A Network Intrusions Detection System based on a Quantum Bio Inspired Algorithm

Size: px
Start display at page:

Download "A Network Intrusions Detection System based on a Quantum Bio Inspired Algorithm"

Transcription

1 A Network Itrusios Detectio System based o a Quatum Bio Ispired Algorithm Omar S. Solima 1, Aliaa Rassem 2 1,2 Faculty of Computers ad Iformatio, Cairo Uiversity Abstract: Network itrusio detectio systems (NIDSs) have a role of idetifyig malicious activities by moitorig the behavior of etworks. Due to the curretly high volume of etworks trafic i additio to the icreased umber of attacks ad their dyamic properties, NIDSs have the challege of improvig their classificatio performace. Bio-Ispired Optimizatio Algorithms (BIOs) are used to automatically extract the the discrimiatio rules of ormal or abormal behavior to improve the classificatio accuracy ad the detectio ability of NIDS. A quatum vaccied immue cloal algorithm with the estimatio of distributio algorithm (QVICA-with EDA) is proposed i this paper to build a ew NIDS. The proposed algorithm is used as classificatio algorithm of the ew NIDS where it is traied ad tested usig the KDD data set. Also, the ew NIDS is compared with aother detectio system based o particle swarm optimizatio (PSO). Results shows the ability of the proposed algorithm of achievig high itrusios classificatio accuracy where the highest obtaied accuracy is 94.8 %. Keywords: Estimatio of Distributio Algorithm (EDA), Network Itrusios Detectio System (NIDS), Quatum Vaccied Immue Cloal Algorithm (QVICA)., 1. Itroductio Itrusio Detectio Systems (IDSs) are the systems resposible of idetifyig malicious activities by moitorig the behavior of users or etworks. They detect the abormal behavior or uwated traffic ad take the appropriate respose agaist it [27]. There are two types of itrusio detectio approaches which are the misuse ad aomaly detectio approaches. Misuse detectio uses kow patters, sigatures, of uauthorized behavior to detect itrusios. It is quite strog to detect kow itrusios but it has low degree of accuracy i detectig ukow itrusios sice it relies o sigatures extracted by huma experts. Aomaly detectio establishes a baselie of ormal usage patters ad if it fids somethig that widely deviates from the baselie, the deviatio is agged as a possible itrusio. Although it is powerful to idetify ew types of itrusio as deviatios from ormal usage, a potetial drawback is the high false alarm rate, previously usee system behaviors may be recogized as aomalies, ad hece flagged as potetial itrusios [15]. IDSs ca also be categorized to host-based ad etwork-based depedig o the audit data which they will aalyze. Host based systems examie data of users like what files were accessed ad what applicatios were executed. Network-based IDS (NIDS) examies data as packets of iformatio exchage through the etworks. The goal of NIDSs is to quickly ad accurately recogize ad distiguish the ormal ad abormal etwork coectios. They seek to have a high itrusios detectio rate ad a low false alarms, detectig ormal coectios as itrusios, to esure high classificatio accuracy. There are some challeges facig these systems which make it difficult to achieve such a goal ad keep security of etworks. These challeges are the curret high volume of etworks traffic i additio to the icreased umber of attacks (itrusios) ad their complex ad dyamic properties. Artificial itelligece ad machie learig were used to build differet NIDSs but they have show limitatios to achievig high detectio accuracy ad fast processig times whe cofroted with these challeges. Computatioal Itelligece techiques, BIOs, kow for their ability to adapt ad to exhibit fault tolerace, high computatioal speed ad resiliece agaist oisy iformatio, compesate for the limitatios of these two approaches [30]. May BIOs have bee applied as classificatio techiques for NIDSs, like the artificial immue system (AIS), Artifical Neural Networks (ANNs), particle swarm optimizatio (PSO) ad may others. They were able to easily ad automatically extract the the discrimiatio rules of ormal or abormal behavior from the large etworks logs [7]. Also the Quatum Ispired Evolutioary Algorithms (QIEAs) have bee used to build NIDSs. QIEAs are some sort of hybrid algorithms appeared i 1990s. They hybridize the classical BIOs with quatum computig (QC) paradigm to improve the performace of these algorithms especially i complex large problems with high dimesios. The algorithms i this ew field proved have bee used i may applicatios icludig etworks security where they proved their ISSN: Page 371

2 effectiveess over the traditioal BIOs. New hybrid algorithms ca be itroduced to ehace the performace of QIEAs ad icrease the quality of obtaied solutios. The aim of this paper is to build a NIDS based o a ew proposed BIO amed Quatum Vaccied Immue Cloal Algorithm with Estimatio of Distributio Algorithm (QVICA-with EDA). This algorithm itroduces the vaccie operator ad the EDA samplig to be added to the classical Quatum Ispired Immue Cloal Algorithm (QICA). The algorithm is used to build a better NIDS with a higher itrusios classificatio accuracy. It is traied ad tested usig the audit data of the bechmark KDD dataset ad is compared with aother NIDS based o Particle Swarm Optimizatio (PSO). Results show the superiority of the proposed algorithm over the PSO. The rest of this paper is orgaized as follows: Sectio 2 itroduces related works i the field of IDS classificatio algorithms ad a backgroud of ecessary terms. Sectio 3 itroduces the proposed algorithm where experimetal results ad discussio are i sectio 4. The last sectio is devoted to coclusios ad further works. 2. Related Works ad Backgroud EAs ad QIEAs have bee used i past few years i may researches for itrusios classificatio to icrease the detectio accuracy of IDS. A sample of these researches is show i this sectio. The immue cloal algorithm was used i may etworkig applicatios like itrusio detectio for securig etworks ad the spam detectio. A Network Itrusio Detectio System (NIDS) based o the immuological approach was proposed where a adaptive samplig algorithm was applied durig the data collectio stage. This algorithm was used accordig to the dyamic characters of detectio data where it was able to improve the data-processig capabilities ad the fault tolerace of the system [8]. A collaborative itrusio detectio system was proposed to detect deial of service attacks by usig the artificial immue system due to its distributioal, collaborative, robust ad adaptive capabilities. This system was applied for peer to peer etworks where it was able to icrease the precisio of attack discovery ad decreases false positive rate [21]. Also, A IDS based o immue algorithm (IA) ad support vector machie (SVM) was itroduced. I this method, immue algorithm is used to preprocess the etwork data, SVM is adopted to classify the optimizatio data, ad recogize itruders. Results showed that the feasibility ad efficiecy of the system [5]. A hybrid itrusio detectio system based o rough set (RS )for feature selectio ad simplified swarm optimizatio for itrusio data classificatio was applied. RS is proposed to select the most relevat features ad the PSO with a ew weighted local search( WLS) strategy was used for classficatio. The WLS is added to discover the better solutio from the eighborhood of the curret solutio produced by PSO. The testig results showed that the proposed hybrid system ca achieve higher classificatio accuracy [6]. Particle Swarm Optimizatio ad its variats were combied with various Machie Learig techiques. They were used for Aomaly Detectio i Network Itrusio Detectio System to ehace the performace of system [22]. A improved egative selectio algorithm that itegrates a ovel further traiig strategy to reduce self-samples, to reduce computatioal cost i testig stage, was developed. The algorithm was able to get the highest detectio rate ad the lowest false alarm rate i most cases [9]. The Support Vector Machie (SVM) was itroduced as a classifier for a IDS where a wrapper based feature selectio approach usig Bees algorithm (BA) as a search strategy for subset geeratio. The result shows that these combied algorithms has yielded better quality IDS [2]. Also, A improved icremetal SVM algorithm (ISVM) combied with a kerel fuctio U-RBF was proposed ad applied ito etwork itrusio detectio. The simulatio results showed that the improved kerel fuctio U- RBF has played some role i savig traiig time ad test time [33]. A aomaly based etwork IDS usig GA approach was adopted where the proposed IDS used a adaptive GA for both learig ad detectio. The proposed method was efficiet with respect to good detectio rate with low false positives i additio to the lower executio time [24]. A IDS based o GA was proposed where GA uses evolutio theory to iformatio evolutio i order to filter the trafic data ad so reduce the complexity. It was implemeted o KDD99 bechmark dataset ad obtaied reasoable detectio rate [12]. A QIEA usig eigevectors ad ichig strategy was used to optimize the database of the sigature based detectio system, a ID system type that is kow with its poor detectio performace [29], ad the algorithm was able to improve the ID's ability i detectig the ukow attacks [34]. A QIEA was also used for optimizig the features selectio ad kerel parameters of the support vector machie used for aomaly detectio [31]. The QGA was also used to optimize the clusterig methodology ad get the optimal umber of clusters to be used for classifyig the data collected by the IDS [32]. A quatum eural etwork (NN) was applied for itrusio applicatio to ISSN: Page 372

