Intrusion Detection Systems are playing major role in network security in this internet world. Many researchers have been introduced number of intrusion detection systems in the past. Even though, no system was detected all kind of attacks and achieved better detection accuracy. Most of the intrusion detection systems are used data mining techniques such as clustering, outlier detection, classification, classification through learning techniques. Most of the researchers have been applied soft computing techniques for making effective decision over the network dataset for enhancing the detection accuracy in Intrusion Detection System. Few researchers also applied artificial intelligence techniques along with data mining algorithms for making dynamic decision. This paper discusses about the number of intrusion detection systems that are proposed for providing network security. Finally, comparative analysis made between the existing systems and suggested some new ideas for enhancing the performance of the existing systems.
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...IJNSA Journal
Over the past few years, intrusion protection systems have drawn a mature research area in the field of computer networks. The problem of excessive features has a significant impact on
intrusion detection performance. The use of machine learning algorithms in many previous researches has been used to identify network traffic, harmful or normal. Therefore, to obtain the accuracy, we must reduce the dimensionality of the data used. A new model design based on a combination of feature selection and machine learning algorithms is proposed in this paper. This model depends on selected genes from every feature to increase the accuracy of intrusion detection systems. We selected from features content only ones which impact in attack detection. The performance has been evaluated based on a comparison of several known algorithms. The NSL-KDD dataset is used for examining classification. The proposed model outperformed the other learning approaches with accuracy 98.8 %.
Survey of network anomaly detection using markov chainijcseit
Recently an internet threat has been increased. Our motive is detect the intrusion in the network in concise.
The real time issue such as DoS attack in banking, companies, industries and organization have been
increased significantly IDS has been used in both server and host side. The major challenge is to effectively
predict the periods of threats and protect the server from the unauthorized user. In this study, a novel
probabilistic approach is proposed effectively to detect the network intrusions. It uses a Markov chain for
probabilistic modelling of abnormal events in network systems. The degree of abnormality of the incoming
data is performed on the basis of the network states.
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detectionijsrd.com
In today's interconnected world, one of pervasive issue is how to protect system from intrusion based security attacks. It is an important issue to detect the intrusion attacks for the security of network communication.Denial of Service (DoS) attacks is evolving continuously. These attacks make network resources unavailable for legitimate users which results in massive loss of data, resources and money.Significance of Intrusion detection system (IDS) in computer network security well proven. Intrusion Detection Systems (IDSs) have become an efficient defense tool against network attacks since they allow network administrator to detect policy violations. Mining approach can play very important role in developing intrusion detection system. Classification is identified as an important technique of data mining. This paper evaluates performance of well known classification algorithms for attack classification. The key ideas are to use data mining techniques efficiently for intrusion attack classification. To implement and measure the performance of our system we used the KDD99 benchmark dataset and obtained reasonable detection rate.
Outstanding to the promotion of the Internet and local networks, interruption occasions to computer
systems are emerging. Intrusion detection systems are becoming progressively vital in retaining
appropriate network safety. IDS is a software or hardware device that deals with attacks by gathering
information from a numerous system and network sources, then evaluating signs of security complexities.
Enterprise networked systems are unsurprisingly unprotected to the growing threats posed by hackers as
well as malicious users inside to a network. IDS technology is one of the significant tools used now-a-days,
to counter such threat. In this research we have proposed framework by using advance feature selection
and dimensionality reduction technique we can reduce IDS data then applying Fuzzy ARTMAP classifier
we can find intrusions so that we get accurate results within less time. Feature selection, as an active
research area in decreasing dimensionality, eliminating unrelated data, developing learning correctness,
and improving result unambiguousness.
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...IJNSA Journal
Over the past few years, intrusion protection systems have drawn a mature research area in the field of computer networks. The problem of excessive features has a significant impact on
intrusion detection performance. The use of machine learning algorithms in many previous researches has been used to identify network traffic, harmful or normal. Therefore, to obtain the accuracy, we must reduce the dimensionality of the data used. A new model design based on a combination of feature selection and machine learning algorithms is proposed in this paper. This model depends on selected genes from every feature to increase the accuracy of intrusion detection systems. We selected from features content only ones which impact in attack detection. The performance has been evaluated based on a comparison of several known algorithms. The NSL-KDD dataset is used for examining classification. The proposed model outperformed the other learning approaches with accuracy 98.8 %.
Survey of network anomaly detection using markov chainijcseit
Recently an internet threat has been increased. Our motive is detect the intrusion in the network in concise.
The real time issue such as DoS attack in banking, companies, industries and organization have been
increased significantly IDS has been used in both server and host side. The major challenge is to effectively
predict the periods of threats and protect the server from the unauthorized user. In this study, a novel
probabilistic approach is proposed effectively to detect the network intrusions. It uses a Markov chain for
probabilistic modelling of abnormal events in network systems. The degree of abnormality of the incoming
data is performed on the basis of the network states.
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detectionijsrd.com
In today's interconnected world, one of pervasive issue is how to protect system from intrusion based security attacks. It is an important issue to detect the intrusion attacks for the security of network communication.Denial of Service (DoS) attacks is evolving continuously. These attacks make network resources unavailable for legitimate users which results in massive loss of data, resources and money.Significance of Intrusion detection system (IDS) in computer network security well proven. Intrusion Detection Systems (IDSs) have become an efficient defense tool against network attacks since they allow network administrator to detect policy violations. Mining approach can play very important role in developing intrusion detection system. Classification is identified as an important technique of data mining. This paper evaluates performance of well known classification algorithms for attack classification. The key ideas are to use data mining techniques efficiently for intrusion attack classification. To implement and measure the performance of our system we used the KDD99 benchmark dataset and obtained reasonable detection rate.
Outstanding to the promotion of the Internet and local networks, interruption occasions to computer
systems are emerging. Intrusion detection systems are becoming progressively vital in retaining
appropriate network safety. IDS is a software or hardware device that deals with attacks by gathering
information from a numerous system and network sources, then evaluating signs of security complexities.
Enterprise networked systems are unsurprisingly unprotected to the growing threats posed by hackers as
well as malicious users inside to a network. IDS technology is one of the significant tools used now-a-days,
to counter such threat. In this research we have proposed framework by using advance feature selection
and dimensionality reduction technique we can reduce IDS data then applying Fuzzy ARTMAP classifier
we can find intrusions so that we get accurate results within less time. Feature selection, as an active
research area in decreasing dimensionality, eliminating unrelated data, developing learning correctness,
and improving result unambiguousness.
The Practical Data Mining Model for Efficient IDS through Relational DatabasesIJRES Journal
Enterprise network information system is not only the platform for information sharing and information exchanging, but also the platform for enterprise production automation system and enterprise management system working together. As a result, the security defense of enterprise network information system does not only include information system network security and data security, but also include the security of network business running on information system network, which is the confidentiality, integrity, continuity and real-time of network business. Network security technology has become crucial in protecting government and industry computing infrastructure. Modern intrusion detection applications face complex requirements – they need to be reliable, extensible, easy to manage, and have low maintenance cost. In recent years, data mining-based intrusion detection systems (IDSs) have demonstrated high accuracy, good generalization to novel types of intrusion, and robust behavior in a changing environment. Still, significant challenges exist in the design and implementation of production quality IDSs. Incrementing components such as data transformations, model deployment, and cooperative distributed detection remain a labor intensive and complex engineering endeavor. This paper describes DAID, a database-centric architecture that leverages data mining within the Relational RDBMS to address these challenges. DAID also offers numerous advantages in terms of scheduling capabilities, alert infrastructure, data analysis tools, security, scalability, and reliability. DAID is illustrated with an Intrusion Detection Center application prototype that leverages existing functionality in Relational Database 10g. Intrusion detection system work at many levels in the network fabric and are taking the concept of security to a whole new sphere by incorporating intelligence as a tool to protect networks against un-authorized intrusions and newer forms of attack. We have described formal model for the construction of network security situation measurement based on d-s evidence theory, frequent mode, and sequence model extracted from the data on network security situation based on the knowledge found method and convert the pattern on the related rules of the network security situation, and automatic generation of network security situation.
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...ijcsit
In order to avoid illegitimate use of any intruder, intrusion detection over the network is one of the critical
issues. An intruder may enter any network or system or server by intruding malicious packets into the
system in order to steal, sniff, manipulate or corrupt any useful and secret information, this process is
referred to as intrusion whereas when packets are transmitted by intruder over the network for any purpose
of intrusion is referred to as attack. With the expanding networking technology, millions of servers
communicate with each other and this expansion is always in progress every day. Due to this fact, more
and more intruders get attention; and so to overcome this need of smart intrusion detection model is a
primary requirement.
By analyzing the feature selection methods the identification of essential features of NSL-KDD data set is
done, then by using selected features and machine learning approach and analyzing the basic features of
networks over the data set a hybrid algorithm is made. Finally a model is produced over the algorithm
containing the rules for the network features.
A hybrid misuse intrusion detection model is made to find attacks on system to improve the intrusion
detection. Based on prior features, intrusions on the system can be detected without any previous learning.
This model contains the advantage of feature selection and machine learning techniques with misuse
detection.
A Survey on Various Data Mining Technique in Intrusion Detection SystemIOSRjournaljce
The intrusion detection plays an essential role in computer security. Data Mining refers to the process of extracting hidden, previously unknown and useful information from large databases. Thus data mining techniques help to detect patterns in the data set and use these patterns to detect future intrusions. Data Mining based Intrusion Detection System is combined with Multi-Agent System to improve the performance of the IDS. This paper concerned with the brief review of comparative study on applied data mining based intrusion detection techniques with their merit and demerits. This paper relay more number of applications of the data mining and also focuses extent of the data mining which will useful in the further research.
