A Pluvial Flood Detection Model Using Machine Learning Techniques and Simulate The Flow of Water

Author(s):  
Ajay Katti ◽  
K.V Ashish ◽  
Aditya Loke ◽  
Kranti Bade
Computers ◽  
2019 ◽  
Vol 8 (2) ◽  
pp. 35 ◽  
Author(s):  
Xuan Dau Hoang ◽  
Ngoc Tuong Nguyen

Defacement attacks have long been considered one of prime threats to websites and web applications of companies, enterprises, and government organizations. Defacement attacks can bring serious consequences to owners of websites, including immediate interruption of website operations and damage of the owner reputation, which may result in huge financial losses. Many solutions have been researched and deployed for monitoring and detection of website defacement attacks, such as those based on checksum comparison, diff comparison, DOM tree analysis, and complicated algorithms. However, some solutions only work on static websites and others demand extensive computing resources. This paper proposes a hybrid defacement detection model based on the combination of the machine learning-based detection and the signature-based detection. The machine learning-based detection first constructs a detection profile using training data of both normal and defaced web pages. Then, it uses the profile to classify monitored web pages into either normal or attacked. The machine learning-based component can effectively detect defacements for both static pages and dynamic pages. On the other hand, the signature-based detection is used to boost the model’s processing performance for common types of defacements. Extensive experiments show that our model produces an overall accuracy of more than 99.26% and a false positive rate of about 0.27%. Moreover, our model is suitable for implementation of a real-time website defacement monitoring system because it does not demand extensive computing resources.


2021 ◽  
Vol 27 (2) ◽  
Author(s):  
K.A. Oladapo ◽  
F.Y. Ayankoya ◽  
F.A. Adekunle ◽  
S.A. Idowu

The periodical occurrence of emergency situations represents an important issue for mankind. Over the years, the world at large has experienced multiple misadventures both natural and man-made. A recent report showed that flood have affected more individuals than any other category of disaster in the 21st century with the highest percentage of 43% of all disaster events in 2019 and Africa been the second vulnerable continent after Asia. Handling flood risk with the intention of safety and comfort of the citizens as well as saving their environment is one of the major responsibilities of the leadership in each country especially in flood prone areas. Machine learning predictive analytic applications can improve the risk management. So, it is highly important to devise a scientific method for flood risk reduction since it cannot be eradicated. The paper proposes a pluvial flood detection and prediction system based on machine learning techniques. The proposed model will employ a fuzzy rule-based classification to appraise the performance of the machine learning algorithm on pluvial flood conditioning variables.


MENDEL ◽  
2019 ◽  
Vol 25 (2) ◽  
pp. 1-10 ◽  
Author(s):  
Ivan Zelinka ◽  
Eslam Amer

Current commercial antivirus detection engines still rely on signature-based methods. However, with the huge increase in the number of new malware, current detection methods become not suitable. In this paper, we introduce a malware detection model based on ensemble learning. The model is trained using the minimum number of signification features that are extracted from the file header. Evaluations show that the ensemble models slightly outperform individual classification models. Experimental evaluations show that our model can predict unseen malware with an accuracy rate of 0.998 and with a false positive rate of 0.002. The paper also includes a comparison between the performance of the proposed model and with different machine learning techniques. We are emphasizing the use of machine learning based approaches to replace conventional signature-based methods.


Author(s):  
Sridarala Ramu ◽  
Daniel Osaku

Intrusion detection systems, traditionally based on signatures, have not escaped the recent appeal of machine learning techniques. While the results presented in academic research articles are often excellent, security experts still have many reservations about the use of Machine Learning in intrusion detection systems. They generally fear an inadequacy of these techniques to operational constraints, in particular because of a high level of expertise required, or a large number of false positives. In this article, we show that Machine Learning can be compatible with the operational constraints of detection systems. We explain how to build a detection model and present good practices to validate it before it goes into production. The methodology is illustrated by a case study on the detection of malicious PDF files and we offer a free tool, SecuML, to implement it.


2021 ◽  
Vol 11 (1) ◽  
pp. 53-57
Author(s):  
Yazeed Abdulmalik

SQL Injection Attack (SQLIA) is a common cyberattack that target web application database. With the ever increasing and varying techniques to exploit web application SQLIA vulnerabilities, there is no a comprehensive method that can solve this kind of attacks. Therefore, these various of attack techniques required to establish many methods against in order to mitigate its threats. However, most of these methods have not yet been evaluated, where it is still just theories and require to implement and measure its performance and set its limitation. Moreover, most of the existing SQL injection countermeasures either used syntax-based detection methods or a list of predefined rules to detect the SQL injection, which is vulnerable in advance and sophisticated type of attacks because attackers create new ways to evade the detection utilizing their pre-knowledge. Although semantic-based features can improve the detection, up to our knowledge, no studies focused on extracting the semantic features from SQL stamens. This paper, investigates a designed model that can improve the efficacy of the SQL injection attack detection using machine learning techniques by extracting the semantic features that can effectively indicate the SQL injection attack. Also, a tenfold approach will be used to evaluate and validate the proposed detection model.


