Computational intelligence in intrusion detection systems
|
|
- Imogen Glenn
- 8 years ago
- Views:
Transcription
1 Computational intelligence in intrusion detection systems --- An introduction to an introduction Rick TEIL
2 Reference The use of computational intelligence in intrusion detection systems : A review Shelly Xiaonan Wu, Wolfgang Banzhaf Applied Soft Computing 2009
3 Intrusion prevention techniques Intrusion detection systems (IDS) Fire walls Access control Encryption Data collection Data preprocessing Intrusion recognition Reporting Response
4 History of IDS 1987 early 1990s late 1990s D.E. Denning proposed an intrusion detection model Combinations of expert systems and statistical approaches Automated knowledge acquisition Combine with computational intelligence
5 Computational intelligence J.C. Bezdek (1994) : A system is computational intelligent when it: deals with only numerical (low-level) data, has pattern recognition components does not use knowledge in the artificial intelligence sense; and additionally when it (begins to) exhibit (i) computational adaptivity, (ii) computational fault tolerance, (iii) speed approaching human-like turnaround, and (iv) error rates that approximate human performance.
6 Computational intelligence Artificial neural networks Fuzzy sets Evolutionary computation methods Artificial immune systems Swarm intelligence Soft computing.
7 Roadmap Introduction to intrusion detection systems (IDS) Evolutionary computation methods Artificial immune systems Swarm intelligence Discussion
8 Intrusion detection system Solid lines : data/control flow Dashed lines : responses to intrusive activities.
9 Intrusion detection system IDS Misuse detection Anomaly detection Predefined descriptions of intrusive behaviors Supervised learning Fail easily when facing unknown intrusions Hypothesize that abnormal behavior is rare and different from normal behavior Unsupervised learning Difficulties: deficiency of abnormal samples, adaption to constantly changing normal behavior
10 Evolutionary computation
11 Evolutionary computation Genetic algorithms Automatic model structure design Classifiers Genetic programming Classifiers
12 Automatic model structure design Artificial neural networks need optimal structures. Clustering algorithms need the number of clusters. Use GA to search the right structure or parameters
13 Classifiers Classification rules Transformation functions GA: search the parameters GP: search the functions
14 Niching and fitness function Niching techniques are adopted. Fitness sharing, crowding, voting, token competition Fitness function Detection rate False positive rate Conciseness
15 Challenges No reasonable termination criterion Niching Distributed EC models Unbalanced data distribution
16 Artificial immune system
17 Human immune system Innate immune system Adaptive immune system
18 Innate immune system 1. Skin 2. Respiratory tract 3. Gastrointestinal tract 4. Urogenital tract ***CORPORATION 1. Phagocytosis 2. Inflammation 3. Complement 4. Interferon
19 Adaptive immune system 1. Skin 2. Respiratory tract 3. Gastrointestinal tract 4. Urogenital tract ***CORPORATION 1. Phagocytosis 2. Inflammation 3. Complement 4. Interferon
20 ***CORPORATION Adaptive immune system
21 T-cell helper IL-1 IL-2 killer supressor memory M T4 IL-6 Plasm cell B-cell Ig ***CORPORATION memory
22 Normally, lymphocytes do not attack normal cells, why? Lymphocytes must be mature before leaving red bone marrow.
23 Maturation To avoid autoimmunity, T cells and B cells must pass a negative selection stage, where lymphocytes which match self cells are killed. (These mature lymphocytes have never encountered antigens.)
24 Artificial immune system (AIS) Anomaly detection Instead of building models for the normal, they generate non-self (anomalous) patterns by giving normal data.
25 Negative selection
26 Self non-self discrimination model
27 Lifespan model
28 An evolutionary AIS model Three stages : gene library evolution negative selection clonal selection Immature detectors, rather than generated randomly, are created by selecting and rearranging useful genes. The library evolves. The clonal selection detects various intrusions with a limited number of detectors, generates memory detectors, and drives the gene library evolution.