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONIJNSA Journal
In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesian classifier and decision tree is presented, which performs balance detections and keeps false positives at acceptable level for different types of network attacks, and eliminates redundant attributes as well as contradictory examples from training data that make the detection model complex. The proposed algorithm also addresses some difficulties of data mining such as handling continuous attribute, dealing with missing attribute values, and reducing noise in training data. Due to the large volumes of security audit data as well as the complex and dynamic properties of intrusion behaviours, several data miningbased intrusion detection techniques have been applied to network-based traffic data and host-based data in the last decades. However, there remain various issues needed to be examined towards current intrusion detection systems (IDS). We tested the performance of our proposed algorithm with existing learning algorithms by employing on the KDD99 benchmark intrusion detection dataset. The experimental results prove that the proposed algorithm achieved high detection rates (DR) and significant reduce false positives (FP) for different types of network intrusions using limited computational resources.
The main goal of Intrusion Detection Systems (IDSs) is
to detect intrusions. This kind of detection system represents a
significant tool in traditional computer based systems for ensuring
cyber security. IDS model can be faster and reach more accurate
detection rates, by selecting the most related features from the
input dataset. Feature selection is an important stage of any IDs to
select the optimal subset of features that enhance the process of the
training model to become faster and reduce the complexity while
preserving or enhancing the performance of the system. In this
paper, we proposed a method that based on dividing the input
dataset into different subsets according to each attack. Then we
performed a feature selection technique using information gain
filter for each subset. Then the optimal features set is generated by
combining the list of features sets that obtained for each attack.
Experimental results that conducted on NSL-KDD dataset shows
that the proposed method for feature selection with fewer features,
make an improvement to the system accuracy while decreasing the
complexity. Moreover, a comparative study is performed to the
efficiency of technique for feature selection using different
classification methods. To enhance the overall performance,
another stage is conducted using Random Forest and PART on
voting learning algorithm. The results indicate that the best
accuracy is achieved when using the product probability rule.
Evaluation of network intrusion detection using markov chainIJCI JOURNAL
Day today life internet threat has been increased significantly. There is a need to develop model in order to
maintain security of system. The most effective techniques are Intrusion Detection System (IDS).The
purpose of intrusion system through the security devices detect and deal with it. In this paper, a
mathematical approach is used effectively to predict and detect intrusion in the network. Here we discuss
about two algorithms ‘K-Means + Apriori’, a method which classify normal and abnormal activities in
computer network. In K-Means process, it partitions the training set into K-clusters using Euclidean
distance and introduce an outlier factor, then it build Apriori Algorithm to prune the data by removing
infrequent data in the database. Based on defined state the degree of incoming data is evaluated through
the experiment using sample DARPA2000 dataset, and achieves high detection performance in level of
attack in stages.
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...ijcsit
Intrusion Detection System (IDS) has been an effective way to achieve higher security in detecting malicious activities for the past couple of years. Anomaly detection is an intrusion detection system. Current anomaly detection is often associated with high false alarm rates and only moderate accuracy and detection rates because it’s unable to detect all types of attacks correctly. An experiment is carried out to evaluate the performance of the different machine learning algorithms using KDD-99 Cup and NSL-KDD datasets. Results show which approach has performed better in term of accuracy, detection rate with reasonable false alarm rate.
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...IJNSA Journal
IT assets connected on internetwill encounter alien protocols and few parameters of protocol process are exposed as vulnerabilities. Intrusion Detection Systems (IDS) are installed to alerton suspicious traffic or activity. IDS issuesfalse positives alerts, if any behavior construe for partial attack pattern or the IDS lacks environment knowledge. Continuous monitoring of alerts to evolve whether, an alert is false positive or not is a major concern. In this paper we present design of an external module to IDS,to identify false positive alertsbased on anomaly based adaptive learning model. The novel feature of this design is that the system updates behavior profile of assets and environment with adaptive learning process.A mixture model is used for behavior modeling from reference data. The design of the detection and learning process are based on normal behavior and of environment. The anomaly alert identification algorithm isbuiltonSparse Markov Transducers (SMT) based probability.The total process is presented using real-time data. The Experimental results are validated and presentedwith reference to lab environment.
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMcscpconf
The purpose of this paper is to describe two objective fuzzy genetics-based learning algorithms
and discusses its usage to detect intrusion in a computer network. Experiments were performed
with KDD-cup data set, which have information on computer networks, during normal behavior
and intrusive behavior. The performance of final fuzzy classification system has been
investigated using intrusion detection problem as a high dimensional classification problem.
This task is formulated as optimization problem with two objectives: To minimize the number of
fuzzy rules and to maximize the classification rate. We show a two-objective genetic algorithm
for finding non-dominated solutions of the fuzzy rule selection problem
Review of Intrusion and Anomaly Detection Techniques IJMER
Intrusion detection is the act of detecting actions that attempt to compromise the
confidentiality, integrity or availability of a resource. With the tremendous growth of network-based
services and sensitive information on networks, network security is getting more and more importance
than ever. Intrusion poses a serious security threat in a huge network environment. The increasing use of
internet has dramatically added to the growing number of threats that inhabit within it. Intrusion
detection does not, in general, include prevention of intrusions. Now a days Network intrusion detection
systems have become a standard component in the area of security infrastructure. This review paper tries
to discusses various techniques which are already being used for intrusion detection.
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM ijwmn
Communication networks are essential and it will create many crucial issues today. Nowadays, we
consider that the firewalls are the first line of defense but that policies cannot meet the particular
requirements of needed process to achieve security. Most of the research has been done in this area but
we are lagging to achieve security needs. Already many models such as ADAM, DHP, LERAD and
ENTROPHY are proposed to resolve security problems but we need an efficient model to detect new types
of various intrusions within the entire network. In this paper, we proposed to design a modernized
intrusion detection system which consist of two methods such as anomaly and misuse detection. Both are
integrated and also used to detect novel attacks. Our system proposed to discover temporal pattern of
attacker behaviors, which is profiled using an algorithm EAA (Enhanced Apriori Algorithm). This is
experimented with a simple interface to display the behaviors of attacks effectively
The Practical Data Mining Model for Efficient IDS through Relational DatabasesIJRES Journal
Enterprise network information system is not only the platform for information sharing and information exchanging, but also the platform for enterprise production automation system and enterprise management system working together. As a result, the security defense of enterprise network information system does not only include information system network security and data security, but also include the security of network business running on information system network, which is the confidentiality, integrity, continuity and real-time of network business. Network security technology has become crucial in protecting government and industry computing infrastructure. Modern intrusion detection applications face complex requirements – they need to be reliable, extensible, easy to manage, and have low maintenance cost. In recent years, data mining-based intrusion detection systems (IDSs) have demonstrated high accuracy, good generalization to novel types of intrusion, and robust behavior in a changing environment. Still, significant challenges exist in the design and implementation of production quality IDSs. Incrementing components such as data transformations, model deployment, and cooperative distributed detection remain a labor intensive and complex engineering endeavor. This paper describes DAID, a database-centric architecture that leverages data mining within the Relational RDBMS to address these challenges. DAID also offers numerous advantages in terms of scheduling capabilities, alert infrastructure, data analysis tools, security, scalability, and reliability. DAID is illustrated with an Intrusion Detection Center application prototype that leverages existing functionality in Relational Database 10g. Intrusion detection system work at many levels in the network fabric and are taking the concept of security to a whole new sphere by incorporating intelligence as a tool to protect networks against un-authorized intrusions and newer forms of attack. We have described formal model for the construction of network security situation measurement based on d-s evidence theory, frequent mode, and sequence model extracted from the data on network security situation based on the knowledge found method and convert the pattern on the related rules of the network security situation, and automatic generation of network security situation.
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...ijcsit
In order to avoid illegitimate use of any intruder, intrusion detection over the network is one of the critical
issues. An intruder may enter any network or system or server by intruding malicious packets into the
system in order to steal, sniff, manipulate or corrupt any useful and secret information, this process is
referred to as intrusion whereas when packets are transmitted by intruder over the network for any purpose
of intrusion is referred to as attack. With the expanding networking technology, millions of servers
communicate with each other and this expansion is always in progress every day. Due to this fact, more
and more intruders get attention; and so to overcome this need of smart intrusion detection model is a
primary requirement.
By analyzing the feature selection methods the identification of essential features of NSL-KDD data set is
done, then by using selected features and machine learning approach and analyzing the basic features of
networks over the data set a hybrid algorithm is made. Finally a model is produced over the algorithm
containing the rules for the network features.
A hybrid misuse intrusion detection model is made to find attacks on system to improve the intrusion
detection. Based on prior features, intrusions on the system can be detected without any previous learning.
This model contains the advantage of feature selection and machine learning techniques with misuse
detection.
A Survey on Various Data Mining Technique in Intrusion Detection SystemIOSRjournaljce
The intrusion detection plays an essential role in computer security. Data Mining refers to the process of extracting hidden, previously unknown and useful information from large databases. Thus data mining techniques help to detect patterns in the data set and use these patterns to detect future intrusions. Data Mining based Intrusion Detection System is combined with Multi-Agent System to improve the performance of the IDS. This paper concerned with the brief review of comparative study on applied data mining based intrusion detection techniques with their merit and demerits. This paper relay more number of applications of the data mining and also focuses extent of the data mining which will useful in the further research.
