Proceedings ArticleDOI
Enchanced multiclass intrusion detection using supervised learning methods
L. Anand,Neelanarayanan Venkataraman +1 more
- Vol. 2282, Iss: 1, pp 020044
TLDR
In this paper, a multi-class intrusion detection system has always been a viable method to accomplish higher security in recognizing harmful exercises for past recent years, which is an interruption location framework.Abstract:
Multi-class Intrusion Detection System has always been a viable method to accomplish higher security in recognizing harmful exercises for past recent years. Abnormality identification is an interruption location framework. Current inconsistency discovery is regularly connected with high bogus alert rates and just moderate precision and location rates since it can't distinguish a wide range of assaults accurately. An examination is completed to assess the presence of the diverse AI calculations utilizing the KDD-99 Cup dataset. Outcome showed which approach has been performing better in respect of precision, location rate.read more
Citations
More filters
Journal ArticleDOI
Detection of Breast Cancer Diagnosis Algorithm Based on TWCNN Technique
TL;DR: In this article , a Two-Weight Convolutional Neural Network (TWCNN) was proposed to predict breast cancer from MRI images. But, the accuracy of the proposed TWCNN was only 98.33% on dataset 1 in the first test and 98.77% in dataset 2.
Journal ArticleDOI
Artificial Intelligence for Enhancement of Brain Image Using Semantic Segmentation CNN with IoT Classification Techniques
TL;DR: In this article , the authors presented tumor detection in the medical data model, namely, data processing, semantic segmentation, and classification, and the developed algorithms help improvise data analysis, segmentation and classification.
References
More filters
Proceedings ArticleDOI
Network Traffic Analysis and Intrusion Detection Using Packet Sniffer
TL;DR: This paper focuses on the basics of packet sniffer and its working, development of the tool on Linux platform and its use for Intrusion Detection, and ways to detect such software on the network and to handle them in an efficient way.
Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment.
TL;DR: The proposed method of integration between HTTP GET flooding among DDOS attacks and MapReduce processing for a fast attack detection in cloud computing environment is better than Snort detection method in experiment results because processing time of proposed method is shorter with increasing congestion.
Journal ArticleDOI
Analyzing Log Files for Postmortem Intrusion Detection
TL;DR: This paper proposes a novel approach for postmortem intrusion detection, which factors out repetitive behavior, thus, speeding up the process of locating the execution of an exploit, if any.
Journal ArticleDOI
Fog assisted IoT based medical cyber system for cardiovascular diseases affected patients
T. Karthick,M. Manikandan +1 more
TL;DR: A Fog assisted IoT based cardio monitoring application is introduced to help the decision support system, which also tested with the existing analogues health care applications to show its elevated performance.
Related Papers (5)
Intrusion Detection in Computer Networks based on Machine Learning Algorithms
Alireza Osareh,Bita Shadgar +1 more