3 overcome the weakess of the back propagatio NN which may fall ito local miimum [4]. The quatum particle swarm optimizatio (QPSO) was used as a traier for NN ad SVM to get better IDS performace. It was applied to trai the wavelet NN to improve the detectio rate for aomalies ad reduce the false detectio alarms i the etwork aomaly detectio [17]. It was also applied with the Gradiet Descet (GD) method to trai the Radial Basis Fuctio NN for etwork aomaly detectio [18]. It was used with SVM for etwork Itrusio feature selectio ad detectio where each particle was a selected subset of features ad its fitess was defied as the correct classificatio percetage by SVM [11]. It was used also for solvig the liear system of equatios of the least square SVM (LS- SVM )to overcome the LS-SVM weakess ad guaratee the sparsity ad robustess of the solutios [29] Quatum Ispired Immue Cloal Algorithm The artificial immue system algorithms (AIS) are a set of EAs ispirig their procedure from the huma immue system fuctioality. AIS iclude may differet algorithms where the two major used algorithms are the egative selectio algorithm ad the immue cloal algorithm (ICA). ICA is ispired from the huma immue systems cloal selectio process over the B cells where the evolutio process of the atibodies is a repeated cycle of matchig, cloig, mutatig ad replacig. The best B cells are allowed through this process to survive which icreases the attackig performace agaist the ukow atiges. Vacciatio is aother immuological cocept that ICA applies through the vaccie operator. This operator is used to itroduce some degree of diversity betwee solutios ad icrease their fitess values by usig artificial Vaccies. Quatum ispired evolutioary algorithms (QIEAs) were itroduced i the 1990s, they itegrate the quatum computig cocepts with evolutioary process of EAs. They are able to improve the quality of solutios ad ehace the algorithms performace as EAs suffer from bad performace i high dimesioal problems. EAs, icludig the ICA, have to do umerous evolutioary operatios ad fitess evaluatios i large problems which limit them from performig effectively. The hybridizatio betwee quatum properties ad traditioal ICA process ehaced its performace i complex problems. QICA combied quatum computig priciples, like quatum bits, quatum superpositio property ad quatum observatio process, with immue cloal selectio theory. These cocepts are described below i details where the quatum bit represetatio for atibodies ad vaccies i QICA has the advatage of represetig a liear superpositio of states (classical solutios) i search space probabilistically. Quatum represetatio ca guaratee less populatio size as a few umber of atibodies ad vaccies ca represet a large set of solutios through the space [23]. The quatum observatio process plays a great role i projectig the multi state quatum atibodies ito oe of its basic states to help i the idividuals evaluatio. -Quatum Bit: By usig quatum bit (q-bit) represetatio, a small populatio of atibodies ca be created where it represets a larger set of atibodies due to the quatum superpostiio property. The quatum atibody populatio is iitialized with quatum atibodies usig m q-bits for each oe. Ulike the classical bit, the q-bit does ot represet oly the value 0 or 1 but a superpositio of the two. Its state ca be give by: ψ = α 0 > + β 1 > (1) Where α ad β are complex umbers ad α 2 is the probability to have value 0 ad β 2 is the probability of havig value 1 ad α 2 + β 2 = 1. - Observatio Process: The quatum represeted idividuals are coverted ito biary represetatio by iteratig over each q-bit i the idividual ad chage it to a biary bit. The process is described i algorithm 1 Algorithm 1 Observatio Process 1: for i = 1 to m do 2: Geerate a radom umber r betwee 0 ad 1 3: if i α the 4: set the biary bit of i as 0 5: else 6: set the biary bit as 1 7: ed if 8: ed for 2.2. Estimatio of Distributio Algorithm The most of evolutioary algorithms (EA) use samplig durig their evolutio process for geeratig ew solutios. Some of these algorithms use it implicitly, like Geetic Algorithm (GA), as ew idividuals are sampled through the geetic operators of the cross over ad mutatio of the parets. Other algorithms apply a explicit samplig procedure through usig probabilistic models represetig the solutios characteristics. These ISSN: Page 373

4 algorithms are called the iterated desity estimatio evolutioary algorithms (IDEAs) where a iterated process of probabilistic model estimatio takes place to sample ew idividuals [10], [16]. Estimatio of Distributio Algorithms (EDAs), a example of the IDEA, are populatio based algorithms with a theoretical foudatio o probability theory. They ca extract the global statistical iformatio about the search space from the search so far ad builds a probability model of promisig solutios [25]. Ulike GAs, the ew idividuals i the ext populatio are geerated without crossover or mutatio operators. They are radomly reproduced by a probability distributio estimated from the selected idividuals i the previous geeratio [16]. EDA has some advatages, over other traditioal EAs, where it is able to capture the iterrelatios ad iter depedecies betwee the problem variables through the estimatio of their joit desity fuctio. EDA does't have the problem of fidig the appropriate values of may parameters as it oly relies o the probability estimatio with o other additioal parameters. The geeral EDA procedure is show i Algorithm 2. Algorithm 2 Estimatio of Distributio Algorithm 1: Iitialize the iitial populatio. 2: while termiatio coditio is ot satisfied do 3: Select a certai umber of excellet idividuals. 4: Costruct probabilistic model by aalyzig iformatio of the selected idividuals. 5: Create ew populatio by samplig ew idividuals from the costructed probabilistic model. 6: ed while The EDA relies o the costructio ad maiteace of a probability model that geerates satisfactory solutios for the problem solved. A estimated probabilistic model, to capture the joit probabilities betwee variables, is costructed from selectig the curret best solutios ad the it is simulated for producig samples to guide the search process ad update the iduced model. Estimatig the joit probability distributio associated with the data costitutes the bottleeck of EDA. Based o the complexity of the model used, EDAs are classified ito differet categories, without iterdepedecies, pair wise depedecies ad multiply depedecies algorithms as below [10], -Without Iterdepedecies EDAs: These models are used whe there is o depedecy assumed betwee the variables of the problem. The joit probability distributio is factorized to idepedet uivariate probability distributios p(xi). Uivariate Margial Distributio Algorithm (UMDA), a example for this category, estimates the p(xi) from the relative margial frequecies of the Xi of the selected data. Other examples of EDAs uder this category are the Populatio Based Icremetal Learig (PBIL) ad compact geetic algorithm (cga) [14]. UMDA, as a example, estimates the p(x ) from the relative margial frequecies of the X of the selected data. p(x) = x i i1 f N (x, μ, ) = f N (x i, μ i, i ) i1 (2) (3) -Pair-wise Depedecies EDAs: This type of EDAs assumes depedecy betwee pairs of the variables. The joit probability distributio of the variables is factorized as the product of a uivariate desity fuctio ad ( - 1) pair wise coditioal desity fuctios give a permutatio = (i,, i ) betwee variables. Examples are the Bivariate Margial Distributio Algorithm (BMDA), Mutual Iformatio Maximizatio for Iput Clusterig (MIMIC) ad Combiig Optimizers with Mutual Iformatio Trees (COMIT) algorithms. MIMIC, as a example, searches for the best permutatio π, of the variables, that will miimize theh (x), Kullback- Leibler divergece fuctio betwee the p (x) ad p(x) [10]. p(x) = p(x i1 ). p(x i2 x i1 ) p(x i x i1 ) (4) -Multiple Iterdepedecies EDAs: Depedecies are assumed betwee multiple variables where probabilistic graphical models based o either directed or udirected graphs are widely used. Structural ad parametric learig are doe to lear the topology of the etworks ad estimate the coditioal probabilities. Bayesia etwork algorithm (BOA), the Markov etwork EDA ad factorized Distributio Algorithm (FDA) are some examples. (For more details, see [14] ad [28]). p(x) = p(x i pa(x i ), θ i ) = θ ijk i1 f(x) = N(x i, μ i, v i ) i1 (6) (5) 3. Proposed Network Itrusios Detectio System This work builds a NIDS usig a ew classificatio algorithm to improve the detectio performace. It ISSN: Page 374