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONIJNSA Journal
In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesian classifier and decision tree is presented, which performs balance detections and keeps false positives at acceptable level for different types of network attacks, and eliminates redundant attributes as well as contradictory examples from training data that make the detection model complex. The proposed algorithm also addresses some difficulties of data mining such as handling continuous attribute, dealing with missing attribute values, and reducing noise in training data. Due to the large volumes of security audit data as well as the complex and dynamic properties of intrusion behaviours, several data miningbased intrusion detection techniques have been applied to network-based traffic data and host-based data in the last decades. However, there remain various issues needed to be examined towards current intrusion detection systems (IDS). We tested the performance of our proposed algorithm with existing learning algorithms by employing on the KDD99 benchmark intrusion detection dataset. The experimental results prove that the proposed algorithm achieved high detection rates (DR) and significant reduce false positives (FP) for different types of network intrusions using limited computational resources.
The main goal of Intrusion Detection Systems (IDSs) is
to detect intrusions. This kind of detection system represents a
significant tool in traditional computer based systems for ensuring
cyber security. IDS model can be faster and reach more accurate
detection rates, by selecting the most related features from the
input dataset. Feature selection is an important stage of any IDs to
select the optimal subset of features that enhance the process of the
training model to become faster and reduce the complexity while
preserving or enhancing the performance of the system. In this
paper, we proposed a method that based on dividing the input
dataset into different subsets according to each attack. Then we
performed a feature selection technique using information gain
filter for each subset. Then the optimal features set is generated by
combining the list of features sets that obtained for each attack.
Experimental results that conducted on NSL-KDD dataset shows
that the proposed method for feature selection with fewer features,
make an improvement to the system accuracy while decreasing the
complexity. Moreover, a comparative study is performed to the
efficiency of technique for feature selection using different
classification methods. To enhance the overall performance,
another stage is conducted using Random Forest and PART on
voting learning algorithm. The results indicate that the best
accuracy is achieved when using the product probability rule.
Evaluation of network intrusion detection using markov chainIJCI JOURNAL
Day today life internet threat has been increased significantly. There is a need to develop model in order to
maintain security of system. The most effective techniques are Intrusion Detection System (IDS).The
purpose of intrusion system through the security devices detect and deal with it. In this paper, a
mathematical approach is used effectively to predict and detect intrusion in the network. Here we discuss
about two algorithms ‘K-Means + Apriori’, a method which classify normal and abnormal activities in
computer network. In K-Means process, it partitions the training set into K-clusters using Euclidean
distance and introduce an outlier factor, then it build Apriori Algorithm to prune the data by removing
infrequent data in the database. Based on defined state the degree of incoming data is evaluated through
the experiment using sample DARPA2000 dataset, and achieves high detection performance in level of
attack in stages.
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...ijcsit
Intrusion Detection System (IDS) has been an effective way to achieve higher security in detecting malicious activities for the past couple of years. Anomaly detection is an intrusion detection system. Current anomaly detection is often associated with high false alarm rates and only moderate accuracy and detection rates because it’s unable to detect all types of attacks correctly. An experiment is carried out to evaluate the performance of the different machine learning algorithms using KDD-99 Cup and NSL-KDD datasets. Results show which approach has performed better in term of accuracy, detection rate with reasonable false alarm rate.
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...IJNSA Journal
IT assets connected on internetwill encounter alien protocols and few parameters of protocol process are exposed as vulnerabilities. Intrusion Detection Systems (IDS) are installed to alerton suspicious traffic or activity. IDS issuesfalse positives alerts, if any behavior construe for partial attack pattern or the IDS lacks environment knowledge. Continuous monitoring of alerts to evolve whether, an alert is false positive or not is a major concern. In this paper we present design of an external module to IDS,to identify false positive alertsbased on anomaly based adaptive learning model. The novel feature of this design is that the system updates behavior profile of assets and environment with adaptive learning process.A mixture model is used for behavior modeling from reference data. The design of the detection and learning process are based on normal behavior and of environment. The anomaly alert identification algorithm isbuiltonSparse Markov Transducers (SMT) based probability.The total process is presented using real-time data. The Experimental results are validated and presentedwith reference to lab environment.
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMcscpconf
The purpose of this paper is to describe two objective fuzzy genetics-based learning algorithms
and discusses its usage to detect intrusion in a computer network. Experiments were performed
with KDD-cup data set, which have information on computer networks, during normal behavior
and intrusive behavior. The performance of final fuzzy classification system has been
investigated using intrusion detection problem as a high dimensional classification problem.
This task is formulated as optimization problem with two objectives: To minimize the number of
fuzzy rules and to maximize the classification rate. We show a two-objective genetic algorithm
for finding non-dominated solutions of the fuzzy rule selection problem
Review of Intrusion and Anomaly Detection Techniques IJMER
Intrusion detection is the act of detecting actions that attempt to compromise the
confidentiality, integrity or availability of a resource. With the tremendous growth of network-based
services and sensitive information on networks, network security is getting more and more importance
than ever. Intrusion poses a serious security threat in a huge network environment. The increasing use of
internet has dramatically added to the growing number of threats that inhabit within it. Intrusion
detection does not, in general, include prevention of intrusions. Now a days Network intrusion detection
systems have become a standard component in the area of security infrastructure. This review paper tries
to discusses various techniques which are already being used for intrusion detection.
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM ijwmn
Communication networks are essential and it will create many crucial issues today. Nowadays, we
consider that the firewalls are the first line of defense but that policies cannot meet the particular
requirements of needed process to achieve security. Most of the research has been done in this area but
we are lagging to achieve security needs. Already many models such as ADAM, DHP, LERAD and
ENTROPHY are proposed to resolve security problems but we need an efficient model to detect new types
of various intrusions within the entire network. In this paper, we proposed to design a modernized
intrusion detection system which consist of two methods such as anomaly and misuse detection. Both are
integrated and also used to detect novel attacks. Our system proposed to discover temporal pattern of
attacker behaviors, which is profiled using an algorithm EAA (Enhanced Apriori Algorithm). This is
experimented with a simple interface to display the behaviors of attacks effectively
Improving the performance of Intrusion detection systemsyasmen essam
Intrusion detection systems (IDS) are widely studied by
researchers nowadays due to the dramatic growth in
network-based technologies. Policy violations and
unauthorized access is in turn increasing which makes
intrusion detection systems of great importance. Existing
approaches to improve intrusion detection systems focus on feature selection or reduction since some features are
irrelevant or redundant which when removed improve the
accuracy as well as the learning time.
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...IJNSA Journal
Intrusion Detection Systems (IDS) form a key part of system defence, where it identifies abnormal
activities happening in a computer system. In recent years different soft computing based techniques have
been proposed for the development of IDS. On the other hand, intrusion detection is not yet a perfect
technology. This has provided an opportunity for data mining to make quite a lot of important
contributions in the field of intrusion detection. In this paper we have proposed a new hybrid technique
by utilizing data mining techniques such as fuzzy C means clustering, Fuzzy neural network / Neurofuzzy and radial basis function(RBF) SVM for fortification of the intrusion detection system. The
proposed technique has five major steps in which, first step is to perform the relevance analysis, and then
input data is clustered using Fuzzy C-means clustering. After that, neuro-fuzzy is trained, such that each
of the data point is trained with the corresponding neuro-fuzzy classifier associated with the cluster.
Subsequently, a vector for SVM classification is formed and in the last step, classification using RBF-
SVM is performed to detect intrusion has happened or not. Data set used is the KDD cup 1999 dataset
and we have used precision, recall, F-measure and accuracy as the evaluation metrics parameters. Our
technique could achieve better accuracy for all types of intrusions. The results of proposed technique are
compared with the other existing techniques. These comparisons proved the effectiveness of our
technique.
