Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2011, Advances in Intelligent and Soft Computing
…
11 pages
1 file
This paper introduces a hybrid scheme that combines the advantages of deep belief network and support vector machine. An application of intrusion detection imaging has been chosen and hybridization scheme have been applied to see their ability and accuracy to classify the intrusion into two outcomes: normal or attack, and the attacks fall into four classes; R2L, DoS, U2R, and Probing. First, we utilize deep belief network to reduct the dimensionality of the feature sets. This is followed by a support vector machine to classify the intrusion into five outcome; Normal, R2L, DoS, U2R, and Probing. To evaluate the performance of our approach, we present tests on NSL-KDD dataset and show that the overall accuracy offered by the employed approach is high.
International Journal of Monitoring and Surveillance Technologies Research, 2015
Security threats for computer networks have increased dramatically over the last decade, becoming bolder and more brazen. There is a strong need for effective Intrusion Detection Systems (IDS) that are designed to interpret intrusion attempts in incoming network traffic intelligently. In this paper, the authors explored the capabilities of Deep Belief Networks (DBN) – one of the most influential deep learning approach – in performing intrusion detection after training with the NSL-KDD dataset. Additionally, they examined the impact of using Extreme Learning Machine (ELM) and Regularized ELM on the same dataset to evaluate the performance against DBN and Support Vector Machine (SVM) approaches. The trained system identifies any type of unknown attack in the dataset examined. In addition to detecting attacks, the proposed system also classifies them into five groups. The implementation with DBN and SVM give a testing accuracy of about 97.5% and 88.33% respectively with 40% of training...
IEEE/CAA Journal of Automatica Sinica, 2020
In recent years, network traffic data have become larger and more complex, leading to higher possibilities of network intrusion. Traditional intrusion detection methods face difficulty in processing high-speed network data and cannot detect currently unknown attacks. Therefore, this paper proposes a network attack detection method combining a flow calculation and deep learning. The method consists of two parts: a real-time detection algorithm based on flow calculations and frequent patterns and a classification algorithm based on the deep belief network and support vector machine (DBN-SVM). Sliding window (SW) stream data processing enables real-time detection, and the DBN-SVM algorithm can improve classification accuracy. Finally, to verify the proposed method, a system is implemented. Based on the CICIDS2017 open source data set, a series of comparative experiments are conducted. The method’s real-time detection efficiency is higher than that of traditional machine learning algorithms. The attack classification accuracy is 0.7 percentage points higher than that of a DBN, which is 2 percentage points higher than that of the integrated algorithm boosting and bagging methods. Hence, it is suitable for the real-time detection of high-speed network intrusions.
Advances in Intelligent Systems and Computing, 2020
An intrusion detection system works to recognize the attacks using either the signature or signature-less method. The signature-less method suffers from a lot of false alarms that affect accuracy and recall. Commonly used IDS (intrusion detection system) Dataset experiences imbalance which causes a high false alarms rate. Nowadays CNN (convolution neural network) excels in image and computer vision. Using CNN in IDS is promising. The paper proposes a hybrid approach between CNN and ML (SVM, KNN). CNN is efficiently utilized to get important features from the dataset. Then ML used to classify the data. Using the hybrid approaches to benefit from the advantage of machine learning (high accuracy, Low false alarms) and Deep learning which deal with a large amount of data and reduce the number of feature of the dataset (feature extraction). In this paper we used 10% of KDDcup1999 dataset. The experimental results showed enhancement in the detection accuracy to 99.3 and reduction in losses to 0.03.
2023 IEEE 3rd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA)
NIDSs, also known as network intrusion detection systems, are essential for protecting computer networks. Nonetheless, there are concerns about the viability and sustainability of current methods for meeting the needs of modern networks. These issues are more specifically connected to the decreased detection accuracy and the increased human involvement needed. This paper introduces a novel deep-learning intrusion detection method to address these problems. We use a deep learning method by creating a Deep Neural Network (DNN) model for intrusion detection systems and training it using the NSLKDD Dataset. From the 41 features in the NSL-KDD Dataset, we only use 37 basic features in this work. We demonstrate from various studies that the deep learning approach has much potential for use in NIDs. In this paper, we show the effectiveness of our method and compare it to a few previous studies in terms of accuracy, precision, recall, and f-measure values.