5 proposes a ew BIO amed Quatum Vaccied Immue Cloal Algorithm with Estimatio of Distributio Algorithm (QVICAwith EDA). It is based o the quatum computig cocepts, immue cloal selectio priciples ad the vaccie operator with EDA samplig. The NIDS is the compared with aother system base o PSO [6].A geeral schema of the proposed NIDS is show i figure 1. Figure 1 shows that the system has three mai stages. First stage is about data preprocessig; the secod is the traiig phase of the proposed classificatio algorithm ad the last oe is the testig phase where a detailed descriptio is show below. Fig 1: The ew NIDS based o the proposed algorithm (the QVICA-with EDA) 3.1. Data Preprocessig Phase This phase is cocered with the preprocessig of data represeted i the dataset records (etwork coectios). The data are divided ito two sets, the traiig set ad the test set. There is a class assiged to each record i the traiig set, to idicate either it is a ormal coectio or a attack oe, where test records are without class labels. Each record does ot have the total 41 features of the KDD, istead it has oly six selected features. These six features are those selected ad used i the PSO work which are the Service, src_bytes, dst_bytes, Rerror_rate, dst_host_srv_cout ad dst_host_diff _srv_rate. The proposed NIDS uses the same selected features for fair comparisos where the symbolic coversio of the symbolic features are doe followed by Equal frequecy discretizatio (EFD) for the cotiuous features. The processed data is the two outputs of this phase where the processed traiig set, called traiig Atiges (AGs), is used as a iput for the traiig phase. The processed testig set, called test Atiges, is used as the iput for the last phase of testig Traiig Phase I this phase, the QVICA-V with EDA is traied usig the traiig AGs to lear how to classify the data ito ormal ad itrusios. as metioed before, the algorithm itegrates the quatum computig, for represetatio, ad immue cloal selectio priciples with the vaccie operator for diversifyig solutios. The algorithm also utilizes the EDA probabilistic models ad samplig to improve the fitess of atibodies (solutios), icrease the degree of diversity ad shorte the executio time of the whole algorithm. The mai steps of the proposed algorithm are described i Algorithm 3 [23]. As show i algorithm 3, the algorithm starts by iitializig both the quatum atibody populatio Q(t) ad the quatum vaccie populatio V (t) followed by cloig ad mutataig atibodies to be the decoded for evaluatio. Additioal steps to the simple QICA, like vaccie decodig ad samplig will be described i details. The quatum vaccie populatio V (t) is iitialized i the same way with quatum vaccies where is the umber of grids that the decisio space is divided to ad = (D D D ) with d which is the umber of dimesios [23]. - Iitializatio: Quatum atibodies ad vaccies populatios are created where V (t) is iitialized with quatum vaccies where is the umber of grids that the decisio space is divided to ad = (D D D ) with d which is the umber of dimesios. Quatum atibodies Q(t) are cloed ad mutated to get Q (t) usig the cloal operator θ with C as umber of cloes that will produce the Q (t) where θ, C ad Q (t) are as follows, θ(q t ) = [θ(q 1 ), θ(q 2 ), θ(q m )] (7) C = N c (8) Q (t) = [Q t, q 1, q 2,, q m ] (9) Algorithm 3 The proposed Algorithm (QICA-V with EDA) 1: Iitialize the quatum atibody ad vaccie populatios, Q(t) ad V(t). 2: Iitialize t=1 as first iteratio 3: while termiatio coditio is ot satisfied do 4: Apply the cloal ad quatum mutatio operators over the Q(t) to get Q (t) 5: Produce B (t) by observig Q (t). 6: Decode V (t) to get V. 7: Divide V ito two subpopulatios, V ad V ISSN: Page 375

6 8: Select the farthest vaccies from V as the curret V. 9: Estimate probability distributio of the V. 10: Sample the distributio to get the ew V 11: Apply the geetic operators over the V to get the ew V 12: Build the ewv by mergig the ewv ad ewv 13: Apply vacciatio over B(t) usig the ewv to get BV (t). 14: Apply cloal selectio operator over BV (t) to get Q(t + 1). 15: ed while -Vaccie Decodig: Biary vaccies are coverted ito decimal represetatio betwee 0 ad 2 m - 1 to get V1 set. These decimal vaccies have to be ijected ito the decisio space so that they are decoded to be withi the decisio space domai ad get V2 set usig the followig formula, v 2 i = c i + width j v i m ad i = 1,.., (10) Where c is the coordiate of the grid (i) ad width j is the width of dimesio (j) ad j = 1,2,, d. The width ca be computed usig the maximum ad miimum values of each dimesio. -Vaccie Selectio ad vacciatio: Hammig distace is used to compute the distace betwee the vaccies ad atibodies to evaluate the farthest vaccies. The Hammig distace fuctio is performed as i algorithm 4. Vaccies with higher hammig distaces from all atibodies are selected (to ehace the exploratio) ito Vbest set. Vaccies i this set are used to apply the ijectio process over the mutated AB cloes where the ijectio i our proposed algorithm is doe i the real represetatio. Algorithm 4 Hammig distace Fuctio 1: for each bit a i vacciei ad bit b i atibodyj do 2: if a == b the 3: mismatchcouter = 0 4: else 5: mismatchcouter = 1 6: ed if 7: ed for 8: Hammig distace (i,j) = Mismatchcouter -Vaccie Samplig: EDA estimates the probability distributio of the ext iteratios best vaccies from the curret Vbest. It uses the mea ad stadard deviatio (sd), as show below where b is the legth of Vbest, of the vaccies i Vbest to costruct its model. μ = v i best b i1 b σ = [v i best μ] 2 b (11) (12) -Cloal selectio: The best atibodies from the vaccied atibodies populatio ad selected to form Q(t+1) ad coverted agai ito quatum represetatio to proceed to a ew iteratio Testig Phase I this phase, the QVICA-with EDA is tested to evaluate the traiig process. It is tested usig the test atiges, with o class label, produced by the first phase. The fial traied atibodies, from the traiig phase, are matched with the test atiges. Each test atige is matched with the whole set of these atibodies to be assiged to a class. The higher the umber of matched ABs with the atige, the more probability that this atige follows their class. At the ed of the phase, the class labels of all the test atiges are detected either as ormal or attack. 4. Experimets ad Results The proposed algorithm, QVICA- with EDA, is implemeted as the classificatio algorithm for a NIDS ad compared with aother classificatio algorithm based o PSO [6]. The experimets were implemeted over the The KDD-Cup 99 (Kowledge Discovery ad Data Miig Tools Coferece), a bechmark dataset for the etwrok itrusio detectio systems [1]. Each record i the KDD represets a TCP/IP coectio that is composed of 41 features that are both qualitative ad quatitative i ature. There are 39 types of distict attacks i KDD, grouped ito four classes of attack ad oe class of o attack (ormal coectios). The mai attack types are Deial of Service (DoS), Probe,Remote-to-Local (R2L) ad User-to-Root (U2R) where detailed descriptio of each ad its sub types is below [19], [13] ad [3]. -Deial of Service (DoS) attacks: where a attacker makes some computig or memory resource too busy or too full to hadle legitimate requests, thus deyig legitimate users access to a machie. Sub attacks of DoS are, Back,Lad,eptue,Pod,Smurf ad teardrop. -Probe attacks: where a attacker scas a etwork to gather iformatio or fid kow vulerabilities. ISSN: Page 376

