A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
On the Use of Singular Value Decomposition for a Fast Intrusion Detection System
2006
Electronical Notes in Theoretical Computer Science
Traditionally, the application of data mining in intrusion detection systems (IDS) concentrates on the construction of operational IDSs. ...
The present study investigates the applicability of Spectral Analysis technique -singular value decomposition (SVD) as a preprocessing step to reduce the dimensionality of the data. ...
We make use of Spectral Analysis to reduce the size of the vectors (explained later) derived from the sequence of system calls by using singular value decomposition (SVD) [8] . ...
doi:10.1016/j.entcs.2004.12.043
fatcat:i36mbv4xnbdlne3ewbiwlr27pe
Comparing the Area of Data Mining Algorithms in Network Intrusion Detection
2020
Journal of Information Security
The reconstruction loss is used to decide the intrusion class for a given network feature. ...
In this work, we utilize the singular valued decomposition technique for feature dimension reduction. We further reconstruct the features form reduced features and the selected eigenvectors. ...
Conflicts of Interest The authors declare no conflicts of interest regarding the publication of this paper. ...
doi:10.4236/jis.2020.111001
fatcat:e6pn2ftmtrepldmortwdfyedr4
Symmetry-Adapted Machine Learning for Information Security
2020
Symmetry
These areas include malware classification, intrusion detection systems, image watermarking, color image watermarking, battlefield target aggregation behavior recognition models, Internet Protocol (IP) ...
Therefore, we accepted twelve articles for this Special Issue that explore the deployment of symmetry-adapted machine learning for information security in various application areas. ...
Conflicts of Interest: The author declares no conflict of interest. ...
doi:10.3390/sym12061044
fatcat:dury4tukzre7hblsusdxcg4zee
Novel Intrusion Detection Method based on Triangular Matrix Factorization
2016
International Journal of Security and Its Applications
In this paper, a novel intrusion detection method based on improved triangular matrix factorization is presented. ...
In order to deal with the issue of network attacks and enhance the security of the network environment, intrusion detection is gaining more and more attention all over the world. ...
Acknowledgements The authors thank the anonymous reviewers and editors for their invaluable suggestions. ...
doi:10.14257/ijsia.2016.10.7.22
fatcat:3hym73d7xnf25dvpj3p4axxy4u
Principle Components Analysis and Multi Layer Perceptron Based Intrusion Detection System
2013
˜Al-œRafidain journal for computer sciences and mathematics
The key idea is to take advantage of different feature of NSL-KDD data set and choose the best feature of data, and using neural network for classification of intrusion detection. ...
Security has become an important issue for networks. Intrusion detection technology is an effective approach in dealing with the problems of network security. ...
PCA can be done by eigen value decomposition of a data covariance matrix or singular value decomposition of a data matrix. ...
doi:10.33899/csmj.2013.163430
fatcat:nkpcpozz2re5deft26tdl6ooti
A Novel Method for Unsupervised Anomaly Detection Using Unlabelled Data
2008
2008 International Conference on Computational Sciences and Its Applications
Using a set of benchmark data from KDD (Knowledge Discovery and Data Mining) Competition designed by DARPA for demonstrate to detection intrusions. ...
Moreover, PCA is applied to reduce the high dimensional data vectors and distance between a vector and its projection onto the subspace reduced is used for anomaly detection. ...
PCA using Singular Value Decomposition (SVD) Another algebraic solution for PCA and in the process, find that PCA is closely related to singular value decomposition (SVD). [14] . ...
doi:10.1109/iccsa.2008.70
dblp:conf/iccsa/IsmailABNDC08
fatcat:tcfjo5c6nvholovc5zogxdu2ca
Dual Watermarking Scheme with Encryption
[article]
2010
arXiv
pre-print
In the proposed system, a Dual Watermarking Scheme based on DWT SVD with chaos encryption algorithm, will be developed to improve the robustness and protection along with security. ...
The watermarked image is decrypted and a reliable watermark extraction scheme is developed for the extraction of the primary as well as secondary watermark from the distorted image. ...
For each non-zero singular value λ of A, B has L 1 λ . C is a columnscaled version of A by repeating every column for L 2 times. For each nonzero singular value λ of A, C has L 2 λ. ...
arXiv:1002.2414v1
fatcat:vdjqcq6qcbdafceqmo4j3gslra
Enhancing Detection Performance of the Phase-Sensitive OTDR Based Distributed Vibration Sensor Using Weighted Singular Value Decomposition
2021
Applied Sciences
We propose a weighted singular value decomposition (WSVD) to reduce the random noise in the Rayleigh backscattering signal of the phase-sensitive optical time domain reflectometry (Φ-OTDR) to enhance the ...
detection performance of the distributed vibration sensing. ...