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...IJMER
Enormous studies on intrusion detection have widely applied data mining techniques to
finding out the useful knowledge automatically from large amount of databases, while few studies have
proposed classification data mining approaches. In an actual risk assessment process, the discovery of
intrusion detection prediction knowledge from experts is still regarded as an important task because
experts’ predictions depend on their subjectivity. Traditional statistical techniques and artificial
intelligence techniques are commonly used to solve this classification decision making. This paper
proposes an ant-miner based data mining method for discovering network intrusion detection rules from
large dataset. The obtained result of this experiment shows that clearly the ant-miner is superior than
ID3, J48, ADtree, BFtree, Simple cart. Although different classification models have been developed for
network intrusion detection, each of them has its strength and weakness, including the most commonly
applied Support Vector Machine(SVM)method and the clustering based on Self Organized Ant Colony
Network (CSOACN).Our algorithm is implemented and evaluated using a standard bench mark KDD99
dataset. Experiments show that ant-miner algorithm out performs than other methods in terms of both
classification rate and accuracy
COPYRIGHTThis thesis is copyright materials protected under the .docxvoversbyobersby
COPYRIGHT
This thesis is copyright materials protected under the Berne Convection, the copyright Act 1999 and other international and national enactments in that behalf, on intellectual property. It may not be reproduced by any means in full or in part except for short extracts in fair dealing so for research or private study, critical scholarly review or discourse with acknowledgment, with written permission of the Dean School of Graduate Studies on behalf of both the author and XXX XXX University.ABSTRACT
With Fast growing internet world the risk of intrusion has also increased, as a result Intrusion Detection System (IDS) is the admired key research field. IDS are used to identify any suspicious activity or patterns in the network or machine, which endeavors the security features or compromise the machine. IDS majorly use all the features of the data. It is a keen observation that all the features are not of equal relevance for the detection of attacks. Moreover every feature does not contribute in enhancing the system performance significantly. The main aim of the work done is to develop an efficient denial of service network intrusion classification model. The specific objectives included: to analyse existing literature in intrusion detection systems; what are the techniques used to model IDS, types of network attacks, performance of various machine learning tools, how are network intrusion detection systems assessed; to find out top network traffic attributes that can be used to model denial of service intrusion detection; to develop a machine learning model for detection of denial of service network intrusion.Methods: The research design was experimental and data was collected by simulation using NSL-KDD dataset. By implementing Correlation Feature Selection (CFS) mechanism using three search algorithms, a smallest set of features is selected with all the features that are selected very frequently. Findings: The smallest subset of features chosen is the most nominal among all the feature subset found. Further, the performances using Artificial neural networks(ANN), decision trees, Support Vector Machines (SVM) and K-Nearest Neighbour (KNN) classifiers is compared for 7 subsets found by filter model and 41 attributes. Results: The outcome indicates a remarkable improvement in the performance metrics used for comparison of the two classifiers. The results show that using 17/18 selected features improves DOS types classification accuracies as compared to using the 41 features in the NSL-KDD dataset. It was further observed that using an ensemble of three classifiers with decision fusion performs better as compared to using a single classifier for DOS type’s classification. Among machine learning tools experimented, ANN achieved best classification accuracies followed by SVM and DT. KNN registered the lowest classification accuracies. Application: The proposed work with such an improved detection rate and lesser classification time and lar.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Intrusion Detection System (IDS) Development Using Tree-Based Machine Learnin...IJCNCJournal
The paper proposes a two-phase classification method for detecting anomalies in network traffic, aiming to tackle the challenges of imbalance and feature selection. The study uses Information Gain to select relevant features and evaluates its performance on the CICIDS-2018 dataset with various classifiers. Results indicate that the ensemble classifier achieved the highest accuracy, precision, and recall. The proposed method addresses challenges in intrusion detection and highlights the effectiveness of ensemble classifiers in improving anomaly detection accuracy. Also, the quantity of pertinent characteristics chosen by Information Gain has a considerable impact on the F1-score and detection accuracy. Specifically, the Ensemble Learning achieved the highest accuracy of 98.36% and F1-score of 97.98% using the relevant selected features.
Intrusion Detection System(IDS) Development Using Tree-Based Machine Learning...IJCNCJournal
The paper proposes a two-phase classification method for detecting anomalies in network traffic, aiming to tackle the challenges of imbalance and feature selection. The study uses Information Gain to select relevant features and evaluates its performance on the CICIDS-2018 dataset with various classifiers. Results indicate that the ensemble classifier achieved the highest accuracy, precision, and recall. The proposed method addresses challenges in intrusion detection and highlights the effectiveness of ensemble classifiers in improving anomaly detection accuracy. Also, the quantity of pertinent characteristics chosen by Information Gain has a considerable impact on the F1-score and detection accuracy. Specifically, the Ensemble Learning achieved the highest accuracy of 98.36% and F1-score of 97.98% using the relevant selected features.
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IJNSA Journal
With the ever increasing number and diverse type of attacks, including new and previously unseen attacks, the effectiveness of an Intrusion Detection System is very important. Hence there is high demand to reduce the threat level in networks to ensure the data and services offered by them to be more secure. In this paper we developed an effective test suite for improving the efficiency and accuracy of an intrusion detection system using the layered CRFs. We set up different types of checks at multiple levels in each layer. Our framework examines various attributes at every layer in order to effectively identify any breach of security. Once the attack is detected, it is intimated through mobile phone to the system administrator for safeguarding the server system. We established experimentally that the layered CRFs can thus be more effective in detecting intrusions when compared with the other previously known techniques.
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
Cloud computing has high applicability as an Internet based service that relies on sharing computing resources. Cloud computing provides services that are Infrastructure based, Platform based and Software based. The popularity of this technology is due to its superb performance, high level of computing ability, low cost of services, scalability, availability and flexibility. The obtainability and openness of data in cloud environment make it vulnerable to the world of cyber-attacks. To detect the attacks Intrusion Detection System is used, that can identify the attacks and ensure information security. Such a coherent and proficient Intrusion Detection System is proposed in this paper to achieve higher certainty levels regarding safety in cloud environment. In this paper, the mating behavior of peafowl is incorporated into an optimization algorithm which in turn is used as a feature selection algorithm. The algorithm is used to reduce the huge size of cloud data so that the IDS can work efficiently on the cloud to detect intrusions. The proposed model has been experimented with NSL-KDD dataset as well as Kyoto dataset and have proved to be a better as well as an efficient IDS.
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
Cloud computing has high applicability as an Internet based service that relies on sharing computing resources. Cloud computing provides services that are Infrastructure based, Platform based and Software based. The popularity of this technology is due to its superb performance, high level of computing ability, low cost of services, scalability, availability and flexibility. The obtainability and openness of data in cloud environment make it vulnerable to the world of cyber-attacks. To detect the attacks Intrusion Detection System is used, that can identify the attacks and ensure information security. Such a coherent and proficient Intrusion Detection System is proposed in this paper to achieve higher certainty levels regarding safety in cloud environment. In this paper, the mating behavior of peafowl is incorporated into an optimization algorithm which in turn is used as a feature selection algorithm. The algorithm is used to reduce the huge size of cloud data so that the IDS can work efficiently on the cloud to detect intrusions. The proposed model has been experimented with NSL-KDD dataset as well as Kyoto dataset and have proved to be a better as well as an efficient IDS.
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
Abstract
Nowadays the security methods from password protected access up to firewalls which are used to secure the data as well as the networks from attackers. Several times these types of security methods are not enough to protect data. We can consider the use of Intrusion Detection Systems (IDS) is the one way to secure the data on critical systems. Most of the research work is going on the effectiveness and exactness of the intrusion detection, but these attempts are for the detection of the intrusions at the operating system and network level only. It is unable to detect the unexpected behavior of systems due to malicious transactions in databases. The method used for spotting any interferes on the information in the form of database known as database intrusion detection. It relies on enlisting the execution of a transaction. After that, if the recognized pattern is aside from those regular patterns actual is considered as an intrusion. But the identified problem with this process is that the accuracy algorithm which is used may not identify entire patterns. This type of challenges can affect in two ways. 1) Missing of the database with regular patterns. 2) The detection process neglects some new patterns. Therefore we proposed sequential data mining method by using new Modified Apriori Algorithm. The algorithm upturns the accurateness and rate of pattern detection by the process. The Apriori algorithm with modifications is used in the proposed model.
Keywords — Anomaly Detection, Modified Apriori Algorithm, Misuse detection, Sequential Pattern Mining
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
Abstract
Nowadays the security methods from password protected access up to firewalls which are used to secure the data as well as the networks from attackers. Several times these types of security methods are not enough to protect data. We can consider the use of Intrusion Detection Systems (IDS) is the one way to secure the data on critical systems. Most of the research work is going on the effectiveness and exactness of the intrusion detection, but these attempts are for the detection of the intrusions at the operating system and network level only. It is unable to detect the unexpected behavior of systems due to malicious transactions in databases. The method used for spotting any interferes on the information in the form of database known as database intrusion detection. It relies on enlisting the execution of a transaction. After that, if the recognized pattern is aside from those regular patterns actual is considered as an intrusion. But the identified problem with this process is that the accuracy algorithm which is used may not identify entire patterns. This type of challenges can affect in two ways. 1) Missing of the database with regular patterns. 2) The detection process neglects some new patterns. Therefore we proposed sequential data mining method by using new Modified Apriori Algorithm. The algorithm upturns the accurateness and rate of pattern detection by the process. The Apriori algorithm with modifications is used in the proposed model.
Similar to Data Mining Techniques for Providing Network Security through Intrusion Detection Systems: a Survey (20)
Super Capacitor Electronic Circuit Design for Wireless ChargingIJAAS Team
Keeping time as base, a gadget has been proposed, where electrical accessories like Mobiles are charged within a fraction of minutes which is highly efficient and time saver as compared to the present time chargers which take nearly two hours to get fully charged. Objective of this project is to create a circuit which will be charged quickly and wireless. Wireless charging circuit works on the principle of inductive coupling. AC energy has been converted to DC energy through diode rectifier. Oscillator circuit produces high frequency passed by transmitter circuit to transmit magnetic field which is received by receiver circuit. A wireless charging concept with super capacitor will lead to faster charging and long operative life. Here super capacitor is used as a storage device. A Super capacitor has magnificent property, it can charge as well as discharge very quickly and linearly alike battery. The main difference between battery and super capacitor is specific energy, Super capacitor have 10-50 time less than battery.
On the High Dimentional Information Processing in Quaternionic Domain and its...IJAAS Team
There are various high dimensional engineering and scientific applications in communication, control, robotics, computer vision, biometrics, etc.; where researchers are facing problem to design an intelligent and robust neural system which can process higher dimensional information efficiently. The conventional real-valued neural networks are tried to solve the problem associated with high dimensional parameters, but the required network structure possesses high complexity and are very time consuming and weak to noise. These networks are also not able to learn magnitude and phase values simultaneously in space. The quaternion is the number, which possesses the magnitude in all four directions and phase information is embedded within it. This paper presents a well generalized learning machine with a quaternionic domain neural network that can finely process magnitude and phase information of high dimension data without any hassle. The learning and generalization capability of the proposed learning machine is presented through a wide spectrum of simulations which demonstrate the significance of the work.