29
30 Challenges Fitting to real-world environments Avoid the scaling problem Detect and fill holes Estimate the coverage of rule sets Deal with a high volume and dimensional data Adapting to changes in self data Integrating immune responses
31 Swarm intelligence
32 Ant colony optimization Use ACO to keep track of intruder trails Identify affected paths of intrusion in a sensor network by investigating the pheromone concentration Clustering local strategy rules
33 Particle swarm optimization Learn classification rules divide-and-conquer : Use PSO to find the best rule covering current training set Remove those covered points
34 Discussion
35 Performance
36 Research
37 Challenges Good benchmark datasets Old and unrealistic Ability of adaptation to constantly changing environments intrusive behavior legitimate behavior systems networks
38 Thanks
An Artificial Immune Model for Network Intrusion Detection
An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,
More informationArtificial Immune Systems and Applications for Computer Security
Università degli Studi di Milano Dipartimento di Tecnologie dell Informazione Artificial Immune Systems and Applications for Computer Security Antonia Azzini and Stefania Marrara Artificial Immune System
More informationThe Human Immune System and Network Intrusion Detection
The Human Immune System and Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,
More informationProjects - Neural and Evolutionary Computing
Projects - Neural and Evolutionary Computing 2014-2015 I. Application oriented topics 1. Task scheduling in distributed systems. The aim is to assign a set of (independent or correlated) tasks to some
More informationName (print) Name (signature) Period. (Total 30 points)
AP Biology Worksheet Chapter 43 The Immune System Lambdin April 4, 2011 Due Date: Thurs. April 7, 2011 You may use the following: Text Notes Power point Internet One other person in class "On my honor,
More information14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO)
Overview Kyrre Glette kyrrehg@ifi INF3490 Swarm Intelligence Particle Swarm Optimization Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) 3 Swarms in nature Fish, birds,
More informationD A T A M I N I N G C L A S S I F I C A T I O N
D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.
More informationspecific B cells Humoral immunity lymphocytes antibodies B cells bone marrow Cell-mediated immunity: T cells antibodies proteins
Adaptive Immunity Chapter 17: Adaptive (specific) Immunity Bio 139 Dr. Amy Rogers Host defenses that are specific to a particular infectious agent Can be innate or genetic for humans as a group: most microbes
More informationA SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
More informationA Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
More informationThe Use of Computational Intelligence in Intrusion Detection Systems: A Review
Technical Report #2008-05 The Use of Computational Intelligence in Intrusion Detection Systems: A Review by Shelly Xiaonan Wu* Wolfgang Banzhaf Email: xiaonan@cs.mun.ca, banzhaf@cs.mun.ca Department of
More informationCredit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
More informationA DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM
A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM Walid Mohamed Alsharafi and Mohd Nizam Omar Inter Networks Research Laboratory, School of Computing, College
More informationThe Immune System: A Tutorial
The Immune System: A Tutorial Modeling and Simulation of Biological Systems 21-366B Shlomo Ta asan Images taken from http://rex.nci.nih.gov/behindthenews/uis/uisframe.htm http://copewithcytokines.de/ The
More informationChapter 43: The Immune System
Name Period Our students consider this chapter to be a particularly challenging and important one. Expect to work your way slowly through the first three concepts. Take particular care with Concepts 43.2
More informationShafzon@yahool.com. Keywords - Algorithm, Artificial immune system, E-mail Classification, Non-Spam, Spam
An Improved AIS Based E-mail Classification Technique for Spam Detection Ismaila Idris Dept of Cyber Security Science, Fed. Uni. Of Tech. Minna, Niger State Idris.ismaila95@gmail.com Abdulhamid Shafi i
More informationA Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