[12] demonstrated a distributed fiber intrusion sensor using Φ-OTDR based on direct detection that uses a simple averaging method to obtain the location information of intrusion detection with low SNR ...
doi:10.3390/app11041928
fatcat:xy2sng7vsvbrvelchvzzeacnka
A Hybrid Database Intrusion Detection Algorithm Using Swarm Intelligence and Radial Basis Function Network
2019
Helix
This paper presents a hybrid intrusion detection algorithm in Database System by making use of swarm intelligence and radial basis function network. ...
Recently, all over the globe, intrusion detection especially in Database gaining lots of attentions from researchers as it serves a security support system to existing security mechanism. ...
To optimize radii and weight, we use K-nearest Neighbourhood and Singular Value Decomposition (SVD) algorithm Algorithm: Randomly initialize center. Initialize Radii r using KNN Use SVD to initialize ...
doi:10.29042/2019-5031-5035
fatcat:3b74kjmcevgr3fzhexrkbrk26e
Robust watermarking based on DWT SVD
[article]
2013
arXiv
pre-print
DWT (Discrete Wavelet Transform) and SVD (Singular Value Decomposition) have been used to embed two watermarks in the HL and LH bands of the host image. ...
It is a branch of information hiding which is used to hide proprietary information in digital media like photographs, digital music, digital video etc. ...
For each nonzero singular value λ of A, C has L 2 λ. ...
arXiv:1309.2423v7
fatcat:z5vlfyzfx5bcdbgclxybhl2cqe
Study of Self-Similarity for Detection of Rate-based Network Anomalies
2017
International Journal of Security and Its Applications
A brief overview on network intrusion detection systems is discussed next. 29 The main drawbacks or weaknesses of signature based systems are: Signature based intrusion detection systems are automatic ...
security models that rely on simple, straight forward rules for detection of intrusions. ...
To name a few, some of the pioneer works have been done using techniques
Network Intrusion Detection Systems A Network Intrusion Detection System (NIDS) can be defined as software that is designed to ...
doi:10.14257/ijsia.2017.11.8.03
fatcat:dhlunvvph5hafjpyyceoeq6sfe
Performance Assessment of Ids Based on Cicids-2017 Dataset
2020
International journal of recent technology and engineering
Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) are the tools used to defend against these intrusion activities. IDS sometimes is prone to false alarms. ...
Therefore, network engineers pose a great challenge in network security to identify intrusion activities. ...
So, to notify a person that an attack or network intrusion has taken place, there should be an Intrusion Detection System (IDS). Research on IDS is still going on to propose a better IDS system. ...
doi:10.35940/ijrte.f9061.038620
fatcat:phisknnmrra3hcta2hdjrmvvvu
Intrusion detection techniques based on improved intuitionistic fuzzy neural networks
2017
International Journal of Innovative Computing and Applications
The approach relies on monitoring the security state by using a set of accurate metrics. NSST is used to decompose these metrics. ...
At present, the issue of intrusion detection has been a hot point in the computer security area. In this paper, three novel intrusion detection schemes have been proposed. ...
Acknowledgements The authors would like to thank all the reviewers and editors for their valuable comments and works. The work was supported in part by the National Natural Science ...
doi:10.1504/ijica.2017.082496
fatcat:5gvij64ewbfsvalc2o7p3nwe5q
Smart Fence: Decentralized Sequential Hypothesis Testing for Perimeter Security
[chapter]
2013
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Results from several deployments show 100% detection rates within one second of the intrusion. ...
The system is presented as a viable replacement for much more expensive and less performant security systems. ...
We would like to thank Chevron ETC and Chevron ITC for funding and supporting this project. ...
doi:10.1007/978-3-319-04166-7_5
fatcat:y6t7ra37jndkrgqwrjy7u4ryry
INTRUSION DETECTION AND PREVENTION FRAMEWORK USING DATA MINING TECHNIQUES FOR FINANCIAL SECTOR
2021
Acta Informatica Malaysia
Intrusion detection does not include the prevention of intrusions. A different solution is required for intrusion prevention. ...
Intrusion detection (ID) is the act of detecting actions that attempt to compromise the confidentiality, integrity, or availability of a shared resource over a network. ...
In other studies, researchers presented Fast Intrusion Detection System (FIDS) with the help of the singular value decomposition (SVD) method . ...
doi:10.26480/aim.02.2021.58.61
fatcat:4ismoi65mbh4hjxkfoahqf6wmu
« Previous
Showing results 1 — 15 out of 2,065 results