7 Probe's sub attacks are Sata,ipsweep,Nmap ad portsweep. -Remote-to-Local (R2L) attacks: where a attacker seds packets to a machie over a etwork, the exploits machies vulerability to illegally gai local access as a user. Sub attacks of R2L that ca be foud i the sets' records are guess-passwd,ftpwrite,imap, Phf,multihop,warezmaster, warezcliet ad spy. -User-to-Root (U2R) attacks: where a attacker starts out with access to a ormal user accout o the system ad is able to exploit vulerability to gai root access to the system. U2R sub attacks are Bufieroverow,loadmodule,perl ad rootkit. Table 1: ACCURACY FOR DIFFERENT EXPERIMENTS USING QVICA-WITH EDA QVICA-with EDA Iteratios Pop Size The same parameters settigs of the PSO-WLS algorithm are used for our algorithm for fair compariso. A set of 4000 records is selected from the KDD based o the selected features of the PSO- WLS work to evaluate the performace of the QVICA- with EDA. The 10-fold cross validatio method is applied where the data are distributed as 10 for testig ad the remaiig 90 for traiig. Table 2: ACCURACY FOR DIFFERENT EXPERIMENTS USING PSO-WLS PSO-WLS Iteratios Pop Size Classificatio accuracy is the evaluatio measure used i this work. The atibodies populatio size, are set to differet values of 10,20,30,40 ad 50 where the umber of iteratios is set to 10,20,30 ad 40 with total of 20 idepedet rus. The best values of accuracy through differet experimets are captured ad compared with the results of the PSO-WLS algorithm as i tables 1 ad 2 where accuracy is as i equatio 13 [6], TP + TN accuracy = (13) TP + FP + FN + TN The tables show that our algorithm outperforms the PSO-WLS algorithm i some experimets where higher accuracy values are obtaied. The highest accuracy value was achieved with 50 atibodies ad 30 iteratios. A sample of the results are also visualized i figures 2, 3 ad 4 for more clarificatio. Usig 40 ad 50 as the values of the populatio size, the proposed algorithm is better tha the PSO-WLS classificatio i all differet experimets. Fig 2:Classificatio Accuracy at differt iteratios with populatio size of 30 Fig 3: Classificatio Accuracy at differt iteratios with populatio size of 40 Fig 4: Classificatio Accuracy at differt iteratios with populatio size of 50 For more ivestigatio, the accuracy of each fold i oe of the best experimets is recorded i table 3 ad compared with the folds results of the PSO-WLS ISSN: Page 377

8 algorithm where higher values are obtaied by our algorithm. The detailed accuracy values of the 20 rus of the best experimet is i table 4 ad are compared with the best experimet of the other algorithm. The proposed algorithm is able to get higher classificatio accuracy tha the best value of the PSO based algorithm usig the same parameters. Table 3: ACCURACY OF THE 10 FOLD CROSS VALIDATION OF ONE OF THE BEST RUNS Fold Accuracy Value QVICA-with PSO-WLS EDA Table 4: ACCURACY OF THE TWO ALGORITHMS OVER 20 RUNS (FOR THE BEST EXPERIMENT) Ru Accuracy Value QVICA-with PSO-WLS EDA Mea Coclusios A quatum vaccied immue cloal algorithm with the estimatio of distributio algorithm (QVICA-with EDA) was proposed i this paper as a classificatio algorithm for the NIDS. It was compared with aother classificatio algorithm based o particle swarm optimizatio (PSO) o the KDD data set. Classificatio accuracy values obtaied at the differet experimets showed the ability of the algorithm of achievig high classificatio accuracy. It outperforms the other algorithm i may experimets which proved its effectiveess. More experimets with differet parameters settigs will be doe i future work to esure that the algorithm is powerful for itrusio detectio. REFERENCES [1] [2] Osama Alomari ad Z Othma. Bees algorithm for feature selectio i etwork aomaly detectio. Joural of Applied Scieces Research, 8(3): , [3] Ver oica Bol o-caedo, Noelia S achez-maro o, ad Amparo Aloso-Betazos. Feature selectio ad classificatio i multiple class datasets: A applicatio to kdd cup 99 dataset. Expert Systems with Applicatios, 38(5): , [4] FENG Jia-li GONG Chag-qig. Study of a itrusio detectio based o quatum eural etworks techology [j]. Joural of Sheyag Istitute of Aeroautical Egieerig, 1:016, [5] Yu Sheg Che, Yu Sheg Qi, Yu Gui Xiag, Jig Xi Zhog, ad Xu Log Jiao. Itrusio detectio system based o immue algorithm ad support vector machie i wireless sesor etwork. I Iformatio ad Automatio, pages Spriger, [6] Yuk Yig Chug ad Noorhaiza Wahid. A hybrid etwork itrusio detectio system usig simplified swarm optimizatio (sso). Applied Soft Computig, [7] Tia Fag, Dogmei Fu, ad Yufeg Zhao. A hybrid artificial immue algorithm for feature selectio of ovaria cacer data. I Educatio Techology ad Traiig, ad 2008 Iteratioal Workshop o Geosciece ad Remote Sesig. ETT ad GRS Iteratioal Workshop o, volume 1, pages IEEE, [8] Qighua Zhag; Yuzhe Fu. Research of adaptive immue etwork itrusio detectio model. Iteratioal Joural of Systems, Cotrol ad Commuicatios, 3(3): , [9] Maoguo Gog, Jia Zhag, Jigjig Ma, ad Licheg Jiao. A efficiet egative selectio algorithm with further traiig for aomaly detectio. Kowledge-Based Systems, 30: , [10] Xiaojua He, Jiachao Zeg, Sogdog Xue, ad Lifag Wag. A ew estimatio of distributio algorithm based edge histogram model for flexible job-shop problem. I Computer Sciece for Evirometal Egieerig ad EcoIformatics, pages Spriger, ISSN: Page 378