More informationMicrobiology AN INTRODUCTION EIGHTH EDITION
TORTORA FUNKE CASE Microbiology AN INTRODUCTION EIGHTH EDITION Differentiate between innate and acquired immunity. Chapter 17 Specific Defenses of the Host: The Immune Response B.E Pruitt & Jane J. Stein
More informationPractical Applications of Evolutionary Computation to Financial Engineering
Hitoshi Iba and Claus C. Aranha Practical Applications of Evolutionary Computation to Financial Engineering Robust Techniques for Forecasting, Trading and Hedging 4Q Springer Contents 1 Introduction to
More informationAn Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors
Int. Journ. of Unconventional Computing, Vol. 1, pp. 221 254 Reprints available directly from the publisher Photocopying permitted by license only 2005 Old City Publishing, Inc. Published by license under
More informationOne of the more complex systems we re looking at. An immune response (a response to a pathogen) can be of two types:
Immune system. One of the more complex systems we re looking at. An immune response (a response to a pathogen) can be of two types: (pathogen - disease causing organism) 1) Non specific. Anything foreign
More informationManjeet Kaur Bhullar, Kiranbir Kaur Department of CSE, GNDU, Amritsar, Punjab, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Multiple Pheromone
More informationENSREdm: E-government Network Security Risk Evaluation Method Based on Danger Model
Research Journal of Applied Sciences, Engineering and Technology 5(21): 4988-4993, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: July 31, 2012 Accepted: September
More informationHybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
More informationIntrusion Detection for Grid and Cloud Computing
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal University of Santa Catarina, Brazil Content Type
More informationA survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
More informationImmunity. Humans have three types of immunity innate, adaptive, and passive: Innate Immunity
Immunity Humans have three types of immunity innate, adaptive, and passive: Innate Immunity Everyone is born with innate (or natural) immunity, a type of general protection. Many of the germs that affect
More informationProceedings of the Federated Conference on Computer Science and Information Systems pp. 597 602
Proceedings of the Federated Conference on Computer Science and Information Systems pp. 597 602 ISBN 978-83-60810-51-4 Detectors Generation using Genetic Algorithm for a Negative Selection Inspired Anomaly
More informationRobust Preprocessing and Random Forests Technique for Network Probe Anomaly Detection
International Journal of Soft Computing and Engineering (IJSCE) Robust Preprocessing and Random Forests Technique for Network Probe Anomaly Detection G. Sunil Kumar, C.V.K Sirisha, Kanaka Durga.R, A.Devi
More informationBio 20 Chapter 11 Workbook Blood and the Immune System Ms. Nyboer
Bio 20 Chapter 11 Workbook Blood and the Immune System Ms. Nyboer Name: Part A: Components of Blood 1. List the 3 plasma proteins and describe the function of each Albumins osmotic balance Globulins antibodies,
More informationThe Immune System. 2 Types of Defense Mechanisms. Lines of Defense. Line of Defense. Lines of Defense
The Immune System 2 Types of Defense Mechanisms Immune System the system that fights infection by producing cells to inactivate foreign substances to avoid infection and disease. Immunity the body s ability
More informationUSING GENETIC ALGORITHM IN NETWORK SECURITY
USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:
More informationDetection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
More informationProcedia Computer Science
Procedia Computer Science 00 (2011) 000 000 Procedia Computer Science www.elsevier.com/locate/procedia WCIT-2011 Host Based Anomaly Detection Using a Combination of Artificial Immune Systems and Hypervisor
More informationA Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks
A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks Text Analytics World, Boston, 2013 Lars Hard, CTO Agenda Difficult text analytics tasks Feature extraction Bio-inspired
More informationMACHINE LEARNING & INTRUSION DETECTION: HYPE OR REALITY?