Author(s):  
Nurmi Hidayasari ◽  
Imam Riadi ◽  
Yudi Prayudi

Steganalysis method is used to detect the presence or absence of steganography files or can be referred to anti-steganography. Steganalysis can be used for positive purposes, which is to know the weaknesses of a steganography method, so that improvements can be made. One category of steganalysis is blind steganalysis, which is a way to detect secret files without knowing what steganography method is used. Blind steganalysis is difficult to implement, but then machine learning techniques emerged that could be used to create a detection model using experimental data, one of which is Convolutional Neural Networks (CNN). A study proposes that the CNN method can detect steganography files using the latest method with a low error probability value compared to other methods, CNN Yedroudj-net. As one of the steganalysis methods with the latest machine learning steganalysis techniques, an experiment is needed to find out whether Yedroudj-net can be a steganalysis for the output of many tools commonly used for steganography applications. Knowing the performance of CNN Yedroudj-net on several steganography tools is very important, to measure the level of ability in terms of steganalysis of some of these tools. Especially so far, machine learning performance is still doubtful in blind steganalysis. Plus some previous research only focused on certain methods to prove the performance of the proposed technique, including Yedroudj-net. This study will use five tools that are Hide In Picture (HIP), OpenStego, SilentEye, Steg and S-Tools, which are not known exactly what steganography methods are used on the tools. Yedroudj-net method will be implemented in the steganography file from the output of the five tools. Then a comparison with the popular steganalysis tool is used, StegSpy. The results show that Yedroudj-net is quite capable of detecting the presence of steganography files, slightly better than StegSpy.


2021 ◽  
Vol 11 (2) ◽  
pp. 51-60
Author(s):  
Ayorinde O. Akinje ◽  
Abdulgalee Fuad

The increase in mobile phones accessibility and technological advancement in almost every corner of the world has shaped how banks offer financial service. Such services were extended to low-end customers without a smartphone providing Alternative Banking Channels (ABCs) service, rendering regular financial service same as those on smartphones. One of the services of this ABC’s is Unstructured Supplementary Service Data (USSD), two-way communication between mobile phones and applications, which is used to render financial services all from the bank accounts linked for this USSD service. Fraudsters have taken advantage of innocent customers on this channel to carry out fraudulent activities with high impart of fraudulent there is still not an implemented fraud detection model to detect this fraud activities. This paper is an investigation into fraud detection model using machine learning techniques for Unstructured Supplementary Service Data based on short-term memory. Statistical features were derived by aggregating customers activities using a short window size to improve the model performance on selected machine learning classifiers, employing the best set of features to improve the model performance. Based on the results obtained, the proposed Fraudulent detection model demonstrated that with the appropriate machine learning techniques for USSD,  best performance was achieved with Random forest having the best result of 100% across all its performance measure, KNeighbors was second in performance measure having an average of 99% across all its performance measure while Gradient boosting was third in its performance measure, its achieved accuracy is 91.94%, precession is 86%, recall is 100% and f1 score is 92.54%. Result obtained shows two of the selected machine learning random forest and decision tree are best fit for the fraud detection in this model. With the right features derived and an appropriate machine learning algorithm, the proposed model offers the best fraud detection accuracy.


2019 ◽  
Vol 16 (8) ◽  
pp. 3232-3236
Author(s):  
L. K. Joshila Grace ◽  
K. Rahul ◽  
P. S. Sidharth

Computer Vision and image processing have gained an enormous advance in the field of machine learning techniques. Some of the major research areas within machine learning are Action detection and Pattern Recognition. Action recognition is a new advancement of pattern recognition approaches where the actions performed by any action or living being is tracked and monitored. Action recognition still encounters some challenges that needs to be looked upon and perform recognize the actions is a very minimal time. Networks like SVM and Neural Networks are used to train the network in such a way they are able to detect a pattern of an action when a new frame is given. In this paper, we have proposed a model which detects patterns of actions from a video or an image. Bounding boxes are used to detect the actions and localize it. Deep Belief Network is used to train the model where numerous images having actions are given as the training set. The performance evaluation was done on the model and it is observed that it detects the actions very accurately when a new image is given to the network.


Sign in / Sign up

Export Citation Format

Share Document