9 [11] Zhag Hogmei, Gao Haihua, ad Wag Xigyu. Quatum particle swarm optimizatio based etwork itrusio feature selectio ad detectio [12] Mohammad Sazzadul Hoque, Md Mukit, Md Bikas, Abu Naser, et al. A implemetatio of itrusio detectio system usig geetic algorithm. arxiv preprit arxiv: , [13] Mohammad Sazzadul Hoque, Md Mukit, Md Bikas, Abu Naser, et al. A implemetatio of itrusio detectio system usig geetic algorithm. arxiv preprit arxiv: , [14] Pedro Larra aga, Ramo Etxeberria, Jos e A Lozao, ad Jos e M Pe a. Combiatorial optimizatio by learig ad simulatio of bayesia etworks. I Proceedigs of the Sixteeth coferece o Ucertaity i artificial itelligece, pages Morga Kaufma Publishers Ic., [15] Sag Mi Lee, Dog Seog Kim, ad Jog Sou Park. A survey ad taxoomy of lightweight itrusio detectio systems. Joural of Iteret Services ad Iformatio Security, 2(1/2): , [16] Feg Liu, Jua Liu, Jig Feg, ad Huaibei Zhou. Estimatio distributio of algorithm for fuzzy clusterig gee expressio data. I Advaces i Natural Computatio, pages Spriger, [17] Li-li Liu ad Yua Liu. Mqpso based o wavelet eural etwork for etwork aomaly detectio. I Wireless Commuicatios, Networkig ad Mobile Computig, WiCom 09. 5th Iteratioal Coferece o, pages 1 5. IEEE, [18] Yua Liu. Qpso-optimized rbf eural etwork for etwork aomaly detectio. Joural of Iformatio & Computatioal Sciece, 8(9): , [19] Adetumbi A Olusola, Adeola S Oladele, ad Daramola O Abosede. Aalysis of kdd99 itrusio detectio dataset for selectio of relevace features. I Proceedigs of the World Cogress o Egieerig ad Computer Sciece, volume 1, pages 20 22, [20] Chug-Mig Ou ad CR Ou. Immuity-ispired host-based itrusio detectio systems. I Geetic ad Evolutioary Computig (ICGEC), 2011 Fifth Iteratioal Coferece o, pages IEEE, [25] Jiayog Su, Qigfu Zhag, ad Edward PK Tsag. De/eda: A ew evolutioary algorithm for global optimizatio. Iformatio Scieces, 169(3): , [26] S.Yag ad L. Jiao. A quatum-vaccie-ispired immue cloal algorithm ad memory-ehaced learig. Electrical Egieerig, IEEE Trasactios o, [27] MM Wa el, Hamdy N Agiza, ad Elsayed Radwa. Itrusio detectio usig rough sets based parallel geetic algorithm hybrid model. I Proceedigs of the World Cogress o Egieerig ad Computer Sciece, volume 2, pages 20 22, [28] Hui WANG, Xiaoju BI, Liju YU, ad Liju ZHANG. A adjustable threshold immue egative selectio algorithm based o vaccie theory [j]. Joural of Harbi Egieerig Uiversity, 1:015, [29] Rui Wu, Chag Su, Kewe Xia, ad Yi Wu. A approach to wls-svm based o qpso algorithm i aomaly detectio. I Itelliget Cotrol ad Automatio, WCICA th World Cogress o, pages IEEE, [30] Shelly Xiaoa Wu ad Wolfgag Bazhaf. The use of computatioal itelligece i itrusio detectio systems: A review. Applied Soft Computig, 10(1):1 35, [31] Chu Yag, Haidog Yag, ad Feiqi Deg. Quatumispired immue evolutioary algorithm based parameter optimizatio for mixtures of kerels ad its applicatio to supervised aomaly idss. I Itelliget Cotrol ad Automatio, WCICA th World Cogress o, pages IEEE, [32] Qua-mi Zha, Rog-gui Wag, ad Wei He. Itrusio detectio algorithm based o quatum geetic clusterig. Applicatio Research of Computers, 1:073, [33] Haiyi Zhag, Yag Yi, ad Jiasheg Wu. Network itrusio detectio system based o icremetal support vector machie. I Cotemporary Challeges ad Solutios i Applied Artificial Itelligece, pages Spriger, [34] Zog-Fei Zhag. Quatum evolutioary algorithm for optimizig etwork itrusio sigature database. Jisuaji Yigyog/ Joural of Computer Applicatios, 30(8): , [21] Leila Rajbar ad Siavash Khorsadi. A collaborative itrusio detectio system agaist ddos attack i peer to peer etwork. I Software Egieerig ad Computer Systems, pages Spriger, [22] Khushboo Satpute, Shikha Agrawal, Jitedra Agrawal, ad Sajeev Sharma. A survey o aomaly detectio i etwork itrusio detectio system usig particle swarm optimizatio based machie learig techiques. I Proceedigs of the Iteratioal Coferece o Frotiers of Itelliget Computig: Theory ad Applicatios (FICTA), pages Spriger, [23] Omar S Solima ad Aliaa Rassem. A bio ispired cloal algorithm with estimatioof distributio algorithm for global optimizatio. I Iformatics ad Systems (INFOS), th Iteratioal Coferece o, pages BIO 166. IEEE, [24] KG Sriivasa. Applicatio of geetic algorithms for detectig aomaly i etwork itrusio detectio systems. I Advaces i Computer Sciece ad Iformatio Techology. Networks ad Commuicatios, pages Spriger, ISSN: Page 379

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

LECTURE 13: Cross-validation

LECTURE 13: Cross-validation LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M

More information

The Impact of Feature Selection on Web Spam Detection

The Impact of Feature Selection on Web Spam Detection I.J. Itelliget Systems ad Applicatios, 2012, 9, 61-67 Published Olie August 2012 i MECS (http://www.mecs-press.org/) DOI: 10.5815/ijisa.2012.09.08 The Impact of Feature Selectio o Web Spam Detectio Jaber

More information

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1, Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-1559 Berli,

More information

Research Article Crude Oil Price Prediction Based on a Dynamic Correcting Support Vector Regression Machine

Research Article Crude Oil Price Prediction Based on a Dynamic Correcting Support Vector Regression Machine Abstract ad Applied Aalysis Volume 2013, Article ID 528678, 7 pages http://dx.doi.org/10.1155/2013/528678 Research Article Crude Oil Price Predictio Based o a Dyamic Correctig Support Vector Regressio

More information

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode SHS Web of Cofereces 25, shscof/20162501018 Applicatio ad research of fuzzy clusterig aalysis algorithm uder micro-lecture Eglish teachig mode Yig Shi, Wei Dog, Chuyi Lou & Ya Dig Qihuagdao Istitute of

More information

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College

More information

Effective Hybrid Intrusion Detection System: A Layered Approach

Effective Hybrid Intrusion Detection System: A Layered Approach I. J. Computer Network ad Iformatio Security, 2015, 3, 35-41 Published Olie February 2015 i MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcis.2015.03.05 Effective Hybrid Itrusio Detectio System: A Layered

More information

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 haupt@ieee.org Abstract:

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

AdaLab. Adaptive Automated Scientific Laboratory (AdaLab) Adaptive Machines in Complex Environments. n Start Date: 1.4.15

AdaLab. Adaptive Automated Scientific Laboratory (AdaLab) Adaptive Machines in Complex Environments. n Start Date: 1.4.15 AdaLab AdaLab Adaptive Automated Scietific Laboratory (AdaLab) Adaptive Machies i Complex Eviromets Start Date: 1.4.15 Scietific Backgroud The Cocept of a Robot Scietist Computer systems capable of origiatig

