SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 451
FALSE POSITIVE REDUCTION BY COMBINING SVM AND KNN
ALGO
Sushil Kumar Mishra1
, Pankaj Bhatt2
1
PG Student, Computer Science Engineering, Graphic Era Hill University, Uttarakhand, India
2
PG Student, Computer Science Engineering, Graphic Era Hill University, Uttarakhand, India
Abstract
With the growth of information technology. There emerges many intrusion detection problem such as cyber security. Intrusion
detection system provides basic infrastructure to detect a number of attacks. This research work focuses on intrusion detection
problem of network security. The main goal is to detect network behaviour as normal or abnormal. In this research work, two
different machine learning algorithm have been combined together to reduce its weakness and takes positive feature of both
algorithm. Its experimental results generates better result than other algorithm in terms of performance, accuracy and false
positive rate. These combined algorithm has been applied on KDDCUP99 dataset to find better result by improving its
performance, accuracy and reducing its false positive rate.
Keywords: Intrusion detection system, KDDCUP99 dataset, False positive rate.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
In this century, Information security is a most menacing
problem. For handling these problem, many intrusion
detection method has been introduced but no one is perfect.
Intrusion detection system can provide protection for a
computer network from malicious files such as virus,
spyware and torjan horse. In which many computers are
interconnected. An intrusion detection system can monitor
the behaviour of all files those are coming in that computer
network. If any file is suspicious or malicious. So Intrusion
detection system can detect that malicious file or virus.
Intrusion detection system has created many clustering
based models separate normal and abnormal files. Intrusion
detection system can be used for neural network also to
provide security for computer network. Neural network first
uses trained dataset to recognize normal as well as abnormal
activity. Intrusion detection system protects a network
traffics from malicious files. It basically maintains
confidentiality and integrity of computer network. Any
unauthorized access of any personal data can not be made
possibled. So secrecy of network traffic and information
can be well maintained. Intrusion detection system can only
takes preventive majors to protect a computer network. No
intrusion detection system (IDS) is perfect to protect a
computer network. A very deep research work is going on
intrusion detection system to develop a such system that can
fully provide protection for a network traffic or a computer
network. In this research work, support vector machine
(SVM) basically creates clustering model. Which contains
normal as well as abnormal data. Which can monitor normal
as well as malicious behaviour to protect a computer
network from any malicious attack such as virus , worms,
torjan horse, rootkits attacks.
Intrusion detection system has been divided into two parts.
Fig. 1 Types of IDS
1.1 Anomaly Based Detection
Anomaly based intrusion detection system is based on a set
of heuristic rule. Which basically monitors a normal as well
as abnormal behaviour in a computer network. If any file is
self replicating in nature or trying to damage any other file,
such behaviours are detected by anomaly based detection.
The main disadvantage of anomaly based detection system
is higher false positive rate.
1.2 Signature Based Detection
Signature based intrusion detection system can detect only
known computer virus in a computer network. The computer
virus, those are discovered. Its signatures are created. These
signatures are stored in database. If any file comes in a
computer network. So its signatures are matched with all
file. If file matches with virus signature so it is declared a
computer virus otherwise a normal file. The main
disadvantage of signature based intrusion detection system
is that it can not detect a new computer virus.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 452
2. EXPERIMENTAL PARAMETERS
There are many parameters such performance, accuracy and
false positive rate, that can be calculated for intrusion
detection system.
Performance : Performance deals with achieving a target in
more efficient manner.
Performance = (True Positive)/(True Positive)+(True
Negative)
Accuracy : Accuracy deals with achieving a goal more
close to its actual value.
Accuracy = (True positive+True Negative)/(True
Positive+True Negative+False positive+False Negative).
False positive rate : Falsely detect a normal file as
abnormal file.
False positive rate =(False Positive)/(False Positive+True
Negative).
3. EVALUATION DATA SOURCES
False positive rate was calculated by the standard data set
KDDCUP99 given by the MIT laboratory. In this data set,
there are different types of attacks. Those may categorize
normal as well as abnormal data.
MIT Lincoln laboratory basically establishes a computer
network. About 7 days, monitors network traffic. Which
contains normal as well as abnormal data.
KDDCUP99 data set basically contains normal, denial of
service, buffer overflow, guess_passwd(53) and probe
attacks.
Denial of service : Denial of service (DOS) intrusion is an
intrusion. In which , legitmate information can not be make
available to legitmate receiver. DOS intrusion also slows