MACHINE LEARNING & INTRUSION DETECTION: 1 SUMMARY The potential use of machine learning techniques for intrusion detection is widely discussed amongst security experts. At Kudelski Security, we looked
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
More informationThe Body s Defenses CHAPTER 24
CHAPTER 24 The Body s Defenses PowerPoint Lectures for Essential Biology, Third Edition Neil Campbell, Jane Reece, and Eric Simon Essential Biology with Physiology, Second Edition Neil Campbell, Jane Reece,
More informationAdaptive Anomaly Detection for Network Security
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 1 (2013), pp. 1-9 International Research Publication House http://www.irphouse.com Adaptive Anomaly Detection for
More informationApplication of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology leiminxuan@sohu.com Abstract: The article introduced the importance of intrusion detection, as well as
More informationA Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi School of Computing Queen s University Kingston, Ontario,
More informationCall for Paper Journal of Medical Imaging and Health Informatics Special issue on
Call for Paper Journal of Medical Imaging and Health Informatics Special issue on Application of Wireless communication for Medical Imaging and Health Informatics The applications of wireless communication
More informationAN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 AN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO 1 Preeti Bala Thakur, 2 Prof. Toran Verma 1 Dept. of
More informationData Security Strategy Based on Artificial Immune Algorithm for Cloud Computing
Appl. Math. Inf. Sci. 7, No. 1L, 149-153 (2013) 149 Applied Mathematics & Information Sciences An International Journal Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing Chen
More informationA HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of
More informationAn ACO Approach to Solve a Variant of TSP
An ACO Approach to Solve a Variant of TSP Bharat V. Chawda, Nitesh M. Sureja Abstract This study is an investigation on the application of Ant Colony Optimization to a variant of TSP. This paper presents
More informationHoney Bee Intelligent Model for Network Zero Day Attack Detection
Honey Bee Intelligent Model for Network Zero Day Attack Detection 1 AMAN JANTAN, 2 ABDULGHANI ALI AHMED School of Computer Sciences, Universiti Sains Malaysia (USM), Penang, Malaysia 1 aman@cs.usm.my,
More informationThe Multi-Agents Immune System for Network Intrusions Detection (MAISID)
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
More informationThe Human Immune System
The Human Immune System What is the immune system? The body s defense against disease causing organisms, malfunctioning cells, and foreign particles The First Line of Defense Skin The dead, outer layer
More informationHow To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
More informationSelective IgA deficiency (slgad) hello@piduk.org 0800 987 8986 www.piduk.org
Selective IgA deficiency (slgad) hello@piduk.org 0800 987 8986 www.piduk.org About this booklet This booklet provides information on selective IgA deficiency (sigad). It has been produced by the PID UK
More informationA hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation
A hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation Abhishek Singh Department of Information Technology Amity School of Engineering and Technology Amity
More informationAn Efficient Three-phase Email Spam Filtering Technique
An Efficient Three-phase Email Filtering Technique Tarek M. Mahmoud 1 *, Alaa Ismail El-Nashar 2 *, Tarek Abd-El-Hafeez 3 *, Marwa Khairy 4 * 1, 2, 3 Faculty of science, Computer Sci. Dept., Minia University,
More informationBuilding accurate intrusion detection systems. Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory
Building accurate intrusion detection systems Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory Outline Brief introduction to intrusion detection The MAFTIA project Accurate intrusion
More informationANIMALS FORM & FUNCTION BODY DEFENSES NONSPECIFIC DEFENSES PHYSICAL BARRIERS PHAGOCYTES. Animals Form & Function Activity #4 page 1
AP BIOLOGY ANIMALS FORM & FUNCTION ACTIVITY #4 NAME DATE HOUR BODY DEFENSES NONSPECIFIC DEFENSES PHYSICAL BARRIERS PHAGOCYTES Animals Form & Function Activity #4 page 1 INFLAMMATORY RESPONSE ANTIMICROBIAL
More informationNetwork Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
More informationFUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges Bridges@cs.msstate.edu Rayford B. Vaughn vaughn@cs.msstate.edu 23 rd National Information Systems Security Conference
More information1) Siderophores are bacterial proteins that compete with animal A) Antibodies. B) Red blood cells. C) Transferrin. D) White blood cells. E) Receptors.
Prof. Lester s BIOL 210 Practice Exam 4 (There is no answer key. Please do not email or ask me for answers.) Chapters 15, 16, 17, 19, HIV/AIDS, TB, Quorum Sensing 1) Siderophores are bacterial proteins
More informationSURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
More informationDanger Theory Based Hybrid Intrusion Detection Systems for Cloud Computing
Danger Theory Based Hybrid Intrusion Detection Systems for Cloud Computing Azuan Ahmad, Bharanidharan Shanmugam, Norbik Bashah Idris, Ganthan Nayarana Samy, and Sameer Hasan AlBakri Abstract Cloud Computing
More informationBasics of Immunology
Basics of Immunology 2 Basics of Immunology What is the immune system? Biological mechanism for identifying and destroying pathogens within a larger organism. Pathogens: agents that cause disease Bacteria,
More informationKeywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
More informationA Neural Network Based System for Intrusion Detection and Classification of Attacks
A Neural Network Based System for Intrusion Detection and Classification of Attacks Mehdi MORADI and Mohammad ZULKERNINE Abstract-- With the rapid expansion of computer networks during the past decade,
More informationResearch Article www.ijptonline.com EFFICIENT TECHNIQUES TO DEAL WITH BIG DATA CLASSIFICATION PROBLEMS G.Somasekhar 1 *, Dr. K.
ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com EFFICIENT TECHNIQUES TO DEAL WITH BIG DATA CLASSIFICATION PROBLEMS G.Somasekhar 1 *, Dr. K.Karthikeyan 2 1 Research
More information10. T and B cells are types of a. endocrine cells. c. lymphocytes. b. platelets. d. complement cells.
Virus and Immune System Review Directions: Write your answers on a separate piece of paper. 1. Why does a cut in the skin threaten the body s nonspecific defenses against disease? a. If a cut bleeds, disease-fighting
More informationDECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES Vijayalakshmi Mahanra Rao 1, Yashwant Prasad Singh 2 Multimedia University, Cyberjaya, MALAYSIA 1 lakshmi.mahanra@gmail.com
More informationIntrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department
More informationIntrusion Detection Systems using Genetic Algorithms
King Saud University Computer Science Collage CSC590_Selected Topic A Literature Review on Intrusion Detection Systems using Genetic Algorithms Phase # 5 By: Lamees Alhazzaa ID: 426221091 Proposed to:
More informationIdentifying Online Credit Card Fraud using Artificial Immune Systems
Provided by the author(s) and University College Dublin Library in accordance with publisher policies. Please cite the published version when available. Title Identifying online credit card fraud using
More informationDan French Founder & CEO, Consider Solutions
Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The
More informationIncreasing the Accuracy of a Spam-Detecting Artificial Immune System
Increasing the Accuracy of a Spam-Detecting Artificial Immune System Terri Oda Carleton University terri@zone12.com Tony White Carleton University arpwhite@scs.carleton.ca Abstract- Spam, the electronic
More informationImmunity Unit Test Z
Immunity Unit Test Z Name MB Multiple Choice Identify the choice that best completes the statement or answers the question. 1. Which of the pathogens in Figure 31.1 cause disease by taking over healthy
More informationLymph capillaries, Lymphatic collecting vessels, Valves, Lymph Duct, Lymph node, Vein
WLHS/A&P/Oppelt Name Lymphatic System Practice 1. Figure 12-1 provides an overview of the lymphatic vessels. First color code the following structures. Color code in Figure 12-1 Heart Veins Lymphatic vessels/lymph
More informationSystem Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
More informationAN IMMUNE AGENTS SYSTEM FOR NETWORK INTRUSIONS DETECTION
AN IMMUNE AGENTS SYSTEM FOR NETWORK INTRUSIONS DETECTION Noria Benyettou 1, Abdelkader Benyettou 2 and Vincent Rodin 3 1 University of Science and Technology of Oran Mohamed Boudiaf USTOMB, SIMPA Laboratory,
More informationData Mining Application for Cyber Credit-card Fraud Detection System
, July 3-5, 2013, London, U.K. Data Mining Application for Cyber Credit-card Fraud Detection System John Akhilomen Abstract: Since the evolution of the internet, many small and large companies have moved
More informationPerformance Evaluation of Intrusion Detection Systems using ANN
Performance Evaluation of Intrusion Detection Systems using ANN Khaled Ahmed Abood Omer 1, Fadwa Abdulbari Awn 2 1 Computer Science and Engineering Department, Faculty of Engineering, University of Aden,
More informationConclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
More informationThe Immune System. How your immune system works. Organs of the Immune System
UW MEDICINE PATIENT EDUCATION The Immune System How your immune system works The immune system is a network of special cells, tissues, and organs that defend the body against attacks from foreign invaders,
More informationAsthma (With a little SCID to start) Disclosures Outline Starting with the Immune System The Innate Immune System The Adaptive Immune System
1 2 3 4 5 6 7 8 9 Asthma (With a little SCID to start) Lauren Smith, MD CHKD Pediatric Allergy/Immunology Disclosures None Will be discussing some medications that are not yet FDA approved Outline SCID
More informationMagicNET: The Human Immune System and Network Security System
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.1, January 2009 87 MagicNET: The Human Immune System and Network Security System Muhammad Awais Shibli,, Jeffy Mwakalinga,
More informationExtraction of Satellite Image using Particle Swarm Optimization