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised

More information

Research Article Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

Research Article Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis Cotrol Sciece ad Egieerig Volume 2013, Article ID 821315, 6 pages http://dx.doi.org/10.1155/2013/821315 Research Article Real-Time Detectio of Applicatio-Layer DDoS Attack Usig Time Series Aalysis Togguag

More information

Review: Classification Outline

Review: Classification Outline Data Miig CS 341, Sprig 2007 Decisio Trees Neural etworks Review: Lecture 6: Classificatio issues, regressio, bayesia classificatio Pretice Hall 2 Data Miig Core Techiques Classificatio Clusterig Associatio

More information

Plug-in martingales for testing exchangeability on-line

Plug-in martingales for testing exchangeability on-line Plug-i martigales for testig exchageability o-lie Valetia Fedorova, Alex Gammerma, Ilia Nouretdiov, ad Vladimir Vovk Computer Learig Research Cetre Royal Holloway, Uiversity of Lodo, UK {valetia,ilia,alex,vovk}@cs.rhul.ac.uk

More information

Pattern Synthesis Using Real Coded Genetic Algorithm and Accelerated Particle Swarm Optimization

Pattern Synthesis Using Real Coded Genetic Algorithm and Accelerated Particle Swarm Optimization Iteratioal Joural of Applied Egieerig Research ISSN 0973-4562 Volume 11, Number 6 (2016) pp 3753-3760 Research Idia Publicatios. http://www.ripublicatio.com Patter Sythesis Usig Real Coded Geetic Algorithm

More information

PSYCHOLOGICAL STATISTICS

PSYCHOLOGICAL STATISTICS UNIVERSITY OF CALICUT SCHOOL OF DISTANCE EDUCATION B Sc. Cousellig Psychology (0 Adm.) IV SEMESTER COMPLEMENTARY COURSE PSYCHOLOGICAL STATISTICS QUESTION BANK. Iferetial statistics is the brach of statistics

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

A model of Virtual Resource Scheduling in Cloud Computing and Its

A model of Virtual Resource Scheduling in Cloud Computing and Its A model of Virtual Resource Schedulig i Cloud Computig ad Its Solutio usig EDAs 1 Jiafeg Zhao, 2 Wehua Zeg, 3 Miu Liu, 4 Guagmig Li 1, First Author, 3 Cogitive Sciece Departmet, Xiame Uiversity, Xiame,

More information

Case Study. Normal and t Distributions. Density Plot. Normal Distributions

Case Study. Normal and t Distributions. Density Plot. Normal Distributions Case Study Normal ad t Distributios Bret Halo ad Bret Larget Departmet of Statistics Uiversity of Wiscosi Madiso October 11 13, 2011 Case Study Body temperature varies withi idividuals over time (it ca

More information

AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING

AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING 1 Sumit kar, 2 Bibhudatta sahoo 1,2 NIT Rourkela/CSE, Rourkela, Idia sumitk-cs209@itrkl.ac.i, bdsahu@itrkl.ac.i ABSTRACT: Grid computig is

More information

Subject CT5 Contingencies Core Technical Syllabus

Subject CT5 Contingencies Core Technical Syllabus Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

DDoS attacks defence strategies based on nonparametric CUSUM algorithm

DDoS attacks defence strategies based on nonparametric CUSUM algorithm Abstract DDoS attacks defece strategies based o oparametric CUSUM algorithm Chaghog Ya 1*, Qi Dog 2, Hog Wag 3 1 School of Iformatio Egieerig, Yacheg Istitute of Techology, No.9 XiWag Aveue Road, Yacheg,

More information

Reliability Analysis in HPC clusters

Reliability Analysis in HPC clusters Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab

More information

Spam Detection. A Bayesian approach to filtering spam

Spam Detection. A Bayesian approach to filtering spam Spam Detectio A Bayesia approach to filterig spam Kual Mehrotra Shailedra Watave Abstract The ever icreasig meace of spam is brigig dow productivity. More tha 70% of the email messages are spam, ad it

More information

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the

More information

Heterogeneous Vehicle Routing Problem with profits Dynamic solving by Clustering Genetic Algorithm

Heterogeneous Vehicle Routing Problem with profits Dynamic solving by Clustering Genetic Algorithm IJCSI Iteratioal Joural of Computer Sciece Issues, Vol. 10, Issue 4, No 1, July 2013 ISSN (Prit): 1694-0814 ISSN (Olie): 1694-0784 www.ijcsi.org 247 Heterogeeous Vehicle Routig Problem with profits Dyamic

More information

Virtual Machine Scheduling Management on Cloud Computing Using Artificial Bee Colony

Virtual Machine Scheduling Management on Cloud Computing Using Artificial Bee Colony , March 12-14, 2014, Hog Kog Virtual Machie Schedulig Maagemet o Cloud Computig Usig Artificial Bee Coloy B. Kruekaew ad W. Kimpa Abstract Resource schedulig maagemet desig o Cloud computig is a importat

More information

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC 8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical

More information

ANALYTICS. Insights that drive your business

ANALYTICS. Insights that drive your business ANALYTICS Isights that drive your busiess Eterprises are trasformig their busiesses by supplemetig their databases with real ad up-to-date customer data. Aalytics, as a catalyst, refies raw data ad aligs

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION

CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION www.arpapress.com/volumes/vol8issue2/ijrras_8_2_04.pdf CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION Elsayed A. E. Habib Departmet of Statistics ad Mathematics, Faculty of Commerce, Beha

More information

A Method for Trust Quantificationin Cloud Computing Environments

A Method for Trust Quantificationin Cloud Computing Environments A Method for rust Quatificatioi Cloud Computig Eviromets Xiaohui Li,3, Jigsha He 2*,Bi Zhao 2, Jig Fag 2, Yixua Zhag 2, Hogxig Liag 4 College of Computer Sciece ad echology, Beiig Uiversity of echology

More information

Overview. Learning Objectives. Point Estimate. Estimation. Estimating the Value of a Parameter Using Confidence Intervals

Overview. Learning Objectives. Point Estimate. Estimation. Estimating the Value of a Parameter Using Confidence Intervals Overview Estimatig the Value of a Parameter Usig Cofidece Itervals We apply the results about the sample mea the problem of estimatio Estimatio is the process of usig sample data estimate the value of

More information

Quadrat Sampling in Population Ecology

Quadrat Sampling in Population Ecology Quadrat Samplig i Populatio Ecology Backgroud Estimatig the abudace of orgaisms. Ecology is ofte referred to as the "study of distributio ad abudace". This beig true, we would ofte like to kow how may

More information

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY Optimize your Network I the Courier, Express ad Parcel market ADDING CREDIBILITY Meetig today s challeges ad tomorrow s demads Aswers to your key etwork challeges ORTEC kows the highly competitive Courier,

More information

Hypergeometric Distributions

Hypergeometric Distributions 7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you

More information

Estimating Probability Distributions by Observing Betting Practices

Estimating Probability Distributions by Observing Betting Practices 5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

Regularized Distance Metric Learning: Theory and Algorithm

Regularized Distance Metric Learning: Theory and Algorithm Regularized Distace Metric Learig: Theory ad Algorithm Rog Ji 1 Shiju Wag 2 Yag Zhou 1 1 Dept. of Computer Sciece & Egieerig, Michiga State Uiversity, East Lasig, MI 48824 2 Radiology ad Imagig Scieces,