down computer system.
User to Root(U2R) : In this type of attack, attacker accesses
client’s password in unauthorized manner and can access
personal information or secret information from computer
system by using stolen password.
Remote to User(R2U) : In this attack, attacker can transmit
a packet over network. Which is not legitmate for that
network. Which increases network traffic. Remote to
user(R2U) can adversly affacts performance of that
computer network and can slow down computer system or
can restart a computer system again and again.
Probe : In this attack, attacker monitors all information.
Which are being sent in that network and can access it.
4. COMBINING SVM AND KNN ALGORITHM
Support vector machine(SVM) is a supervised learning
method for classification. In which, a hyperplane is created
through which a normal as well as abnormal data is
separated from each other. Support vector machine(SVM)
basically contains two phases-
1- Training phase
2- Testing phase
1-Training phase : Support vector machine(SVM) is able
to learn a huge set of pattern from dataset. In the dataset,
there are various kind of homogeneous pattern and
heterogeneous pattern of data . That can provide better
classification between normal and abnormal data.
2-Testing phase : By using training phases, Testing can be
done by support vector machine. Support vector machine
can evaluate accuracy, performance etc.
Support vector machine can evaluate false positive rate but
it generates very high false positive rate.
K nearest neighbor algorithm is basically a machine
learning algorithm. Which can be used to solve traveling
salesman problem.
By using K nearest neighbor algorithm, false positive rate
can be evaluated but it gives higher false positive rate.
Fig. 2: Intrusion detection system using CSVMKNN
Support vector machine(SVM) basically uses support
vectors to create a hyperplane. Hyperplane is used to
separate normal and abnormal data. Knn algorithm is used
to find new data added to training data set.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 453
so here, Support vector machine(SVM) and K nearest
neighbor (KNN) algorithms are combined together to
evaluate false positive rate is known as COMBINED
SUPPORT VECTOR K NEAREST NEIGHBOR
(CSVMKNN) algorithm. CSVMKNN algorithm is a
mixture of support vector machine (SVM) and K nearest
neighbor (KNN) algorithm. These two algorithm works
together in CSVMKNN algorithm. In which, support vector
machine (SVM) uses training data set to learn something
from data set. If any new is added to its dataset. so it is
updated by K nearest neighbor (KNN) algorithm.
CSVMKNN algorithm can be used as support vector
machine (SVM) and K nearest neighbor (KNN) algorithm to
evaluate false positive rate or false alarm rate. False positive
rate evaluated by using CSVMKNN algorithm, Can
produce better result. CSVMKNN algorithm is applied on
KDDCUP99 data set. This data set contains several type of
attack such as buffer overflow, Denial of service (DOS) etc.
CSVMKNN algorithm generates false positive rate. Which
is better than Support vector machine (SVM) and K nearest
neighbor (KNN) algorithm.
5. CSVMKNN ALGORITHM
Algorithm1 : SVM with KNN clustering
Input: Use training data set containing normal and
abnormal data (Class type).
Output: Generate SVM classifier.
1 start
2 select data from different class;
3 Separate normal and abnormal data by SVM classifier;
4 While number of iteration to add data to data set
5 Use support vector to create hyperplane;
6 Hyperplane separate normal and abnormal data;
7 Apply KNN clustering
8 KNN clustering classified normal and abnormal cluster.
9 If new data added to data set
10 update dataset;
11 else
12 Continues it as it;
13 end.
After this algorithm, SVM learning process is applied on
data set. Its main goal is to randomly choose data points
from KDDCUP99 data set. Hyperplane is used to separate
normal and abnormal data points. So there must be a
separate hyperplane between each training data points. So it
can provide a better selection method for each data points.
Support vector machine (SVM) training phase should be
introduced. In which. Hyperplane can allocate between
each data points. KNN clustering phase is introduced to
separate normal data and abnormal data. If new data is
added to training data set. So by using K nearest neighbor
(KNN) clustering phase, these new added data can be
updated to training data set. So these strategy is carried out
in next algorithm.
Algorithm2:
Input: Training data set (KDDCUP99).
Input: S1-Number of iteration.
Input: S2-Maximum detection rate.
Input: S3-Minimum detection rate.
Output: Support vector machine(SVM) and K nearest
neighbor (KNN) Classifier.
1 Start
2 initialize the data;
3 Let S2 is maximum detection rate, initially zero;
4 Let S3 is minimum detection rate, initially Zero
5 While S3<S2
6 initialize i=0;
7 for i=1,……..,….S1
8 Training phase :
9 Support vector machine (SVM) training phase;
10 Clustering Phase :
11 K nearest neighbor (KNN) clustering phase;
12 end
13 Use Support vector machine(SVM) Classifier;
14 Use hyperplane to separate normal and abnormal data;
15 if new data is added to data set ;
15 Use Knn algorithm to update S2;
16 Update learning process;
17 else
18 continue it as it:
19 end
20 end
The KNN clustering phase is used for better selection
strategy. False positive can be decreased by using
CSVMKNN algorithm. If new added data is declared as
normal. Otherwise, it increases its true positive rate. Which