Using FPGA Design and HIL Algorithm Simulation to Control Visual ServoingIJAAS Team
This is a novel research paper provides an optimal solution for object tracking using visual servoing control system with programmable gate array technology to realize the visual controller. The controller takes in account the robot dynamics to generate the joint torques directly for performing the tasks related to object tracking using visual servoing. Also, the notion of dynamic perceptibility provides the capability of the designed system to track desired objects employing direct visual servoing technique. This idea is assimilated in the suggested controller and realized in the programmable gate array. Additionally, this paper grants an ideal control framework for direct visual servoing robots that incorporates dynamic perceptibility features. With the aim of evaluating the proposed FPGA based architecture, the control algorithm is applied to Hardware-in-the-loop simulation (HIL) set up of three degrees of freedom rigid robotic manipulator with three links. Furthermore, different investigations are performed to demonstrate the behavior of the proposed system when a trajectory adjacent to a singularity is attained.
Mitigation of Selfish Node Attacks In Autoconfiguration of MANETsIJAAS Team
Mobile ad-hoc networks (MANETs) are composed of mobile nodes connected by wireless links without using any pre-existent infrastructure. Hence the assigning of unique IP address to the incoming node becomes difficult. There are various dynamic auto configuration protocols available to assign IP address to the incoming nodes including grid based protocol which assigns IP address with less delay and low protocol overhead. Such protocols get affected by presence of either selfish nodes or malicious nodes. Moreover there is no centralized approach to defend against these threats like in wired network such as firewall, intrusion detection system, proxy etc. The selfish nodes are the nodes which receive packet destined to it and drop packet destined to other nodes in order to save its energy and resources. This behavior of nodes affects normal functioning of auto configuration protocol. Many algorithms are available to isolate selfish nodes but they do not deal with presence of false alarm and protocol overhead. And also there are certain algorithms which use complex formulae and tedious mathematical calculations. The proposed algorithm in this paper helps to overcome the attack of selfish nodes effect in an efficient and scalable address auto configuration protocol that automatically configures a network by assigning unique IP addresses to all nodes with a very low protocol overhead, minimal address acquisition delay and computational overhead.
Vision Based Approach to Sign Language RecognitionIJAAS Team
We propose an algorithm for automatically recognizing some certain amount of gestures from hand movements to help deaf and dumb and hard hearing people. Hand gesture recognition is quite a challenging problem in its form. We have considered a fixed set of manual commands and a specific environment, and develop a effective, procedure for gesture recognition. Our approach contains steps for segmenting the hand region, locating the fingers, and finally classifying the gesture which in general terms means detecting, tracking and recognising. The algorithm is non-changing to rotations, translations and scale of the hand. We will be demonstrating the effectiveness of the technique on real imagery.
Design and Analysis of an Improved Nucleotide Sequences Compression Algorithm...IJAAS Team
DNA (deoxyribonucleic acid), is the hereditary material in humans and almost all other organisms. Nearly every cell in a person’s body has the same DNA. The information in DNA is stored as a code made up of four chemical bases: adenine (A), guanine (G), cytosine (C), and thymine (T). With continuous technology development and growth of sequencing data, large amount of biological data is generated. This large amount of generated data causes difficulty to store, analyse and process DNA sequences. So there is a wide need of reducing the size, for this reason, DNA Compression is employed to reduce the size of DNA sequence. Therefore there is a huge need of compressing the DNA sequence. In this paper, we have proposed an efficient and fast DNA sequence compression algorithm based on differential direct coding and variable look up table (LUT).
Review: Dual Band Microstrip Antennas for Wireless ApplicationsIJAAS Team
In this manuscript, a review of dual band microstrip antennas for wireless communication is presented. This review manuscript discusses regarding the geometric structures, different methods of analysis for antenna characteristics, and different types of wireless applications.
Building Fault Tolerance Within Wsn-A Topology ModelIJAAS Team
Wireless Sensor network plays a crucial role which helps in visualizing, processing, and analyzing the information wirelessly. WSN is a network which consists of huge amount of sensor devices which are of low cost and low powered also known as sensor nodes. These type of networks are generally used in real time applications such as monitoring of environmental conditions, militaries, industries etc., .but the problem that exists in WSN is may be due to different failures such as node failure, link failure, sink failure, interference, power dissipation and collision. If these faults are unable to handle then the desired network criteria’s may not be reached properly which results in inefficiency of the network. So, the main idea behind the investigation is to form a different networking topology which works in the event of failure.
Simplified Space Vector Pulse Width Modulation Based on Switching Schemes wit...IJAAS Team
This paper presents a simplified control strategy of SVPWM with a three segment switching sequence and 7 segment switch frequency for high power multilevel inverter. In the proposed method, the inverter switching sequences are optimized for minimization of device switching sequence frequency and improvement of harmonic spectrum by using the three most derived switching states and one suitable redundant state for each space vector. The proposed 3-segment sequence is compared with conventional 7-segment sequence similar for five level Cascaded H-Bridge inverter with various values of switching frequencies including very low frequency. The output spectrum of the proposed sequence design shows the reduction of device switching frequency and states current and line voltage. THD this minimizing the filter size requirement of the inverter, employed in industrial applications. Where sinusoidal output voltage is required.
An Examination of the Impact of Power Sector Reform on Manufacturing and Serv...IJAAS Team
The main objective of this study is to empirically examine the impact of Power Sector Reform on Manufacturing and Services Sector in Nigeria between 1999-2016. The study employed secondary annual time series data sourced from World Bank database (2016). The methodology adopted for the study was Augmented Dickey-Fuller (ADF); a test for long-run relationship using ARDL Bounds Testing approach with analysis of long-run and shortrun dynamics in the model. A striking revelation from the study is the inverse relationship that exists between manufacturing output and electricity consumption in Nigeria within the period referenced. This negative relationship is not unconnected with widespread allegation of misappropriation of budgeted funds for the Power Sector by successive administrations in Nigeria since 1999. It must be stated in clear terms that constant and consistent electricity generation, transmission and distribution is sine-qua-none for the growth of the national economy. Virtually all sectors of the economy depend on the supply of electricity to do business and so the lack of this vital ingredient of growth contributes in no small measure in stagnating economic growth and development. Efforts at reforming the power sector can only be fruitful when ALL stakeholders in the power sector including the political class put away their personal agendas and take the bull by the horn towards rescuing the nation from the looming danger of stagnant economic growth. Furthermore, there is the need for the Nigerian government to come up with new, better and alternative ways of improving energy generation and supply, as well as proper maintenance of electricity infrastructure in the country.
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceIJAAS Team
Mobility management is one of the most important challenges in Next
Generation Wireless Networks (NGWNs) as it enables users to move across
geographic boundaries of wireless networks. Nowadays, mobile
communications have heterogeneous wireless networks offering variable
coverage and Quality of Service (QoS). The availability of alternatives
generates a problem of occurrence of unnecessary handoff that results in
wastage of network resources. To avoid this, an efficient algorithm needs to
be developed to minimize the unnecessary handoffs. Conventionally,
whenever Wireless Local Area Network (WLAN) connectivity is available,
the mobile node switch from cellular network to wireless local area network
to gain maximum use of high bandwidth and low cost of wireless local area
network as much as possible. But to maintain call quality and minimum
number of call failure, a considerable proportion of these handovers should
be determined. Our algorithm makes the handoff to wireless local area
network only when the Predicted Received Signal Strength (PRSS) falls
below a threshold value and travelling distance inside the wireless local area
network is larger than a threshold distance.Through MATLAB simulation,
we show that our algorithm is able to improve handover performance.
The Combination of Steganography and Cryptography for Medical Image ApplicationsIJAAS Team
To give more security for the biomedical images for the patient betterment as well privacy for the patient highly confidently patient image report can be placed in database. If unknown persons like hospital staffs, relatives and third parties like intruder trying to see the report it has in the form of hidden state in another image. The patient detail like MRI image has been converted into any form of steganography. Then, encrypt those image by using proposed cryptography algorithm and place in the database.
Physical Properties and Compressive Strength of Zinc Oxide Nanopowder as a Po...IJAAS Team
In this study, the application of nanotechnology was applied in the dentistry field, especially in the innovation of dental amalgam material. To date, mercury (Hg) has been used widely as dental amalgam material with consideration of the cheap price, ease of use, and good mechanical strength. However, last few years, many problems have been faced in the dentistry field due to the use of mercury. Hence, new material is needed as an innovation to eliminate the mercury from dental amalgam composition. This research was conducted to analyze the physical properties and compressive strength of zinc oxide (ZnO) nanopowder as a potential dental amalgam material. The physical properties such as morphology and dimensions were analyzed by SEM and XRD. Further, the compression test was conducted by using hydraulic press machine. The results showed that the ZnO nanopowder analyzed has the particle size of 14.34 nm with the morphology classified as nanorods type. On the compression load of 500 kg, the average of ZnO green density is 3.170 g/cm3. This value experienced the increase of 4.763% when the load was set to 1000 kg, and 7.539% at 2000 kg. The dwelling time also took the same effect. At 30 seconds, the average of ZnO green density is 3.260 g/cm3. This value experienced the increase of 0.583% at 60 seconds and 3.098% at 90 seconds.