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

SPC for Software Reliability: Imperfect Software Debugging Model

SPC for Software Reliability: Imperfect Software Debugging Model IJCSI Iteratioal Joural of Computer Sciece Issues, Vol. 8, Issue 3, o., May 0 ISS (Olie: 694-084 www.ijcsi.org 9 SPC for Software Reliability: Imperfect Software Debuggig Model Dr. Satya Prasad Ravi,.Supriya

More information

Research Article Heuristic-Based Firefly Algorithm for Bound Constrained Nonlinear Binary Optimization

Research Article Heuristic-Based Firefly Algorithm for Bound Constrained Nonlinear Binary Optimization Advaces i Operatios Research, Article ID 215182, 12 pages http://dx.doi.org/10.1155/2014/215182 Research Article Heuristic-Based Firefly Algorithm for Boud Costraied Noliear Biary Optimizatio M. Ferada

More information

A gentle introduction to Expectation Maximization

A gentle introduction to Expectation Maximization A getle itroductio to Expectatio Maximizatio Mark Johso Brow Uiversity November 2009 1 / 15 Outlie What is Expectatio Maximizatio? Mixture models ad clusterig EM for setece topic modelig 2 / 15 Why Expectatio

More information

Research Article Allocating Freight Empty Cars in Railway Networks with Dynamic Demands

Research Article Allocating Freight Empty Cars in Railway Networks with Dynamic Demands Discrete Dyamics i Nature ad Society, Article ID 349341, 12 pages http://dx.doi.org/10.1155/2014/349341 Research Article Allocatig Freight Empty Cars i Railway Networks with Dyamic Demads Ce Zhao, Lixig

More information

5: Introduction to Estimation

5: Introduction to Estimation 5: Itroductio to Estimatio Cotets Acroyms ad symbols... 1 Statistical iferece... Estimatig µ with cofidece... 3 Samplig distributio of the mea... 3 Cofidece Iterval for μ whe σ is kow before had... 4 Sample

More information

HCL Dynamic Spiking Protocol

HCL Dynamic Spiking Protocol ELI LILLY AND COMPANY TIPPECANOE LABORATORIES LAFAYETTE, IN Revisio 2.0 TABLE OF CONTENTS REVISION HISTORY... 2. REVISION.0... 2.2 REVISION 2.0... 2 2 OVERVIEW... 3 3 DEFINITIONS... 5 4 EQUIPMENT... 7

More information

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval 1 Optimal Adaptive Badwidth Moitorig for QoS Based Retrieval Yizhe Yu, Iree Cheg ad Aup Basu (Seior Member) Departmet of Computig Sciece Uiversity of Alberta Edmoto, AB, T6G E8, CAADA {yizhe, aup, li}@cs.ualberta.ca

More information

Extracting Similar and Opposite News Websites Based on Sentiment Analysis

Extracting Similar and Opposite News Websites Based on Sentiment Analysis 202 Iteratioal Coferece o Idustrial ad Itelliget Iformatio (ICIII 202) IPCSIT vol.3 (202) (202) IACSIT Press, Sigapore Extractig Similar ad Opposite ews Websites Based o Setimet Aalysis Jiawei Zhag, Yukiko

More information

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks JONAL OF SOFTWARE, VOL. 7, NO., NOVEMBER 533 Clusterig Algorithm Aalysis of Web Users with Dissimilarity ad SOM Neal Networks Xiao Qiag School of Ecoomics ad maagemet, Lazhou Jiaotog Uiversity, Lazhou;

More information

Application of Combination Forecasting Model in the Patrol Sales Forecast

Application of Combination Forecasting Model in the Patrol Sales Forecast Joural of Applied Sciece ad Egieerig Iovatio, Vol.2 No.12, 2015, pp. 481-485 ISSN (Prit): 2331-9062 ISSN (Olie): 2331-9070 Applicatio of Combiatio Forecastig Model i the Patrol Sales Forecast Chogyu Jiag

More information

An Adaptive Method for Source-end Detection of Pulsing DoS Attacks

An Adaptive Method for Source-end Detection of Pulsing DoS Attacks , pp.279-288 http://dx.doi.org/10.14257/ijsia.2013.7.5.26 A Adaptive Method for Source-ed Detectio of Pulsig DoS Attacks Mig Yu School of Iformatio ad Commuicatio Egieerig, Dalia Uiversity of Techology,

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

SWARM INTELLIGENCE OPTIMIZATION OF WORM AND WORM WHEEL DESIGN

SWARM INTELLIGENCE OPTIMIZATION OF WORM AND WORM WHEEL DESIGN VOL. 0, NO. 3, JULY 05 ISSN 89-6608 006-05 Asia Research Publishig Network (ARPN). All rights reserved. SWARM INTELLIGENCE OPTIMIZATION OF WORM AND WORM WHEEL DESIGN M. Chadrasekara, Padmaabha S. ad V.

More information

Research Article Sign Data Derivative Recovery

Research Article Sign Data Derivative Recovery Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu Multi-server Optimal Badwidth Moitorig for QoS based Multimedia Delivery Aup Basu, Iree Cheg ad Yizhe Yu Departmet of Computig Sciece U. of Alberta Architecture Applicatio Layer Request receptio -coectio

More information

Lesson 17 Pearson s Correlation Coefficient

Lesson 17 Pearson s Correlation Coefficient Outlie Measures of Relatioships Pearso s Correlatio Coefficiet (r) -types of data -scatter plots -measure of directio -measure of stregth Computatio -covariatio of X ad Y -uique variatio i X ad Y -measurig

More information

LOAD BALANCING IN PUBLIC CLOUD COMBINING THE CONCEPTS OF DATA MINING AND NETWORKING

LOAD BALANCING IN PUBLIC CLOUD COMBINING THE CONCEPTS OF DATA MINING AND NETWORKING LOAD BALACIG I PUBLIC CLOUD COMBIIG THE COCEPTS OF DATA MIIG AD ETWORKIG Priyaka R M. Tech Studet, Dept. of Computer Sciece ad Egieerig, AIET, Karataka, Idia Abstract Load balacig i the cloud computig

More information

FACIAL EXPRESSION RECOGNITION BASED ON CLOUD MODEL

FACIAL EXPRESSION RECOGNITION BASED ON CLOUD MODEL FACIAL EXPRESSION RECOGNITION BASED ON CLOUD MODEL Hehua Chi a, Liahua Chi b *, Meg Fag a, Juebo Wu c a Iteratioal School of Software, Wuha Uiversity, Wuha 430079, Chia - hehua556@163.com b School of Computer

More information

Generalized Scheme For Fractal Based Digital Signature (GFDS)

Generalized Scheme For Fractal Based Digital Signature (GFDS) IJCSS Iteratioal Joural of Computer Sciece ad etwork Security, VOL.7 o.7, July 2007 99 Geeralized Scheme For Fractal Based Digital Sigature (GFDS) Mohammad Ahmad Alia ad Azma Bi Samsudi, School of Computer

More information

Mining Customer s Data for Vehicle Insurance Prediction System using k-means Clustering - An Application

Mining Customer s Data for Vehicle Insurance Prediction System using k-means Clustering - An Application Iteratioal Joural of Computer Applicatios i Egieerig Scieces [VOL III, ISSUE IV, DECEMBER 2013] [ISSN: 2231-4946] Miig Customer s Data for Vehicle Isurace Predictio System usig k-meas Clusterig - A Applicatio

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method

Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method Accurate ad Efficiet Traffic Moitorig Usig Adaptive No-liear Samplig Method Chegche Hu, Sheg Wag, Jia Tia, Bi Liu Tsighua Uiversity Beijig, Chia, {hucc,wags,tiaj}@mails.tsighua.edu.c liub@tsighua.edu.c