basically adversely affacts performance and accuracy. In
SVM training phase, if new data is declared as abnormal
but in KNN clustering phase, it is declared as normal. So
such new data is declared a new kind of intrusion. In SVM
training phase, if new data is added to training data set ,
declared as normal and in KNN clustering phase, it is again
declared as normal. So such data decreases false positive
rate or false alarm rate. It increases performance and
accuracy of that machine learning algorithm.
Combined support vector machine k nearest neighbor
(CSVMKNN) algorithm basically provides better selection
strategy than support vector machine (SVM) and K nearest
neighbor (KNN) algorithm. CSVMKNN algorithm takes
positive features of support vector machine (SVM)
algorithm and K nearest neighbor (KNN) algorithm and
avoids weakness of Support vector machine (SVM)
algorithm and K nearest neighbor (KNN) algorithm.
CSVMKNN algorithm reduces false positive rate of its
algorithm by using better selection strategy and improves
performance of machine learning (CSVMKNN) algorithm.
So, CVMKNN algorithm generates lesser false positive
rate than support vector machine (SVM) algorithm and K
nearest neighbor algorithm (KNN) algorithm. CSVMKNN
algorithm can produce higher performance and accuracy
than support vector machine (SVM) and K nearest neighbor
(KNN) algorithm.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 454
6. RESULTS
Support vector machine (SVM) algorithm, KNN nearest
neighbor (KNN) algorithm and CSVMKNN algorithm are
applied on training data set (KDDCUP99). Through which ,
false positive rate can be calculated. These false positive
rate will be compared to determine. Which algorithm has
generated lesser false positive rate
Support vector machine (SVM) classifier: SVM classifier
is used to create a hyperplane between different data points
by using support vector . These hyperplane is used to
separate normal and abnormal data. On the basis of this, we
can evaluate performance, accuracy, false positive rate.
Class Normal Denial
Of
service
User
To
Root
Remote
To
User
Probe
Normal 900 7 8 1 0
Denial
Of
service
3 345 0 2 11
User
To
Root
400 0 0 0 10
Remote
To
User
345 0 41 34 0
Probe 127 100 0 10 0
Fig-3 SVM classifier
K nearest neighbor (KNN) classifier is used to discover
new data added to training data set. KNN classifier also
determines that new added data is normal or abnormal.
KNN algorithm is applied on KDDCUP99 data set to
evaluate performance, accuracy and false positive rate.
Class Normal Denial
Of
service
User
To
Root
Remote
To
User
Probe
Normal 928 1 5 0 1
Denial
Of
service
0 45 0 200 1
User
To
Root
4 3 6 5 0
Remote
To
User
0 0 412 234 15
Probe 1 4 0 0 23
Fig-4 KNN classifier
CSVMKNN classifier basically contains feature of both
algorithm support vector machine (SVM) and K nearest
neighbor (KNN) algorithm. CSVMKNN algorithm is
applied on KDDCUP99 dataset to generate its performance,
accuracy, false positive rate.
Class Normal Denial
Of
service
User
To
Root
Remote
To
User
Probe
Normal 100 0 8 9 70
Denial
Of
service
30 35 0 0 89
User
To
Root
0 0 0 50 0
Remote
To
User
0 0 0 24 0
Probe 1 4 0 0 0
Fig-5 CSVMKNN Classifier
Evaluation
Measure
SVM KNN CSVMKNN
False
positive Rate
12.00 11.00 6.00
False
Negative
Rate
26.00 6.00 0.89
Performance 8.00 9.00 14.50
Accuracy 7.50 3.50 16.00
Fig-6 Comparison of false positive rate
CSVMKNN algorithm generates lesser false positive rate
than Support vector machine (SVM) and K nearest neighbor
(KNN) algorithm.
7. CONCLUSION
In this research work, Support vector machine (SVM)
algorithm, K nearest neighbor (KNN) algorithm and
CSVMKNN algorithm have been applied on KDDCUP99
data set separately. In which CSVMKNN algorithm has
generated lower false positive rate than SVM and KNN
algorithm. CSVMKNN algorithm has enhanced
performance , accuracy and higher detection rate than other
machine learning algorithm. Still , there is area of
improvement in this algorithm until we are not getting zero
false positive rate.
REFERENCES
[1]. pgale, Robert, Sheodoor schote, rengin and
Christopher kruegel.”A Literature analysis on automated
malware analysis technique”
[2]. Pargas, Rob Jonathan jarcy, Eleazar Aguirre Anaya ,
Samon Galeana Huerta and Alba Felix Moreno
Hernandez,"Security controls for Android" In
Computational Aspects of Social Networks (CASoN), 2012
Fourth International Conference on, pp.212-216,IEEE,2012
[3]. Blasing, Thomas, Leonid Batyuk, A-D.Schmidt, Seyit
Ahmet Camtepe, and Sahin Albayrak." An android
application sandbox system for suspicious software
detection" In Malicious and Unwanted Software
(MALWARE), 2010 5th
International Conference on ,pp.
55-62 IEEE, 2010.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 455
[4]. Johnson Ryan, Zhaohui Wang , Corey Gagnon and
Angelos Stavrou." Analysis of Android Applications'
Permissions. " In Software Security and Reliability
Companion(SERE-C),2012 IEEE Sixth International
Conference on, pp. 45 - 46.IEEE,2012.
[5]. Susan M. B. and Rayford B.V. (2000). Intrusion
detection via fuzzy data mining, Proceedings of the 12th
Annual Canadian Information Technology,Ottawa, Canada,
June 19-23, 2000, PP.109-122.
[6]. A Detailed Analysis of the KDD CUP 99 Data Set,
Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A.
BIOGRAPHIES
Sushil kumar Mishra is a M.tech student
and doing research work in computer
security
Pankaj Bhatt is pursuing M.tech and
doing research work in computer security.

