Selection of intrusion detection system threshold bounds for effective sensor fusion

Author(s):  
Ciza Thomas ◽  
Narayanaswamy Balakrishnan
Symmetry ◽  
2020 ◽  
Vol 12 (10) ◽  
pp. 1666
Author(s):  
Muataz Salam Al-Daweri ◽  
Khairul Akram Zainol Ariffin ◽  
Salwani Abdullah ◽  
Mohamad Firham Efendy Md. Senan

The significant increase in technology development over the internet makes network security a crucial issue. An intrusion detection system (IDS) shall be introduced to protect the networks from various attacks. Even with the increased amount of works in the IDS research, there is a lack of studies that analyze the available IDS datasets. Therefore, this study presents a comprehensive analysis of the relevance of the features in the KDD99 and UNSW-NB15 datasets. Three methods were employed: a rough-set theory (RST), a back-propagation neural network (BPNN), and a discrete variant of the cuttlefish algorithm (D-CFA). First, the dependency ratio between the features and the classes was calculated, using the RST. Second, each feature in the datasets became an input for the BPNN, to measure their ability for a classification task concerning each class. Third, a feature-selection process was carried out over multiple runs, to indicate the frequency of the selection of each feature. From the result, it indicated that some features in the KDD99 dataset could be used to achieve a classification accuracy above 84%. Moreover, a few features in both datasets were found to give a high contribution to increasing the classification’s performance. These features were present in a combination of features that resulted in high accuracy; the features were also frequently selected during the feature selection process. The findings of this study are anticipated to help the cybersecurity academics in creating a lightweight and accurate IDS model with a smaller number of features for the developing technologies.


The ChintalaVenkataramana Temple in Tadapatri, Andhra Pradesh, holds a significant role in the history of VijayanagaraArt.The temple built in the last quarter of the fifteenth century is a treasure house of exquisite craftsmanship. The magnificence of the Vijayanagara dynasty is not merely due to the magnitude of the temples but also for its artistic and decorative richness. ChintalaVenkataramana Temple and BuggaRamalingeswara temples are the finest examples displaying the richness of the Vijayanagara kings at Tadipatri. The ChintalaVenkataramana Temple is unique as it differs from the norm when compared to other temples of the Vijayanagara dynasty in few aspects. This temple, unlike the others are not very big in size and neither the pillars in the mandapas are so martial and huge. The notable feature of the temple is the stone chariot. The outer walls of the ardhamandapa and the shrine contains exquisite reliefs of narratives from the Ramayana and the Mahabharata. The sculptures, most of them narratives offer a visual treat of the episodes from the epic, the Bhagavataand from other mythological events making the temple unique and special. The aim of this paper is to discuss the narrative sculptures which are unique. The iconographical panels which refers to the epics and scenes from mythology will be discussed along with the artistic content


Any unusual move can be considered a break in quirks. Some procedures and calculations were mentioned in the drafting to identify irregularities. In most cases, true positive and false positive limits were used to observe their display. However, depending on the application, an off-base false positive or false positive can have serious adverse repercussions. This requires the incorporation of cost-sensitive limits on display. Furthermore, the more popular KDD-CUP-99 test data set has a huge information size that requires some pre-management measure. Our work in this article begins by listing the need for a delicate cost examination with some original models. After talking about the KDDCUP-99, a methodology for the end of the reflections is proposed and later the possibility of reducing the amount of the most significant reflections in a simple way and the size of the KDD-CUP-99 in a indirect way. From the revealed writing, the general techniques are chosen to detect the irregularities that best behave for the various types of aggressions. These various filing cabinets are stacked to frame a team. An expensive method is proposed to dispense the relative loads to the classifiers equipped for the realization of the finished product. The profitability of the false and genuine positive results is performed and a technique is proposed to choose the components of the profitability measures to further improve the results and achieve the best overall exposure. There is talk of the effect on the exchange of execution due to the merger of the viability of the expense.


2011 ◽  
Vol 267 ◽  
pp. 720-725
Author(s):  
Ke Chen ◽  
Wen De Ke

This paper put forward intrusion detection algorithm based on improved fuzzy C means (FCM) algorithm and execute the anomaly detection on KDDCUP data set, build intrusion detection system based improved algorithm and analyze the feasibility of the system. Through the fuzzy C means value's improvement algorithm, solve the fuzzy C means value algorithm problem that the algorithm sensitive to selection of the initial values and easily to fall in the local best solution. Thereby under the condition guarantee integrality and consistency of data attribute values, get rid of blindness of selecting initial value and reduce clustering time and algorithm complexity, enhance speed of the algorithm.


Sign in / Sign up

Export Citation Format

Share Document