Advances in Intelligent Systems and Computing, 2021
The expanding utilization of the Internet has enlarged dangers and new attacks for quite a while. Altogether to recognize oddity in a network, the intrusion detection system has been proven to be a significant segment of secure networks. Machine learning model learns every time it predicts an output, and this property empowers them to distinguish the network pattern and find whether they are ordinary or noxious. There is an expanding demand for dependable and genuine dataset among the examined network. In this article, a comprehensive examination of the CSE-CIC-IDS2018 dataset is made. During the research, numerous issues and deficiencies in a dataset were found. Solutions to fix those issues led to a model different from the existing solutions. The model consisted of two components-principal component analysis and deep neural network. After pre-processing the dataset, it gave F1-score of 0.99, making it robust than other existing models.
Periodicals of Engineering and Natural Sciences (PEN)
Intrusion Detection Systems (IDSs) have a significant role in all networks and information systems in the world to earn the required security guarantee. IDS is one of the solutions used to reduce malicious attacks. As attackers always changing their techniques of attack and find alternative attack methods, IDS must also evolve in response by adopting more sophisticated methods of detection. The huge growth in the data and the significant advances in computer hardware technologies resulted in the new studies existence in the deep learning field, including intrusion detection. Deep learning is sub-field of Machine Learning (ML) methods that are based on learning data representations. In this paper, a detailed survey of various deep learning methods applied in IDSs is given first. Then, a deep learning classification scheme is presented and the main works that have been reported in the deep learning works is summarized. Utilizing this approach, we have provided a taxonomy survey on the available deep architectures and algorithms in these works and classify those algorithms to three classes, which are: discriminative, hybrid and generative. After that, chosen deep learning applications are reviewed in a wide range of fields of intrusion detection. Finally, popular types of datasets and frameworks are discussed.
Academia Nano: Science, Materials, Technology, 2024
Academia Nano: Science, Materials, Technology, launched in 2024, is an open access journal aiming to provide a multidisciplinary dissemination platform for researchers in nanoscience, nanomaterials and nanotechnologies, helping to drive innovation, promote blue-sky discoveries and new understandings of physical and chemical processes at the nanoscale, with the view to accelerate the development of nanomaterials and nano-devices with potential to transform industries or improve the quality of life.
Assume 550 units were worked on during a period in which a total of 500 good units were completed. Normal spoilage consisted of 30 units; abnormal spoilage, 20 units. Total production costs were $2,200. The company accounts for abnormal spoilage separately on the income statement as loss due to abnormal spoilage. Normal spoilage is not accounted for separately. What is the cost of the good units produced?
Image Analysis and Processing – ICIAP 2011, 2011
In the framework of Palaeography, the use of digital image processing techniques has received increasing attention in recent years, resulting in a new research field commonly denoted as "digital palaeography". In such a field, a key role is played by both pattern recognition and feature extraction methods, which provide quantitative arguments for supporting expert deductions. In this paper, we present a pattern recognition system which tries to solve a typical palaeographic problem: to distinguish the different scribes who have worked together to the transcription of a single medieval book. In the specific case of a high standardized book typology (the so called Latin "Giant Bible"), we wished to verify if the extraction of certain specifically devised features, concerning the layout of the page, allowed to obtain satisfactory results. To this aim, we have also performed a statistical analysis of the considered features in order to characterize their discriminant power. The experiments, performed on a large dataset of digital images from the so called "Avila Bible"-a giant Latin copy of the whole Bible produced during the XII century between Italy and Spain-confirmed the effectiveness of the proposed method.
Revista Mexicana de Derecho Electoral, 2017
I CALCHI DI POMPEI DA GIUSEPPE FIORELLI AD OGGI a cura di Massimo Osanna, Annalisa Capurso, Sara Matilde Masseroli. STUDI E RICERCHE DEL PARCO ARCHEOLOGICO DI POMPEI 46 , 2021
Las elecciones intermedias en México 2021. Competencia, comportamiento y escenarios electorales, 2023
Zenodo (CERN European Organization for Nuclear Research), 2023
Psi Beta Research Journal, 2021
Asian Journal of Research in Business Economics and Management, 2015
Cambridge Journal of Economics, 2009
The Lancet Respiratory Medicine, 2015
EccoS – Revista Científica, 2002
IEEE Access, 2019
Edward Elgar Publishing eBooks, 2016
Animal Genetics, 2018