More Related Content

What's hot

IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET Journal
 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET Journal
 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analytics
IJNSA Journal
 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
IJNSA Journal
 
IRJET - Securing Computers from Remote Access Trojans using Deep Learning...
IRJET -  	  Securing Computers from Remote Access Trojans using Deep Learning...IRJET -  	  Securing Computers from Remote Access Trojans using Deep Learning...
IRJET - Securing Computers from Remote Access Trojans using Deep Learning...
IRJET Journal
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET Journal
 
Icacci presentation-cnn intrusion
Icacci presentation-cnn intrusionIcacci presentation-cnn intrusion
Icacci presentation-cnn intrusion
vinaykumar R
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
ijtsrd
 
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
Online Intrusion Alert Aggregation with Generative Data Stream  ModelingOnline Intrusion Alert Aggregation with Generative Data Stream  Modeling
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
IJMER
 
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET Journal
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
IJNSA Journal
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
IJNSA Journal
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
IJMER
 
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET Journal
 
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET Journal
 
Msc dare journal 1
Msc dare journal 1Msc dare journal 1
Msc dare journal 1
OluwadareOlatunji1
 
An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...
Oyeniyi Samuel
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
gerogepatton
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
ijaia
 

What's hot (20)

IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analytics
 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
 