Experimental and Modeling Dynamic Study of the Indirect Solar Water Heater: A...IJAAS Team
The Indirect Solar Water Heater System (SWHS) with Forced Circulation is modeled by proposing a theoretical dynamic multi-node model. The SWHS, which works with a 1,91 m2 PFC and 300 L storage tank, and it is equipped with available forced circulation scale system fitted with an automated subsystem that controlled hot water, is what the experimental setup consisted of. The system, which 100% heated water by only using solar energy. The experimental weather conditions are measured every one minute. The experiments validation steps were performed for two periods, the first one concern the cloudy days in December, the second for the sunny days in May; the average deviations between the predicted and the experimental values is 2 %, 5 % for the water temperature output and for the useful energy are 4 %, 9 % respectively for the both typical days, which is very satisfied. The thermal efficiency was determined experimentally and theoretically and shown to agree well with the EN12975 standard for the flow rate between 0,02 kg/s and 0,2kg/s.
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...IJAAS Team
We can find the simultaneous monitoring of thousands of genes in parallel Microarray technology. As per these measurements, microarray technology have proven powerful in gene expression profiling for discovering new types of diseases and for predicting the type of a disease. Gridding, Intensity extraction, Enhancement and Segmentation are important steps in microarray image analysis. This paper gives simple linear iterative clustering (SLIC) based self organizing maps (SOM) algorithm for segmentation of microarray image. The clusters of pixels which share similar features are called Superpixels, thus they can be used as mid-level units to decrease the computational cost in many vision applications. The proposed algorithm utilizes superpixels as clustering objects instead of pixels. The qualitative and quantitative analysis shows that the proposed method produces better segmentation quality than k-means, fuzzy cmeans and self organizing maps clustering methods.
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc NetworkIJAAS Team
Congestion problem and packet delivery related issues in the vehicular ad hoc network environment is a widely researched problem in recent years. Many network designers utilize various algorithms for the design of ad hoc networks and compare their results with the existing approaches. The design of efficient network protocol is a major challenge in vehicular ad hoc network which utilizes the value of GPS and other parameters associated with the vehicles. In this paper GPSR protocol is improved and compared with the existing GPSR protocol and AODV protocol on the basis of various performance parameters like throughput of the network, delay and packet delivery ratio. The results also validate the performance of the proposed approach.
A Novel CAZAC Sequence Based Timing Synchronization Scheme for OFDM SystemIJAAS Team
Several classical timing synchronization schemes have been proposed for the timing synchronization in OFDM systems based on the correlation between identical parts of OFDM symbol. These schemes show poor performance due to the presence of plateau and significant side lobe. In this paper we present a timing synchronization schemes with timing metric based on a Constant Amplitude Zero Auto Correlation (CAZAC) sequence. The performance of the proposed timing synchronization scheme is better than the classical techniques.
Workload Aware Incremental Repartitioning of NoSQL for Online Transactional P...IJAAS Team
Numerous applications are deployed on the web with the increasing popularity of internet. The applications include, 1) Banking applications, 2) Gaming applications, 3) E-commerce web applications. Different applications reply on OLTP (Online Transaction Processing) systems. OLTP systems need to be scalable and require fast response. Today modern web applications generate huge amount of the data which one particular machine and Relational databases cannot handle. The E-Commerce applications are facing the challenge of improving the scalability of the system. Data partitioning technique is used to improve the scalability of the system. The data is distributed among the different machines which results in increasing number of transactions. The work-load aware incremental repartitioning approach is used to balance the load among the partitions and to reduce the number of transactions that are distributed in nature. Hyper Graph Representation technique is used to represent the entire transactional workload in graph form. In this technique, frequently used items are collected and Grouped by using Fuzzy C-means Clustering Algorithm. Tuple Classification and Migration Algorithm is used for mapping clusters to partitions and after that tuples are migrated efficiently.
A Fusion Based Visibility Enhancement of Single Underwater Hazy ImageIJAAS Team
Underwater images are prone to contrast loss, limited visibility, and undesirable color cast. For underwater computer vision and pattern recognition algorithms, these images need to be pre-processed. We have addressed a novel solution to this problem by proposing fully automated underwater image dehazing using multimodal DWT fusion. Inputs for the combinational image fusion scheme are derived from Singular Value Decomposition (SVD) and Discrete Wavelet Transform (DWT) for contrast enhancement in HSV color space and color constancy using Shades of Gray algorithm respectively. To appraise the work conducted, the visual and quantitative analysis is performed. The restored images demonstrate improved contrast and effective enhancement in overall image quality and visibility. The proposed algorithm performs on par with the recent underwater dehazing techniques.
Graph Based Workload Driven Partitioning System by Using MongoDBIJAAS Team
The web applications and websites of the enterprises are accessed by a huge number of users with the expectation of reliability and high availability. Social networking sites are generating the data exponentially large amount of data. It is a challenging task to store data efficiently. SQL and NoSQL are mostly used to store data. As RDBMS cannot handle the unstructured data and huge volume of data, so NoSQL is better choice for web applications. Graph database is one of the efficient ways to store data in NoSQL. Graph database allows us to store data in the form of relation. In Graph representation each tuple is represented by node and the relationship is represented by edge. But, to handle the exponentially growth of data into a single server might decrease the performance and increases the response time. Data partitioning is a good choice to maintain a moderate performance even the workload increases. There are many data partitioning techniques like Range, Hash and Round robin but they are not efficient for the small transactions that access a less number of tuples. NoSQL data stores provide scalability and availability by using various partitioning methods. To access the Scalability, Graph partitioning is an efficient way that can be easily represent and process that data. To balance the load data are partitioned horizontally and allocate data across the geographical available data stores. If the partitions are not formed properly result becomes expensive distributed transactions in terms of response time. So the partitioning of the tuple should be based on relation. In proposed system, Schism technique is used for partitioning the Graph. Schism is a workload aware graph partitioning technique. After partitioning the related tuples should come into a single partition. The individual node from the graph is mapped to the unique partition. The overall aim of Graph partitioning is to maintain nodes onto different distributed partition so that related data come onto the same cluster.
What is greenhouse gasses and how many gasses are there to affect the Earth.moosaasad1975
What are greenhouse gasses how they affect the earth and its environment what is the future of the environment and earth how the weather and the climate effects.
Professional air quality monitoring systems provide immediate, on-site data for analysis, compliance, and decision-making.
Monitor common gases, weather parameters, particulates.
This presentation explores a brief idea about the structural and functional attributes of nucleotides, the structure and function of genetic materials along with the impact of UV rays and pH upon them.
Seminar of U.V. Spectroscopy by SAMIR PANDASAMIR PANDA
Spectroscopy is a branch of science dealing the study of interaction of electromagnetic radiation with matter.
Ultraviolet-visible spectroscopy refers to absorption spectroscopy or reflect spectroscopy in the UV-VIS spectral region.
Ultraviolet-visible spectroscopy is an analytical method that can measure the amount of light received by the analyte.
Multi-source connectivity as the driver of solar wind variability in the heli...Sérgio Sacani
The ambient solar wind that flls the heliosphere originates from multiple
sources in the solar corona and is highly structured. It is often described
as high-speed, relatively homogeneous, plasma streams from coronal
holes and slow-speed, highly variable, streams whose source regions are
under debate. A key goal of ESA/NASA’s Solar Orbiter mission is to identify
solar wind sources and understand what drives the complexity seen in the
heliosphere. By combining magnetic feld modelling and spectroscopic
techniques with high-resolution observations and measurements, we show
that the solar wind variability detected in situ by Solar Orbiter in March
2022 is driven by spatio-temporal changes in the magnetic connectivity to
multiple sources in the solar atmosphere. The magnetic feld footpoints
connected to the spacecraft moved from the boundaries of a coronal hole
to one active region (12961) and then across to another region (12957). This
is refected in the in situ measurements, which show the transition from fast
to highly Alfvénic then to slow solar wind that is disrupted by the arrival of
a coronal mass ejection. Our results describe solar wind variability at 0.5 au
but are applicable to near-Earth observatories.
This pdf is about the Schizophrenia.
For more details visit on YouTube; @SELF-EXPLANATORY;
https://www.youtube.com/channel/UCAiarMZDNhe1A3Rnpr_WkzA/videos
Thanks...!
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...Scintica Instrumentation
Intravital microscopy (IVM) is a powerful tool utilized to study cellular behavior over time and space in vivo. Much of our understanding of cell biology has been accomplished using various in vitro and ex vivo methods; however, these studies do not necessarily reflect the natural dynamics of biological processes. Unlike traditional cell culture or fixed tissue imaging, IVM allows for the ultra-fast high-resolution imaging of cellular processes over time and space and were studied in its natural environment. Real-time visualization of biological processes in the context of an intact organism helps maintain physiological relevance and provide insights into the progression of disease, response to treatments or developmental processes.
In this webinar we give an overview of advanced applications of the IVM system in preclinical research. IVIM technology is a provider of all-in-one intravital microscopy systems and solutions optimized for in vivo imaging of live animal models at sub-micron resolution. The system’s unique features and user-friendly software enables researchers to probe fast dynamic biological processes such as immune cell tracking, cell-cell interaction as well as vascularization and tumor metastasis with exceptional detail. This webinar will also give an overview of IVM being utilized in drug development, offering a view into the intricate interaction between drugs/nanoparticles and tissues in vivo and allows for the evaluation of therapeutic intervention in a variety of tissues and organs. This interdisciplinary collaboration continues to drive the advancements of novel therapeutic strategies.
2. ISSN: 2252-8814
IJAAS Vol. 7, No. 1, March 2018: 7 – 12
8
and also by learning the environment, the actions to be performed are computed by the intelligent IDS on that
environment [1]. The regular network service is disrupted by transmitting the large amount of data to execute
a lower level denial of service attacks. To cause a denial of service attack to the user, the receiver’s network
connectivity was overwhelmed by creating a specific service request or by sending a large amount of data.
