SlideShare a Scribd company logo
1 of 7
TEMA
ANOMALY DETECTION METHOD IN
COMPUTER SYSTEMS BY MEANS OF
MACHINE LEARNING
PONENTES
Teacher, ICT
Mention Networks.
Master Information
System audits
Master in website
management and
engineering
Ing. Cambiar nombre
INTRODUCTIONS
The use of automatic learning has gained importance due to his
efficacy in the evaluation of the safety, this has allowed the
inclusion of this type of learning in the majority of the
applications of recognition of bosses and mining of information,
optimizing the effects obtained with the traditional methods in
different tasks as the detection of anomalies, this because in the
world of the technology they need from updates you continue
and snapshots to support the reliability, integrity and availability
of the information of the offered services.
Ing. …………………….
INTRODUCTIONS
Detección de
intrusos
Aplicaciones
medicas
Análisis de
redes
Detección de
fraudes
Procesamiento
de imágenes
Anomaly detection is the identification of rare elements,
events, or observations that generate suspicion by differing
significantly from the majority of the data.
Ing. ………………
APPLIED STUDIES
2012
•E. De la Hoz,
Miguel, A Ortiz,
Ortega (2012)
•Intruder
detection model
2017
•Save Prajal,
Pranali, Ketan N
and
Mahyavanshi
Neha
•system that
detects fraud
2017
•N. Malini and
M. Phusha
•System to detect
abnormal
transactions
2017
• Sumaiya
Thaseen,I
krama, Aswani,
Kumar,Cheruku
ri
•Classification
algorithm in
network traffic
2018
•Zamorano Ruiz
•Comparison of
machine
learning
algorithms for
prediction
2019
•.Lopez Leyanis,
Acosta Niusvel
and Andres
Gago
•Anomaly
detection based
on deep learning
2020
•Mansoor Ahmed
Bhatti; Rabia
Riaz; Sanam
Shahla
Rizvi; Sana
Shokat; Farina
Riaz;
•outlier detection
technique
Ing. ………………
RESULTADOS
Ing. ………………
CONCLUSIONES

More Related Content

Similar to CIAP.pptx

Study on Exploring Data Mining Techniques for Network Intrusion Detection
Study on Exploring Data Mining Techniques for Network Intrusion Detection Study on Exploring Data Mining Techniques for Network Intrusion Detection
Study on Exploring Data Mining Techniques for Network Intrusion Detection
AM Publications,India
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber security
IAEME Publication
 

Similar to CIAP.pptx (20)

Student face Attendance System.pptx
Student face Attendance System.pptxStudent face Attendance System.pptx
Student face Attendance System.pptx
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognition
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
 
Employment Performance Management Using Machine Learning
Employment Performance Management Using Machine LearningEmployment Performance Management Using Machine Learning
Employment Performance Management Using Machine Learning
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
IoT based attendance system
IoT based attendance systemIoT based attendance system
IoT based attendance system
 
Study on Exploring Data Mining Techniques for Network Intrusion Detection
Study on Exploring Data Mining Techniques for Network Intrusion Detection Study on Exploring Data Mining Techniques for Network Intrusion Detection
Study on Exploring Data Mining Techniques for Network Intrusion Detection
 
project presentation on image processing
project presentation on  image processingproject presentation on  image processing
project presentation on image processing
 
PARKINSON’S DISEASE DETECTION USING MACHINE LEARNING
PARKINSON’S DISEASE DETECTION USING MACHINE LEARNINGPARKINSON’S DISEASE DETECTION USING MACHINE LEARNING
PARKINSON’S DISEASE DETECTION USING MACHINE LEARNING
 
ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCEONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
 
Project PPT.pptx
Project PPT.pptxProject PPT.pptx
Project PPT.pptx
 
BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...
BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...
BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition System
 
Privacy preserving on
Privacy preserving onPrivacy preserving on
Privacy preserving on
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber security
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
 
Biometric AIT
Biometric AITBiometric AIT
Biometric AIT
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
 
SEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSIS
SEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSISSEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSIS
SEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSIS
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 

CIAP.pptx

  • 1. TEMA ANOMALY DETECTION METHOD IN COMPUTER SYSTEMS BY MEANS OF MACHINE LEARNING
  • 2. PONENTES Teacher, ICT Mention Networks. Master Information System audits Master in website management and engineering
  • 3. Ing. Cambiar nombre INTRODUCTIONS The use of automatic learning has gained importance due to his efficacy in the evaluation of the safety, this has allowed the inclusion of this type of learning in the majority of the applications of recognition of bosses and mining of information, optimizing the effects obtained with the traditional methods in different tasks as the detection of anomalies, this because in the world of the technology they need from updates you continue and snapshots to support the reliability, integrity and availability of the information of the offered services.
  • 4. Ing. ……………………. INTRODUCTIONS Detección de intrusos Aplicaciones medicas Análisis de redes Detección de fraudes Procesamiento de imágenes Anomaly detection is the identification of rare elements, events, or observations that generate suspicion by differing significantly from the majority of the data.
  • 5. Ing. ……………… APPLIED STUDIES 2012 •E. De la Hoz, Miguel, A Ortiz, Ortega (2012) •Intruder detection model 2017 •Save Prajal, Pranali, Ketan N and Mahyavanshi Neha •system that detects fraud 2017 •N. Malini and M. Phusha •System to detect abnormal transactions 2017 • Sumaiya Thaseen,I krama, Aswani, Kumar,Cheruku ri •Classification algorithm in network traffic 2018 •Zamorano Ruiz •Comparison of machine learning algorithms for prediction 2019 •.Lopez Leyanis, Acosta Niusvel and Andres Gago •Anomaly detection based on deep learning 2020 •Mansoor Ahmed Bhatti; Rabia Riaz; Sanam Shahla Rizvi; Sana Shokat; Farina Riaz; •outlier detection technique