IRJET - Securing Computers from Remote Access Trojans using Deep Learning...
IRJET -  	  Securing Computers from Remote Access Trojans using Deep Learning...IRJET -  	  Securing Computers from Remote Access Trojans using Deep Learning...
IRJET - Securing Computers from Remote Access Trojans using Deep Learning...
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
Icacci presentation-cnn intrusion
Icacci presentation-cnn intrusionIcacci presentation-cnn intrusion
Icacci presentation-cnn intrusion
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
 
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
Online Intrusion Alert Aggregation with Generative Data Stream  ModelingOnline Intrusion Alert Aggregation with Generative Data Stream  Modeling
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
 
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
 
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
 
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
 
Msc dare journal 1
Msc dare journal 1Msc dare journal 1
Msc dare journal 1
 
An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...An Investigation into the Effectiveness of Machine Learning Techniques for In...
An Investigation into the Effectiveness of Machine Learning Techniques for In...
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
 

Similar to False positive reduction by combining svm and knn algo

Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
IJNSA Journal
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
eSAT Publishing House
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
AM Publications
 
Intrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine LearningIntrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine Learning
IRJET Journal
 
NSAS: NETWORK SECURITY AWARENESS SYSTEM
NSAS: NETWORK SECURITY AWARENESS SYSTEMNSAS: NETWORK SECURITY AWARENESS SYSTEM
NSAS: NETWORK SECURITY AWARENESS SYSTEM
International Journal of Technical Research & Application
 
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection Systems
IRJET Journal
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
IRJET Journal
 
A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...
eSAT Journals
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
IRJET Journal
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET Journal
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
AM Publications
 
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
IRJET Journal
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Drjabez
 
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORKA PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
IRJET Journal
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
eSAT Publishing House
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
IJERA Editor
 
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural NetworkAlert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
IJRES Journal
 

Similar to False positive reduction by combining svm and knn algo (20)

Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
Intrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine LearningIntrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine Learning
 
NSAS: NETWORK SECURITY AWARENESS SYSTEM
NSAS: NETWORK SECURITY AWARENESS SYSTEMNSAS: NETWORK SECURITY AWARENESS SYSTEM
NSAS: NETWORK SECURITY AWARENESS SYSTEM
 
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection Systems
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
 
A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
 
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORKA PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural NetworkAlert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
eSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
eSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
eSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
eSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
eSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 

Recently uploaded (20)