The initiation of attack was done by a single sender or the compromised hosts by the attacker and from the
latter variant will identify the Distributed Denial of Service (DDoS) [3]. The IDS work same as the
Transparent Intrusion Detection System (TIDS) and for the non-distributed attacks the functionality to
prevent the attack are provided. The scalability of the traffic processor is achieved by the load balancing
algorithm and the system security is achieved by the transparency of nodes. The methodology of anomaly-
based attack detection is used in high speed network to detect DDoS attacks, in this method the SDN
components are coupled with traffic processor [3].
Among many cyber threats Botnet attack was one the most severe cyber threat. In this attack
botmaster is a controlling computer that compromised and remote controlled. Huge numbers of bots were
spread over the internet and the botmaster uses the botnet by maintaining under its control. The botnet was
used for various purposes by the botmaster, in that few are launching and performing of distributed cyber
attacks and computational tasks. The IDS built for botnets are rule based and performance dependant. By
examining the network traffic and comparing with known botnet signature the botnet was found in a rule-
based botnet IDS. However, keeping these rules updated in the increasing network traffic is more tedious,
difficult and time-consuming [4]. Machine-learning (ML) technique is a technique used to automate botnet
detection process. From previously known attack signatures a model was built by the learning system. The
features like flexibility, adaptability and automated-learning ability of ML is significantly better than the
rule-based IDSs. High computational cost is needed for the machine learning based approaches [4].
In this paper, we have discussed about the various types of Intrusion Detection Systems which are
used data mining techniques. Rest of this paper is organized as follows: Section 2 provides the related works
in this direction. Section 3 shows the comparative analysis. Section 4 suggests new ideas to improve the
performance of the existing systems. Section 5 concludes the paper.
2. RELATED WORKS
This section is classified into two major subsections for feature selection and classification
techniques which are proposed in this direction in the past.
2.1. Related Works on Feature Selection Methods
Feature selection was the most famous technique for dimensionality reduction. In this the relevant
features is of detected and the irrelevant ones are discarded [5]. From the entire dataset the process of
selecting a feature subset for further processing was proceeded in feature selection [6]. Feature selection
methods are classified into two types, individual evaluation and subset evaluation. According to their degrees
of importance feature ranking methods estimate features and allot weights for them. In contrast, build on a
some search method subset evaluation methods select candidate feature [4].Feature selection methods is
divided into three methods they are wrappers methods, filters methods and embedded methods [5]. An
intelligent conditional random field-based feature selection algorithm has been proposed in [7] for effective
feature selection. This will be helpful for improving the classification accuracy.
In wrapper method optimization of a predictor is involved as a segment of the selection process,
where as in filter method selection the features with self determination of any predictor by relying on the
general characteristics of the training data is done. In embedded methods for classification machine learning
models was generally used, and then the classifier algorithm builds an optimal subset or ranking
features [5]. Wrappers method and embedded method tried to perform better but having the risk of over
fitting when the sample size is small and being very time consuming. On the other hand, filter method was
more suitable for large datasets and much faster. Comparing with wrappers and embedded methods filters
were implemented easily and has better scale up than those methods. Filter can be able to use as a
preprocessing step prior trying to other complex feature selection methods. The two metrics of the filter
methods in classification problems are correlation and mutual information, along with some other metrics of
the filter method like error probability, probabilistic distance, entropy or consistency [5]. In wrapper
approach based on specified learning algorithm it selects a feature subset with a higher prediction
performance. In embedded as similar as wrapper approach during the learning process of a specified learning
algorithm it selects the best feature subset. In the filter approach the feature subset is chosen from the original
feature space according to pre-specified evaluation criterions subset using only the dataset. In hybrid
approach combining the advantages of the wrapper approach and the filter approach it uses the individualistic
criterion and a learning algorithm to rate the candidate feature subsets [8].
3. IJAAS ISSN: 2252-8814
Data Mining Techniques for Providing Network Security through… (Prabhu Kavin B)
9
In high dimensional applications feature selection is very much important. From the number of
original features, the feature selection was the combinatorial problem and found the optimal subset was
NP-hard. While facing imbalanced data sets feature selection is very much helpful [9]. Rough set-based
approach uses attribute dependency to take away the feature selection, which was important. The dependency
measure that was necessary for the calculation of the positive region but while calculating it was an
extravagant task [6]. Depend on the particle swarm optimization (PSO) and rough sets, the positive region-
based approach has been presented. It is a superintended combined feature selection algorithm and by using
the conventional dependency, fitness function was measured for each particle is evaluated. The algorithms
figure-out the strength of the selected feature with various consolidations by selecting an attribute with a
higher dependency value. If the particle's fitness value is higher than the previous best value within the
current swarm (pbest), then the particle value is the current best (gbest). Then its fitness was compared with
the population's overall previous best fitness. The article fitness which is better will be at the position of best
feature subset. The particle velocities were updated at the last. The dependency of the decision attributes
which was on the conditional attributes was calculated by positive region based dependency measure and
only because of bottleneck for large datasets it is suitable only for smaller ones [6].
Incremental feature selection algorithm (IFSA) is mainly designed for the purpose of subset feature
selection. The starting point is the original feature subset P, in an incremental manner the new dependency
function was calculated and required feature subsets are checked. P is the new feature subset if the
dependency function P is equal to the feature subset if not it computes a new feature subset. The gradually
selected significant features were added to the feature subset. Finally, by removing the redundant features the
optimal output is ensured. Then again, the algorithm used the positive region-based dependency measure, and
to make it unsuitable for large datasets [6]. Fish Swarm algorithm was started with an initial population
(swarm) of fish for searching the food. Here every candidate solution is represented by a fish. The swarm
changes their position and communicates with each other in searching of the best local position and the best
global positions. When a fish achieved maximum strength, it loses its normal quality after obtaining the
Reduct rough set. After all of the fishes have lost it normal quality the next iteration starts. After the similar
feature reduct was obtained under three consecutive iterations or the largest iteration condition was reached,
then the algorithm halts. Then equivalent rough set-based dependency measure was used in this algorithm
and it suffers from the same problem of the large datasets performance degradation [6].
Correlation-based Feature Selection is a multivariate subset filter algorithm. A search algorithm
united with an estimation function that was used to evaluate the benefit of feature subsets.
The implementation of CFS used the forward best first search as its searching algorithm. Best first search is
one of the artificial intelligence search scenario in which backtracking was allowed along with the search
path. By making some limited adjustment to the current feature subset it moves through the search space.
This algorithm can backtrack to the earlier subset when the explored path looks unexciting and advance the
search from there on. Then the search halted, if five successive fully expanded the subsets shows no
development over the present best subset [5].
The objective of SRFS is to find the feature subset S with the size d, which contains the
representative features, in which both the labeled and unlabeled dataset are exploiting. In this the feature
relevance is classified in to three disjoint categories: strongly relevant, weakly relevant and irrelevant
features [10-12]. A strong relevant feature was always basic for an optimal or suboptimal feature subset.
If the strong relevant feature is evacuated, using the feature subset the classification ability is directly
influenced. Except for an optimal or suboptimal feature subset at certain conditions, a weak relevant feature
is not always necessary. Irrelevant feature it only enlarges search space and makes the problem more
complex, and it doesn't provide any information to improve the prediction accuracy so it is not necessary at
any time. Hence all features of strongly relevant and subset features of weakly relevant and no irrelevant
features should be included by the optimal feature subset. An in addition supervised feature selection method
that uses the bilateral information between feature and class that tend to find the optimal or suboptimal
features over fitted to the labeled data, when a small number of labeled data are available. In this case, data
mitigation may be able to occur in this problem on using unlabeled data. Therefore, relevance gain
considering feature relevance in unlabeled dataset, and propose a new framework for feature selection on
removing the irrelevant and redundant features called as Semi-supervised Representatives Feature Selection
algorithm is defined. SRFS is a semi-supervised filter feature selection based on the Markov blanket [8]
2.2. Related Works on Classification Algorithms
The combined response composed by the multiple classifiers into a single response was the
ensemble classifier. Even though many ensemble techniques exist, for a particular dataset it was hard to
found suitable ensemble configuration. Ensemble classifiers are used to maximize the certainty of several
classification tasks. Many methods have been proposed, with mean combiner, max combiner, median
4. ISSN: 2252-8814
IJAAS Vol. 7, No. 1, March 2018: 7 – 12
10
combiner, majority voting and weighed majority voting (WMV) whereas the individual classifiers can be
connected using any one of these methods [13]. To solve classification and regression problems support
vector machines (SVM) is an effective technique. SVM was the implementation of Vapnik’s Structural Risk
Minimization (SRM) principle which has comparatively low generalization error and does not suffer much
from over fitting to the training dataset. When a model performs poor and not located in the training set then
it was said to be over fit and has high generalization error [13]. Recently a significant attention was attracted
by the multi-label classification, which was motivated by more number of applications. Example include text
categorization, image classification, video classification, music categorization, gene and protein function
prediction, medical diagnosis, chemical analysis, social network mining and direct marketing and many more
examples found. To improve the classification performance by the utilization of label dependencies was the
key problem in multi-label learning and how it is motivated by which number of multi-label algorithm that
have been proposed in recent years (for extensive comparison of several methods). The progress in the MLC
in recent time was summarized. Feature space Dimensionality reduction, i.e. reducing the dimensionality of
the vector x is one of the trending challenges in MLC. The dimensionality of feature space can be very large
and this issue in practical applications is very important [14]. Many intelligent intrusion detection systems
have been discussed in [1] and also briefly described the usage of artificial intelligence and soft computing
techniques for providing network security. Moreover, a new intelligent agent based Multiclass Support
Vector Machine algorithm which is the combination of intelligent agent, decision tree and clustering is also
proposed and implemented. They proved their system was better when compared with other existing systems.