Extraction of Satellite Image using Particle Swarm Optimization Er.Harish Kundra Assistant Professor & Head Rayat Institute of Engineering & IT, Railmajra, Punjab,India. Dr. V.K.Panchal Director, DTRL,DRDO,
More informationArtificial Intelligence (AI)
Overview Artificial Intelligence (AI) A brief introduction to the field. Won t go too heavily into the theory. Will focus on case studies of the application of AI to business. AI and robotics are closely
More informationFeature Subset Selection in E-mail Spam Detection
Feature Subset Selection in E-mail Spam Detection Amir Rajabi Behjat, Universiti Technology MARA, Malaysia IT Security for the Next Generation Asia Pacific & MEA Cup, Hong Kong 14-16 March, 2012 Feature
More informationNetwork Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016
Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
More informationIntroduction. Swarm Intelligence - Thiemo Krink EVALife Group, Dept. of Computer Science, University of Aarhus
Swarm Intelligence - Thiemo Krink EVALife Group, Dept. of Computer Science, University of Aarhus Why do we need new computing techniques? The computer revolution changed human societies: communication
More informationUsing Genetic Algorithm for Network Intrusion Detection
Using Genetic Algorithm for Network Intrusion Detection Wei Li Department of Computer Science and Engineering Mississippi State University, Mississippi State, MS 39762 Email: wli@cse.msstate.edu Abstract
More informationAnt Colony Optimization and Constraint Programming
Ant Colony Optimization and Constraint Programming Christine Solnon Series Editor Narendra Jussien WILEY Table of Contents Foreword Acknowledgements xi xiii Chapter 1. Introduction 1 1.1. Overview of the
More informationSTUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
More informationDEVELOPMENT OF A COMPUTATIONAL INTELLIGENCE COURSE FOR UNDERGRADUATE AND GRADUATE STUDENTS
DEELOPMENT OF A COMPUTATIONAL INTELLIGENCE COURSE FOR UNDERGRADUATE AND GRADUATE STUDENTS Ganesh K. enayagamoorthy Department of Electrical and Computer Engineering University of Missouri Rolla, MO 65409,
More informationNeural Networks for Intrusion Detection and Its Applications
, July 3-5, 2013, London, U.K. Neural Networks for Intrusion Detection and Its Applications E.Kesavulu Reddy, Member IAENG Abstract: With rapid expansion of computer networks during the past decade, security
More informationActivation and effector functions of HMI
Activation and effector functions of HMI Hathairat Thananchai, DPhil Department of Microbiology Faculty of Medicine Chiang Mai University 25 August 2015 ว ตถ ประสงค หล งจากช วโมงบรรยายน แล วน กศ กษาสามารถ
More informationMachine Learning. Chapter 18, 21. Some material adopted from notes by Chuck Dyer
Machine Learning Chapter 18, 21 Some material adopted from notes by Chuck Dyer What is learning? Learning denotes changes in a system that... enable a system to do the same task more efficiently the next
More informationMachine Learning: Overview
Machine Learning: Overview Why Learning? Learning is a core of property of being intelligent. Hence Machine learning is a core subarea of Artificial Intelligence. There is a need for programs to behave
More informationCS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
More informationCHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
More informationCore Topic 2. The immune system and how vaccines work
Core Topic 2 The immune system and how vaccines work Learning outcome To be able to describe in outline the immune system and how vaccines work in individuals and populations Learning objectives Explain
More informationDesign of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in the Retail Sector
Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in the Retail Sector Jungwon Kim, Arlene Ong and Richard E Overill Department of Computer Science, King s
More informationResearch on Network Security Situation Awareness Technology based on AIS SunJun Liu 1 1 Department of Computer Science
International Journal of Knowledge www.ijklp.org and Language Processing AKLP International c2011 ISSN 2191-2734 Volume 2, Number 2, April 2011 pp. 23-34 Research on Network Security Situation Awareness
More information