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 

False positive reduction by combining svm and knn algo

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 451 FALSE POSITIVE REDUCTION BY COMBINING SVM AND KNN ALGO Sushil Kumar Mishra1 , Pankaj Bhatt2 1 PG Student, Computer Science Engineering, Graphic Era Hill University, Uttarakhand, India 2 PG Student, Computer Science Engineering, Graphic Era Hill University, Uttarakhand, India Abstract With the growth of information technology. There emerges many intrusion detection problem such as cyber security. Intrusion detection system provides basic infrastructure to detect a number of attacks. This research work focuses on intrusion detection problem of network security. The main goal is to detect network behaviour as normal or abnormal. In this research work, two different machine learning algorithm have been combined together to reduce its weakness and takes positive feature of both algorithm. Its experimental results generates better result than other algorithm in terms of performance, accuracy and false positive rate. These combined algorithm has been applied on KDDCUP99 dataset to find better result by improving its performance, accuracy and reducing its false positive rate. Keywords: Intrusion detection system, KDDCUP99 dataset, False positive rate. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION In this century, Information security is a most menacing problem. For handling these problem, many intrusion detection method has been introduced but no one is perfect. Intrusion detection system can provide protection for a computer network from malicious files such as virus, spyware and torjan horse. In which many computers are interconnected. An intrusion detection system can monitor the behaviour of all files those are coming in that computer network. If any file is suspicious or malicious. So Intrusion detection system can detect that malicious file or virus. Intrusion detection system has created many clustering based models separate normal and abnormal files. Intrusion detection system can be used for neural network also to provide security for computer network. Neural network first uses trained dataset to recognize normal as well as abnormal activity. Intrusion detection system protects a network traffics from malicious files. It basically maintains confidentiality and integrity of computer network. Any unauthorized access of any personal data can not be made possibled. So secrecy of network traffic and information can be well maintained. Intrusion detection system can only takes preventive majors to protect a computer network. No intrusion detection system (IDS) is perfect to protect a computer network. A very deep research work is going on intrusion detection system to develop a such system that can fully provide protection for a network traffic or a computer network. In this research work, support vector machine (SVM) basically creates clustering model. Which contains normal as well as abnormal data. Which can monitor normal as well as malicious behaviour to protect a computer network from any malicious attack such as virus , worms, torjan horse, rootkits attacks. Intrusion detection system has been divided into two parts. Fig. 1 Types of IDS 1.1 Anomaly Based Detection Anomaly based intrusion detection system is based on a set of heuristic rule. Which basically monitors a normal as well as abnormal behaviour in a computer network. If any file is self replicating in nature or trying to damage any other file, such behaviours are detected by anomaly based detection. The main disadvantage of anomaly based detection system is higher false positive rate. 1.2 Signature Based Detection Signature based intrusion detection system can detect only known computer virus in a computer network. The computer virus, those are discovered. Its signatures are created. These signatures are stored in database. If any file comes in a computer network. So its signatures are matched with all file. If file matches with virus signature so it is declared a computer virus otherwise a normal file. The main disadvantage of signature based intrusion detection system is that it can not detect a new computer virus.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 452 2. EXPERIMENTAL PARAMETERS There are many parameters such performance, accuracy and false positive rate, that can be calculated for intrusion detection system. Performance : Performance deals with achieving a target in more efficient manner. Performance = (True Positive)/(True Positive)+(True Negative) Accuracy : Accuracy deals with achieving a goal more close to its actual value. Accuracy = (True positive+True Negative)/(True Positive+True Negative+False positive+False Negative). False positive rate : Falsely detect a normal file as abnormal file. False positive rate =(False Positive)/(False Positive+True Negative). 