Recently, temporal features are also incorporated with fuzzy logic for making decision dynamically [15].
They achieved better classification accuracy over the real time data sets.
2.3. Related works on Clustering and Outlier Detection
Clustering techniques are very useful for enhancing the classification accuracy. Many clustering
algorithms have been used in various intrusion detection systems in the past for achieving better
performance. Clustering techniques are useful in both datasets such as network trace data and bench mark
dataset for making effective grouping [16], [17]. Outlier detection is also useful for identifying the unrelated
users in a network. This outlier detection technique is used for identifying the outliers in a network. It can be
applied in real network scenario and both datasets such as network trace dataset and the benchmark dataset.
Moreover, soft computing techniques are used in these two approaches for making final decisions over the
datasets. The existing works [18], [19] achieved better detection accuracy.
3. COMPARATIVE ANALYSIS
Most of the Intrusion Detection Systems have been used data mining techniques such as Clustering,
Outlier detection, Classification and data preprocessing. Here, data preprocessing techniques are used to
enhance the classification accuracy. Feature selection methods are used to reduce the classification time.
This paper describes various types of feature selection which are proposed in this direction in the past.
The average performance of the existing classification algorithms is 94% and it has improved into 96% when
applied data preprocessing. In addition, the average detection accuracy is reached to 99% when used
clustering or outlier detection techniques. Table 1 shows the performance comparative analysis.
Table 1. Comparative Analysis
No. Author name Method Overall Accuracy (%)
1 Srinivas Mukkamala et al [20] SVM 99.63%
2 Ganapathy et al [21] IAEMSVM 91.13%
3 Ganapathy et al [1] IREMSVM 91.26%
4 Soo-YeonJi et al [2] MLIDS 96%
5 Omar Y. Al-Jarrah et al [4] RDPLM 99.98%
6 Abdulla Amin Aburomman et al [5] KNN 91.68%
7 Abdulla Amin Aburomman et al [5] Ensemble 92.74%
8 VinodkumarDehariya et al [16] FKM 83.16%
9 UjjwalMaulik et al [16] GA-FKM 88.46%
10 ChenjieGu et al [16] IGA-FKKM 93.01%
11 Ganapathy et al [11] IGA-NWFCM 94.86%
12 J. Ross Quinlan et al [12] ID3 95.58%
13 Ernst Kretschmann et al [16] C4.5 96.19%
14 GuoliJi et al [18] MSVM 98.38%
15 Ganapathy et al [15] EMSVM 99.10%
16 Ganapathy et al [19] WDBOD 99.52%
5. IJAAS ISSN: 2252-8814
Data Mining Techniques for Providing Network Security through… (Prabhu Kavin B)
11
From Table 1, it can be seen that the performance of the method RDPLM perform well than the
existing methods and the existing classifier SVM achieved very less detection accuracy than others. This is
due to the use of various combinations of methods and the use of intelligent agents.
Figure 1 demonstrates the performance analysis in graph between the top five methods which are
proposed in the past by various researchers. Here, we have considered the same set of records for conducting
experiments for finding the classification accuracy. Classification accuracy of various methods is considered
for comparative analysis.
Figure 1. Performance analysis
From figure 1, it can be observed that the performance of the method RDPLM is performed well
when it is compared with existing methods. Moreover, the IGA-NWFCM method achieves very less
detection accuracy than the other existing algorithms which are considered for comparative analysis
4. SUGGESTION PROPOSED
The performance of the existing systems can be improved by the introduction of intelligent agents
and soft computing techniques like fuzzy logic, neural network and genetic algorithms for
effective decision over the dataset. In this fast world, time and space are also very important to take effective
decision. Finally, can introduce a new system which contains new intelligent agents, neural network for
training, effective spatio-fuzzy temporal based data preprocessing method and fuzzy temporal rules can be
used for making effective decision and also can detect attackers effectively. This combination is able to
provide better performance.
5. CONCLUSION
An effective survey made in the direction of data mining technique-based intrusion detection
systems. Many feature selection methods have been discussed in this paper and their importance are
highlighted. Classification, Clustering and outlier detection techniques are explained in this paper and also
explained how much it is helpful for enhancing the performance. Finally, suggestion also proposed in this
paper based on the comparative analysis of the existing systems.
REFERENCES
[1]. S. Ganapathy, K. Kulothungan, S. Muthurajkumar,M. Vijayalakshmi, P.Yogesh, A.Kannan, “Intelligent feature
selection and classification techniques for intrusion detection in networks : a survey”, EURASIP Wireless Journal
of Communications and Networking, vol. 2013, pp. 1–16, 2013.
[2]. S. Y. Ji, B. K. Jeong, S. Choi, and D. H. Jeong, “A multi-level intrusion detection method for abnormal network
behaviors,” J. Netw. Comput. Appl., vol. 62, pp. 9–17, 2016.
[3]. O. Joldzic, Z. Djuric, and P. Vuletic, “A transparent and scalable anomaly-based DoS detection method,” Comput.
Networks, vol. 104, pp. 27–42, 2016.
[4]. O. Y. Al-Jarrah, O. Alhussein, P. D. Yoo, S. Muhaidat, K. Taha, and K. Kim, “Data Randomization and Cluster-
Based Partitioning for Botnet Intrusion Detection,” IEEE Trans. Cybern., vol. 46, no. 8, pp. 1796–1806, 2016.
[5]. A. A. Aburomman and M. Bin Ibne Reaz, “A novel SVM-kNN-PSO ensemble method for intrusion detection
system,” Appl. Soft Comput. J., vol. 38, pp. 360–372, 2016.
[6]. P. Teisseyre, “Neurocomputing Feature ranking for multi-label classi fi cation using Markov networks,” vol. 205,
pp. 439–454, 2016.
6. ISSN: 2252-8814
IJAAS Vol. 7, No. 1, March 2018: 7 – 12
12
[7]. S Ganapathy, P Vijayakumar, P Yogesh, A Kannan, “An Intelligent CRF Based Feature Selection for Effective
Intrusion Detection”, International Arab Journal of Information Technology, vol. 16, no. 2, 2016.
[8]. V. Bolón-Canedo n, I. Porto-Díaz, N. Sánchez-Maroño, A. Alonso-Betanzos, “A framework for cost-based feature
selection,” Pattern Recognition, Elsevier, vol. 47,pp. 2481–726, 2014.
[9]. M. S. Raza and U. Qamar, “An incremental dependency calculation technique for feature selection using rough
sets,” Inf. Sci. (Ny)., vol. 343–344, pp. 41–65, 2016.
[10]. L. Yu, H. Liu, “Efficient feature selection via analysis of relevance and redundancy”, The Journal of Machine
Learning Research, vol.5, pp. 1205–1224, 2004.
[11]. G. H. John, R. Kohavi, K. Pfleger, et al., “Irrelevant features and the sub-set selection problem”, in: Machine
Learning: Proceedings of the Eleventh International Conference, pp. 121–129, 1994.
[12]. B. Grechuk, A. Molyboha, M. Zabarankin, “Maximum entropy principle with general deviation measures”,
Mathematics of Operations Research, vol.34, no. 2, pp. 445–467, 2009.
[13]. Q. Li, Z. Sun, Z. Lin, and R. He, “Author ’ s Accepted Manuscript Transformation Invariant Subspace Clustering
Reference : To appear in : Pattern Recognition,” 2016.
[14]. S. Maldonado, R. Weber, and F. Famili, “Feature selection for high-dimensional class-imbalanced data sets using
Support Vector Machines,” Inf. Sci. (Ny)., vol. 286, pp. 228–246, 2014.
[15]. S Ganapathy, R Sethukkarasi, P Yogesh, P Vijayakumar, A Kannan, “An intelligent temporal pattern classification
system using fuzzy temporal rules and particle swarm optimization”, Sadhana, vol. 39, no. 2, pp. 283-302, 2014.
[16]. S Ganapathy, K Kulothungan, P Yogesh, A Kannan, “A Novel Weighted Fuzzy C–Means Clustering Based on
Immune Genetic Algorithm for Intrusion Detection”, Procedia Engineering, vol. 38, pp. 1750-1757, 2012.
[17]. K Kulothungan, S Ganapathy, S Indra Gandhi, P Yogesh, A Kannan, “Intelligent secured fault tolerant routing in
wireless sensor networks using clustering approach”, International Journal of Soft Computing, vol. 6, no. 5, pp.
210-215, 2011.
[18]. S.Ganapathy, N.Jaisankar, P.Yogesh, A.Kannan, “ An Intelligent System for Intrusion Detection using Outlier
Detection”, 2011 International Conference on Recent Trends in Information Technology (ICRTIT), pp. 119-123,
2011.
[19]. N Jaisankar, S Ganapathy, P Yogesh, A Kannan, K Anand, “An intelligent agent based intrusion detection system
using fuzzy rough set based outlier detection”, Soft Computing Techniques in Vision Science, pp. 147-153, 2012.
[20]. A. H. Sung and S. Mukkamala, “Identifying Important Features for Intrusion Detection Using Support Vector
Machines and Neural Networks", Department of Computer Science New Mexico Institute of Mining and
Technology, pp. 3–10, 2003.
[21]. S. Ganapathy, P. Yogesh, and A. Kannan, “Intelligent Agent-Based Intrusion Detection System Using Enhanced
Multiclass SVM,” vol. 2012, 2012.