2,065 Hits in 6.0 sec

On the Use of Singular Value Decomposition for a Fast Intrusion Detection System

Sanjay Rawat, Arun K. Pujari, V.P. Gulati
2006 Electronical Notes in Theoretical Computer Science  
Traditionally, the application of data mining in intrusion detection systems (IDS) concentrates on the construction of operational IDSs.  ...  The present study investigates the applicability of Spectral Analysis technique -singular value decomposition (SVD) as a preprocessing step to reduce the dimensionality of the data.  ...  We make use of Spectral Analysis to reduce the size of the vectors (explained later) derived from the sequence of system calls by using singular value decomposition (SVD) [8] .  ... 
doi:10.1016/j.entcs.2004.12.043 fatcat:i36mbv4xnbdlne3ewbiwlr27pe

Comparing the Area of Data Mining Algorithms in Network Intrusion Detection

Yasamin Alagrash, Azhar Drebee, Nedda Zirjawi
2020 Journal of Information Security  
The reconstruction loss is used to decide the intrusion class for a given network feature.  ...  In this work, we utilize the singular valued decomposition technique for feature dimension reduction. We further reconstruct the features form reduced features and the selected eigenvectors.  ...  Conflicts of Interest The authors declare no conflicts of interest regarding the publication of this paper.  ... 
doi:10.4236/jis.2020.111001 fatcat:e6pn2ftmtrepldmortwdfyedr4

Symmetry-Adapted Machine Learning for Information Security

Jong Hyuk Park
2020 Symmetry  
These areas include malware classification, intrusion detection systems, image watermarking, color image watermarking, battlefield target aggregation behavior recognition models, Internet Protocol (IP)  ...  Therefore, we accepted twelve articles for this Special Issue that explore the deployment of symmetry-adapted machine learning for information security in various application areas.  ...  Conflicts of Interest: The author declares no conflict of interest.  ... 
doi:10.3390/sym12061044 fatcat:dury4tukzre7hblsusdxcg4zee

Novel Intrusion Detection Method based on Triangular Matrix Factorization

QI Yingchun, NIU Ling
2016 International Journal of Security and Its Applications  
In this paper, a novel intrusion detection method based on improved triangular matrix factorization is presented.  ...  In order to deal with the issue of network attacks and enhance the security of the network environment, intrusion detection is gaining more and more attention all over the world.  ...  Acknowledgements The authors thank the anonymous reviewers and editors for their invaluable suggestions.  ... 
doi:10.14257/ijsia.2016.10.7.22 fatcat:3hym73d7xnf25dvpj3p4axxy4u

Principle Components Analysis and Multi Layer Perceptron Based Intrusion Detection System

Najla Ibraheem, Muna Jawhar, Hana Osman
2013 ˜Al-œRafidain journal for computer sciences and mathematics  
The key idea is to take advantage of different feature of NSL-KDD data set and choose the best feature of data, and using neural network for classification of intrusion detection.  ...  Security has become an important issue for networks. Intrusion detection technology is an effective approach in dealing with the problems of network security.  ...  PCA can be done by eigen value decomposition of a data covariance matrix or singular value decomposition of a data matrix.  ... 
doi:10.33899/csmj.2013.163430 fatcat:nkpcpozz2re5deft26tdl6ooti

A Novel Method for Unsupervised Anomaly Detection Using Unlabelled Data

Abdul Samad bin Haji Ismail, Abdul Hanan Abdullah, Kamalrulnizam bin Abu Bak, Md Asi bin Ngadi, Dahliyusmanto Dahlan, Witcha Chimphlee
2008 2008 International Conference on Computational Sciences and Its Applications  
Using a set of benchmark data from KDD (Knowledge Discovery and Data Mining) Competition designed by DARPA for demonstrate to detection intrusions.  ...  Moreover, PCA is applied to reduce the high dimensional data vectors and distance between a vector and its projection onto the subspace reduced is used for anomaly detection.  ...  PCA using Singular Value Decomposition (SVD) Another algebraic solution for PCA and in the process, find that PCA is closely related to singular value decomposition (SVD). [14] .  ... 
doi:10.1109/iccsa.2008.70 dblp:conf/iccsa/IsmailABNDC08 fatcat:tcfjo5c6nvholovc5zogxdu2ca

Dual Watermarking Scheme with Encryption [article]

R. Dhanalakshmi, K. Thaiyalnayaki
2010 arXiv   pre-print
In the proposed system, a Dual Watermarking Scheme based on DWT SVD with chaos encryption algorithm, will be developed to improve the robustness and protection along with security.  ...  The watermarked image is decrypted and a reliable watermark extraction scheme is developed for the extraction of the primary as well as secondary watermark from the distorted image.  ...  For each non-zero singular value λ of A, B has L 1 λ . C is a columnscaled version of A by repeating every column for L 2 times. For each nonzero singular value λ of A, C has L 2 λ.  ... 
arXiv:1002.2414v1 fatcat:vdjqcq6qcbdafceqmo4j3gslra

Enhancing Detection Performance of the Phase-Sensitive OTDR Based Distributed Vibration Sensor Using Weighted Singular Value Decomposition