3. EVALUATION DATA SOURCES False positive rate was calculated by the standard data set KDDCUP99 given by the MIT laboratory. In this data set, there are different types of attacks. Those may categorize normal as well as abnormal data. MIT Lincoln laboratory basically establishes a computer network. About 7 days, monitors network traffic. Which contains normal as well as abnormal data. KDDCUP99 data set basically contains normal, denial of service, buffer overflow, guess_passwd(53) and probe attacks. Denial of service : Denial of service (DOS) intrusion is an intrusion. In which , legitmate information can not be make available to legitmate receiver. DOS intrusion also slows down computer system. User to Root(U2R) : In this type of attack, attacker accesses client’s password in unauthorized manner and can access personal information or secret information from computer system by using stolen password. Remote to User(R2U) : In this attack, attacker can transmit a packet over network. Which is not legitmate for that network. Which increases network traffic. Remote to user(R2U) can adversly affacts performance of that computer network and can slow down computer system or can restart a computer system again and again. Probe : In this attack, attacker monitors all information. Which are being sent in that network and can access it. 4. COMBINING SVM AND KNN ALGORITHM Support vector machine(SVM) is a supervised learning method for classification. In which, a hyperplane is created through which a normal as well as abnormal data is separated from each other. Support vector machine(SVM) basically contains two phases- 1- Training phase 2- Testing phase 1-Training phase : Support vector machine(SVM) is able to learn a huge set of pattern from dataset. In the dataset, there are various kind of homogeneous pattern and heterogeneous pattern of data . That can provide better classification between normal and abnormal data. 2-Testing phase : By using training phases, Testing can be done by support vector machine. Support vector machine can evaluate accuracy, performance etc. Support vector machine can evaluate false positive rate but it generates very high false positive rate. K nearest neighbor algorithm is basically a machine learning algorithm. Which can be used to solve traveling salesman problem. By using K nearest neighbor algorithm, false positive rate can be evaluated but it gives higher false positive rate. Fig. 2: Intrusion detection system using CSVMKNN Support vector machine(SVM) basically uses support vectors to create a hyperplane. Hyperplane is used to separate normal and abnormal data. Knn algorithm is used to find new data added to training data set.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 453 so here, Support vector machine(SVM) and K nearest neighbor (KNN) algorithms are combined together to evaluate false positive rate is known as COMBINED SUPPORT VECTOR K NEAREST NEIGHBOR (CSVMKNN) algorithm. CSVMKNN algorithm is a mixture of support vector machine (SVM) and K nearest neighbor (KNN) algorithm. These two algorithm works together in CSVMKNN algorithm. In which, support vector machine (SVM) uses training data set to learn something from data set. If any new is added to its dataset. so it is updated by K nearest neighbor (KNN) algorithm. CSVMKNN algorithm can be used as support vector machine (SVM) and K nearest neighbor (KNN) algorithm to evaluate false positive rate or false alarm rate. False positive rate evaluated by using CSVMKNN algorithm, Can produce better result. CSVMKNN algorithm is applied on KDDCUP99 data set. This data set contains several type of attack such as buffer overflow, Denial of service (DOS) etc. CSVMKNN algorithm generates false positive rate. Which is better than Support vector machine (SVM) and K nearest neighbor (KNN) algorithm. 5. CSVMKNN ALGORITHM Algorithm1 : SVM with KNN clustering Input: Use training data set containing normal and abnormal data (Class type). Output: Generate SVM classifier. 1 start 2 select data from different class; 3 Separate normal and abnormal data by SVM classifier; 4 While number of iteration to add data to data set 5 Use support vector to create hyperplane; 6 Hyperplane separate normal and abnormal data; 7 Apply KNN clustering 8 KNN clustering classified normal and abnormal cluster. 9 If new data added to data set 10 update dataset; 11 else 12 Continues it as it; 13 end. After this algorithm, SVM learning process is applied on data set. Its main goal is to randomly choose data points from KDDCUP99 data set. Hyperplane is used to separate normal and abnormal data points. So there must be a separate hyperplane between each training data points. So it can provide a better selection method for each data points. Support vector machine (SVM) training phase should be introduced. In which. Hyperplane can allocate between each data points. KNN clustering phase is introduced to separate normal data and abnormal data. If new data is added to training data set. So by using K nearest neighbor (KNN) clustering phase, these new added data can be updated to training data set. So these strategy is carried out in next algorithm. Algorithm2: Input: Training data set (KDDCUP99). Input: S1-Number of iteration. Input: S2-Maximum detection rate. Input: S3-Minimum detection rate. Output: Support vector machine(SVM) and K nearest neighbor (KNN) Classifier. 