More information

Trading rule extraction in stock market using the rough set approach

Trading rule extraction in stock market using the rough set approach Tradig rule extractio i stock market usig the rough set approach Kyoug-jae Kim *, Ji-youg Huh * ad Igoo Ha Abstract I this paper, we propose the rough set approach to extract tradig rules able to discrimiate

More information

DATA MINING TO CLUSTER HUMAN PERFORMANCE BY USING ONLINE SELF REGULATING CLUSTERING METHOD

DATA MINING TO CLUSTER HUMAN PERFORMANCE BY USING ONLINE SELF REGULATING CLUSTERING METHOD Istabul, Turkey, May 7-30, 008. DATA MINING TO CLUSTE HUMAN PEFOMANCE BY USING ONLINE SELF EGULATING CLUSTEING METHOD ADEM KAAHOCA, DILEK KAAHOCA, OSMAN KAYA Bahcesehir Uiversity, Egieerig Faculty Computer

More information

Lesson 15 ANOVA (analysis of variance)

Lesson 15 ANOVA (analysis of variance) Outlie Variability -betwee group variability -withi group variability -total variability -F-ratio Computatio -sums of squares (betwee/withi/total -degrees of freedom (betwee/withi/total -mea square (betwee/withi

More information

Linear and Nonlinear Trading Models with Gradient Boosted Random Forests and Application to Singapore Stock Market *

Linear and Nonlinear Trading Models with Gradient Boosted Random Forests and Application to Singapore Stock Market * Joural of Itelliget Learig Systems ad Applicatios, 2013, 5, 1-10 http://dx.doi.org/10.4236/jilsa.2013.51001 Published Olie February 2013 (http://www.scirp.org/joural/jilsa) 1 Liear ad Noliear radig Models

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the.

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the. Cofidece Itervals A cofidece iterval is a iterval whose purpose is to estimate a parameter (a umber that could, i theory, be calculated from the populatio, if measuremets were available for the whole populatio).

More information

Research Method (I) --Knowledge on Sampling (Simple Random Sampling)

Research Method (I) --Knowledge on Sampling (Simple Random Sampling) Research Method (I) --Kowledge o Samplig (Simple Radom Samplig) 1. Itroductio to samplig 1.1 Defiitio of samplig Samplig ca be defied as selectig part of the elemets i a populatio. It results i the fact

More information

Real-Time Computing Without Stable States: A New Framework for Neural Computation Based on Perturbations

Real-Time Computing Without Stable States: A New Framework for Neural Computation Based on Perturbations Real-Time Computig Without Stable States: A New Framework for Neural Computatio Based o Perturbatios Wolfgag aass+, Thomas Natschläger+ & Hery arkram* + Istitute for Theoretical Computer Sciece, Techische

More information

How To Extract From Data From A College Course

How To Extract From Data From A College Course (IJACSA Iteratioal Joural of Advaced Computer Sciece ad Applicatios, Vol., No. 6, 0 Miig Educatioal Data to Aalyze Studets Performace Briesh Kumar Baradwa Research Scholor, Sighaiya Uiversity, Raastha,

More information

On the Periodicity of Time-series Network and Service Metrics

On the Periodicity of Time-series Network and Service Metrics O the Periodicity of Time-series Network ad Service Metrics Joseph T. Lizier ad Terry J. Dawso Telstra Research Laboratories Sydey, NSW, Australia {oseph.lizier, terry..dawso}@team.telstra.com Abstract

More information

Open Access Non-operating Urban Infrastructure Project Management Maturity Model on Agent Construction Based on the Evolutionary Algorithm

Open Access Non-operating Urban Infrastructure Project Management Maturity Model on Agent Construction Based on the Evolutionary Algorithm Sed Orders for Reprits to reprits@bethamsciece.ae 112 The Ope Costructio ad Buildig Techology Joural, 2015, 9, 112-116 Ope Access No-operatig Urba Ifrastructure Project Maagemet Maturity Model o Aget Costructio

More information

FortiGuard Fortinet s Global Security Research and Protection

FortiGuard Fortinet s Global Security Research and Protection SOLUTION BRIEF FortiGuard Fortiet s Global Research ad Protectio itelligece represets kowledge of the idetity, capabilities, ad itetios of idividuals ad orgaizatios egaged i espioage, sabotage, or theft

More information

Installment Joint Life Insurance Actuarial Models with the Stochastic Interest Rate

Installment Joint Life Insurance Actuarial Models with the Stochastic Interest Rate Iteratioal Coferece o Maagemet Sciece ad Maagemet Iovatio (MSMI 4) Istallmet Joit Life Isurace ctuarial Models with the Stochastic Iterest Rate Nia-Nia JI a,*, Yue LI, Dog-Hui WNG College of Sciece, Harbi

More information

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2 Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,

More information

University of California, Los Angeles Department of Statistics. Distributions related to the normal distribution

University of California, Los Angeles Department of Statistics. Distributions related to the normal distribution Uiversity of Califoria, Los Ageles Departmet of Statistics Statistics 100B Istructor: Nicolas Christou Three importat distributios: Distributios related to the ormal distributio Chi-square (χ ) distributio.

More information

Lecture 2: Karger s Min Cut Algorithm

Lecture 2: Karger s Min Cut Algorithm priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.

More information

BASIC STATISTICS. f(x 1,x 2,..., x n )=f(x 1 )f(x 2 ) f(x n )= f(x i ) (1)

BASIC STATISTICS. f(x 1,x 2,..., x n )=f(x 1 )f(x 2 ) f(x n )= f(x i ) (1) BASIC STATISTICS. SAMPLES, RANDOM SAMPLING AND SAMPLE STATISTICS.. Radom Sample. The radom variables X,X 2,..., X are called a radom sample of size from the populatio f(x if X,X 2,..., X are mutually idepedet

More information

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy

More information

Statistical and Fuzzy Approach for Database Security

Statistical and Fuzzy Approach for Database Security tatistical ad Fuzzy Approach for Database ecurity Gag Lu, Jukai Yi chool of Iformatio ciece ad Techology Beijig iversity of Chemical Techology Beijig 100029, Chia sizheg@126.com Kevi Lü Bruel iversity,

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

COMPUSOFT, An international journal of advanced computer technology, 3 (3), March-2014 (Volume-III, Issue-III)

COMPUSOFT, An international journal of advanced computer technology, 3 (3), March-2014 (Volume-III, Issue-III) COMPUSOFT, A iteratioal joural of advaced computer techology, 3 (3), March-2014 (Volume-III, Issue-III) ISSN:2320-0790 Adaptive Workload Maagemet for Efficiet Eergy Utilizatio o Cloud M.Prabakara 1, M.

More information

NEW HIGH PERFORMANCE COMPUTATIONAL METHODS FOR MORTGAGES AND ANNUITIES. Yuri Shestopaloff,

NEW HIGH PERFORMANCE COMPUTATIONAL METHODS FOR MORTGAGES AND ANNUITIES. Yuri Shestopaloff, NEW HIGH PERFORMNCE COMPUTTIONL METHODS FOR MORTGGES ND NNUITIES Yuri Shestopaloff, Geerally, mortgage ad auity equatios do ot have aalytical solutios for ukow iterest rate, which has to be foud usig umerical

More information

Measures of Spread and Boxplots Discrete Math, Section 9.4

Measures of Spread and Boxplots Discrete Math, Section 9.4 Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,

More information