Khurram Naeem, Bok Hyeon Kim, Dong-Jin Yoon, Il-Bum Kwon
2021 Applied Sciences  
We propose a weighted singular value decomposition (WSVD) to reduce the random noise in the Rayleigh backscattering signal of the phase-sensitive optical time domain reflectometry (Φ-OTDR) to enhance the  ...  detection performance of the distributed vibration sensing.  ...  [12] demonstrated a distributed fiber intrusion sensor using Φ-OTDR based on direct detection that uses a simple averaging method to obtain the location information of intrusion detection with low SNR  ... 
doi:10.3390/app11041928 fatcat:xy2sng7vsvbrvelchvzzeacnka

A Hybrid Database Intrusion Detection Algorithm Using Swarm Intelligence and Radial Basis Function Network

Anitarani Brahma, Suvasini Panigrahi, Jayasmita Mahapatra
2019 Helix  
This paper presents a hybrid intrusion detection algorithm in Database System by making use of swarm intelligence and radial basis function network.  ...  Recently, all over the globe, intrusion detection especially in Database gaining lots of attentions from researchers as it serves a security support system to existing security mechanism.  ...  To optimize radii and weight, we use K-nearest Neighbourhood and Singular Value Decomposition (SVD) algorithm Algorithm:  Randomly initialize center.  Initialize Radii r using KNN  Use SVD to initialize  ... 
doi:10.29042/2019-5031-5035 fatcat:3b74kjmcevgr3fzhexrkbrk26e

Robust watermarking based on DWT SVD [article]

Anumol Joseph, K. Anusudha
2013 arXiv   pre-print
DWT (Discrete Wavelet Transform) and SVD (Singular Value Decomposition) have been used to embed two watermarks in the HL and LH bands of the host image.  ...  It is a branch of information hiding which is used to hide proprietary information in digital media like photographs, digital music, digital video etc.  ...  For each nonzero singular value λ of A, C has L 2 λ.  ... 
arXiv:1309.2423v7 fatcat:z5vlfyzfx5bcdbgclxybhl2cqe

Study of Self-Similarity for Detection of Rate-based Network Anomalies

Gagandeep Kaur, Vikas Saxena, Jay Prakash Gupta
2017 International Journal of Security and Its Applications  
A brief overview on network intrusion detection systems is discussed next. 29 The main drawbacks or weaknesses of signature based systems are:  Signature based intrusion detection systems are automatic  ...  security models that rely on simple, straight forward rules for detection of intrusions.  ...  To name a few, some of the pioneer works have been done using techniques Network Intrusion Detection Systems A Network Intrusion Detection System (NIDS) can be defined as software that is designed to  ... 
doi:10.14257/ijsia.2017.11.8.03 fatcat:dhlunvvph5hafjpyyceoeq6sfe

Performance Assessment of Ids Based on Cicids-2017 Dataset

2020 International journal of recent technology and engineering  
Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) are the tools used to defend against these intrusion activities. IDS sometimes is prone to false alarms.  ...  Therefore, network engineers pose a great challenge in network security to identify intrusion activities.  ...  So, to notify a person that an attack or network intrusion has taken place, there should be an Intrusion Detection System (IDS). Research on IDS is still going on to propose a better IDS system.  ... 
doi:10.35940/ijrte.f9061.038620 fatcat:phisknnmrra3hcta2hdjrmvvvu

Intrusion detection techniques based on improved intuitionistic fuzzy neural networks

Yang Lei, Weiwei Kong, Jing Ma
2017 International Journal of Innovative Computing and Applications  
The approach relies on monitoring the security state by using a set of accurate metrics. NSST is used to decompose these metrics.  ...  At present, the issue of intrusion detection has been a hot point in the computer security area. In this paper, three novel intrusion detection schemes have been proposed.  ...  Acknowledgements The authors would like to thank all the reviewers and editors for their valuable comments and works. The work was supported in part by the National Natural Science  ... 
doi:10.1504/ijica.2017.082496 fatcat:5gvij64ewbfsvalc2o7p3nwe5q

Smart Fence: Decentralized Sequential Hypothesis Testing for Perimeter Security [chapter]

Fabien Chraim, Kristofer Pister
2013 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Results from several deployments show 100% detection rates within one second of the intrusion.  ...  The system is presented as a viable replacement for much more expensive and less performant security systems.  ...  We would like to thank Chevron ETC and Chevron ITC for funding and supporting this project.  ... 
doi:10.1007/978-3-319-04166-7_5 fatcat:y6t7ra37jndkrgqwrjy7u4ryry


Gaurav Sharma, Anil Kumar Kapil
2021 Acta Informatica Malaysia  
Intrusion detection does not include the prevention of intrusions. A different solution is required for intrusion prevention.  ...  Intrusion detection (ID) is the act of detecting actions that attempt to compromise the confidentiality, integrity, or availability of a shared resource over a network.  ...  In other studies, researchers presented Fast Intrusion Detection System (FIDS) with the help of the singular value decomposition (SVD) method .  ... 
doi:10.26480/aim.02.2021.58.61 fatcat:4ismoi65mbh4hjxkfoahqf6wmu
« Previous Showing results 1 — 15 out of 2,065 results