1 Start 2 initialize the data; 3 Let S2 is maximum detection rate, initially zero; 4 Let S3 is minimum detection rate, initially Zero 5 While S3<S2 6 initialize i=0; 7 for i=1,……..,….S1 8 Training phase : 9 Support vector machine (SVM) training phase; 10 Clustering Phase : 11 K nearest neighbor (KNN) clustering phase; 12 end 13 Use Support vector machine(SVM) Classifier; 14 Use hyperplane to separate normal and abnormal data; 15 if new data is added to data set ; 15 Use Knn algorithm to update S2; 16 Update learning process; 17 else 18 continue it as it: 19 end 20 end The KNN clustering phase is used for better selection strategy. False positive can be decreased by using CSVMKNN algorithm. If new added data is declared as normal. Otherwise, it increases its true positive rate. Which basically adversely affacts performance and accuracy. In SVM training phase, if new data is declared as abnormal but in KNN clustering phase, it is declared as normal. So such new data is declared a new kind of intrusion. In SVM training phase, if new data is added to training data set , declared as normal and in KNN clustering phase, it is again declared as normal. So such data decreases false positive rate or false alarm rate. It increases performance and accuracy of that machine learning algorithm. Combined support vector machine k nearest neighbor (CSVMKNN) algorithm basically provides better selection strategy than support vector machine (SVM) and K nearest neighbor (KNN) algorithm. CSVMKNN algorithm takes positive features of support vector machine (SVM) algorithm and K nearest neighbor (KNN) algorithm and avoids weakness of Support vector machine (SVM) algorithm and K nearest neighbor (KNN) algorithm. CSVMKNN algorithm reduces false positive rate of its algorithm by using better selection strategy and improves performance of machine learning (CSVMKNN) algorithm. So, CVMKNN algorithm generates lesser false positive rate than support vector machine (SVM) algorithm and K nearest neighbor algorithm (KNN) algorithm. CSVMKNN algorithm can produce higher performance and accuracy than support vector machine (SVM) and K nearest neighbor (KNN) algorithm.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 454 6. RESULTS Support vector machine (SVM) algorithm, KNN nearest neighbor (KNN) algorithm and CSVMKNN algorithm are applied on training data set (KDDCUP99). Through which , false positive rate can be calculated. These false positive rate will be compared to determine. Which algorithm has generated lesser false positive rate Support vector machine (SVM) classifier: SVM classifier is used to create a hyperplane between different data points by using support vector . These hyperplane is used to separate normal and abnormal data. On the basis of this, we can evaluate performance, accuracy, false positive rate. Class Normal Denial Of service User To Root Remote To User Probe Normal 900 7 8 1 0 Denial Of service 3 345 0 2 11 User To Root 400 0 0 0 10 Remote To User 345 0 41 34 0 Probe 127 100 0 10 0 Fig-3 SVM classifier K nearest neighbor (KNN) classifier is used to discover new data added to training data set. KNN classifier also determines that new added data is normal or abnormal. KNN algorithm is applied on KDDCUP99 data set to evaluate performance, accuracy and false positive rate. Class Normal Denial Of service User To Root Remote To User Probe Normal 928 1 5 0 1 Denial Of service 0 45 0 200 1 User To Root 4 3 6 5 0 Remote To User 0 0 412 234 15 Probe 1 4 0 0 23 Fig-4 KNN classifier CSVMKNN classifier basically contains feature of both algorithm support vector machine (SVM) and K nearest neighbor (KNN) algorithm. CSVMKNN algorithm is applied on KDDCUP99 dataset to generate its performance, accuracy, false positive rate. Class Normal Denial Of service User To Root Remote To User Probe Normal 100 0 8 9 70 Denial Of service 30 35 0 0 89 User To Root 0 0 0 50 0 Remote To User 0 0 0 24 0 Probe 1 4 0 0 0 Fig-5 CSVMKNN Classifier Evaluation Measure SVM KNN CSVMKNN False positive Rate 12.00 11.00 6.00 False Negative Rate 26.00 6.00 0.89 Performance 8.00 9.00 14.50 Accuracy 7.50 3.50 16.00 Fig-6 Comparison of false positive rate CSVMKNN algorithm generates lesser false positive rate than Support vector machine (SVM) and K nearest neighbor (KNN) algorithm. 7. CONCLUSION In this research work, Support vector machine (SVM) algorithm, K nearest neighbor (KNN) algorithm and CSVMKNN algorithm have been applied on KDDCUP99 data set separately. In which CSVMKNN algorithm has generated lower false positive rate than SVM and KNN algorithm. CSVMKNN algorithm has enhanced performance , accuracy and higher detection rate than other machine learning algorithm. Still , there is area of improvement in this algorithm until we are not getting zero false positive rate. REFERENCES [1]. pgale, Robert, Sheodoor schote, rengin and Christopher kruegel.”A Literature analysis on automated malware analysis technique” [2]. Pargas, Rob Jonathan jarcy, Eleazar Aguirre Anaya , Samon Galeana Huerta and Alba Felix Moreno Hernandez,"Security controls for Android" In Computational Aspects of Social Networks (CASoN), 2012 Fourth International Conference on, pp.212-216,IEEE,2012 [3]. Blasing, Thomas, Leonid Batyuk, A-D.Schmidt, Seyit Ahmet Camtepe, and Sahin Albayrak." An android application sandbox system for suspicious software detection" In Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on ,pp. 55-62 IEEE, 2010.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 455 [4]. Johnson Ryan, Zhaohui Wang , Corey Gagnon and Angelos Stavrou." Analysis of Android Applications' Permissions. " In Software Security and Reliability Companion(SERE-C),2012 IEEE Sixth International Conference on, pp. 45 - 46.IEEE,2012. [5]. Susan M. B. and Rayford B.V. (2000). Intrusion detection via fuzzy data mining, Proceedings of the 12th Annual Canadian Information Technology,Ottawa, Canada, June 19-23, 2000, PP.109-122. [6]. A Detailed Analysis of the KDD CUP 99 Data Set, Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. BIOGRAPHIES Sushil kumar Mishra is a M.tech student and doing research work in computer security Pankaj Bhatt is pursuing M.tech and doing research work in computer security.