scispace - formally typeset
Proceedings ArticleDOI

Enchanced multiclass intrusion detection using supervised learning methods

L. Anand, +1 more
- Vol. 2282, Iss: 1, pp 020044
TLDR
In this paper, a multi-class intrusion detection system has always been a viable method to accomplish higher security in recognizing harmful exercises for past recent years, which is an interruption location framework.
Abstract
Multi-class Intrusion Detection System has always been a viable method to accomplish higher security in recognizing harmful exercises for past recent years. Abnormality identification is an interruption location framework. Current inconsistency discovery is regularly connected with high bogus alert rates and just moderate precision and location rates since it can't distinguish a wide range of assaults accurately. An examination is completed to assess the presence of the diverse AI calculations utilizing the KDD-99 Cup dataset. Outcome showed which approach has been performing better in respect of precision, location rate.

read more

Citations
More filters
Journal ArticleDOI

Detection of Breast Cancer Diagnosis Algorithm Based on TWCNN Technique

TL;DR: In this article , a Two-Weight Convolutional Neural Network (TWCNN) was proposed to predict breast cancer from MRI images. But, the accuracy of the proposed TWCNN was only 98.33% on dataset 1 in the first test and 98.77% in dataset 2.
Journal ArticleDOI

Artificial Intelligence for Enhancement of Brain Image Using Semantic Segmentation CNN with IoT Classification Techniques

TL;DR: In this article , the authors presented tumor detection in the medical data model, namely, data processing, semantic segmentation, and classification, and the developed algorithms help improvise data analysis, segmentation and classification.
References
More filters
Proceedings ArticleDOI

Network Traffic Analysis and Intrusion Detection Using Packet Sniffer

TL;DR: This paper focuses on the basics of packet sniffer and its working, development of the tool on Linux platform and its use for Intrusion Detection, and ways to detect such software on the network and to handle them in an efficient way.

Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment.

TL;DR: The proposed method of integration between HTTP GET flooding among DDOS attacks and MapReduce processing for a fast attack detection in cloud computing environment is better than Snort detection method in experiment results because processing time of proposed method is shorter with increasing congestion.
Journal ArticleDOI

Analyzing Log Files for Postmortem Intrusion Detection

TL;DR: This paper proposes a novel approach for postmortem intrusion detection, which factors out repetitive behavior, thus, speeding up the process of locating the execution of an exploit, if any.
Journal ArticleDOI

Fog assisted IoT based medical cyber system for cardiovascular diseases affected patients

TL;DR: A Fog assisted IoT based cardio monitoring application is introduced to help the decision support system, which also tested with the existing analogues health care applications to show its elevated performance.
Related Papers (5)