of the clustering result. • Obj(X, W) = a x Imp(X, W)+b x Sct(X,W)  The purpose of the objective function is to minimize the impurity of the result clusters and keep a minimum number of clusters  The impurity of the whole result is the weighted average of the impurity of each cluster: • Imp(X,W ) = Ei = 1 |wi | x Imp(X,Wi)
  • 23. 23 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E w1 and w5 are labeled as "Black" because their black point members are more than gray point members. w2and w4are labeled as "Gray“ because gray points of their members are more than black points. w3 is labeled as "unknown" because all of its members are missing label. w6is labeled as "unknown" because it has no data member. After the learning step, the SICLN will reconstruct a new network based on the trained network. In the reconstruction step, a neuron is split into two new neurons if it contains many members belonging to other classes. On the other hand, two neighboring neurons are merged into one if they belong to the same class. 1 2 3 6 4 5
  • 24. 24 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E 3. The SiCLN vs. the iCLN  While ICLN has the capability to cluster data in its nature groups.  The SICLN uses labels to guide the clustering process.  The ICLN groups data into clusters by gathering closer data points into the same group.  As a supervised clustering algorithm, the SICLN minimizes the impurity of the groups and the number of groups.
  • 25. 25 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Regina Aurora Designer “Ut wisi enim ad minim veniam In this section, we compare the performance of the SICLN and the ICLN with the k-means and SOM on three data sets:  The Iris data  The KDD 1999 data  The Vesta transaction data Experimental comparisons
  • 26. 26 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V EA TT R A C T I V E Evaluation metrics The outputs of a prediction or detection model fall into four categories: 1)true positive (TP) 2)true negative (TN) 3)false positive (FP) 4) false negative (FN)
  • 27. 27 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Performance comparison on the Iris data k-Means SOM ICLN SICLN
  • 28. 28 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Performance of the SICLN on Iris data with missing labels
  • 29. 29 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Network intrusion detection: KDD-99 data Algoritm Num Of Clusters Accuracy Precision Recall K-means 10 99.57% 98.60% 99.54% Som 10 99.62% 98.89% 99.45% ICLN 5 99.58% 98.59% 99.59% SICLN 9 99.66% 98.92% 99.60% Each connection is labeled as "normal" or a particular type of the attacks:  neptune  Smurf  Ip sweep  Back DoS
  • 30. 30 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E ROC curves of SICLN, k-means, SOM, and ICLN on KDD-99 data SICLN SOM ICLN k-means
  • 31. 31 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Misclassify rate on individual class
  • 32. 32 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Data flow of Vesta data for fraud analysis OLAP OLTP
  • 33. 33 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E Discussions
  • 34. 34 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E 1 2 4 3
  • 35. 35 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E is able toclassify highly skew data 4 is completely independent from the initial number of clusters 6has the capability to identify unseen patterns 5 has the capability to achieve high performance even when part of data labels are missing 3 able to deal with both labeled and unlabeled data 2achieves low misclassification rate in solving classification problems; 1  We have proposed and developed two clustering algorithms: (1)The ICLN, an unsupervised clustering algorithm improving from the standard competitive learning neural network, (2) The SICLN, a supervised clustering algorithm, which introduces supervised mechanism to the ICLN.  The SICLN is a supervised clustering algorithm derived from the ICLN.  The reconstruction step enables the SICLN to become completely independent from the number of initial clusters.  The experimental comparison demonstrates the SICLN has excellent performance in solving classification problems using clustering approaches.  The experimental comparison demonstrates the SICLN has excellent performance in solving classification problems using clustering approaches. Conclu sion
  • 36. 36 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E 09116997485 CALL US Beny.modab@gmail.com EMAIL Islamic Azad University Of Rasht ADDRESS Many thanks to the students of Computer Engineering (Information Technology and Software) at Rasht University of Technology. Prepared by : Students at Azad University of Rasht Contact Us
  • 37. 37 W W W . W E B S I T E . C O M ATT R A C T I V E 2 0 1 7 . A L L R I G H T S A TT R A C T I V E F O R Y O U R A T T E N T I O N A TT R A C T I V E