scholarly journals Research on method of detecting constant false alarm of entangled state quantum detection system

2022 ◽  
Vol 71 (1) ◽  
pp. 010303-010303
Author(s):  
Wei Rong-Yu ◽  
◽  
Li Jun ◽  
Zhang Da-Ming ◽  
Wang Wei-Hao
2020 ◽  
Vol 38 (1B) ◽  
pp. 6-14
Author(s):  
ٍٍSarah M. Shareef ◽  
Soukaena H. Hashim

Network intrusion detection system (NIDS) is a software system which plays an important role to protect network system and can be used to monitor network activities to detect different kinds of attacks from normal behavior in network traffics. A false alarm is one of the most identified problems in relation to the intrusion detection system which can be a limiting factor for the performance and accuracy of the intrusion detection system. The proposed system involves mining techniques at two sequential levels, which are: at the first level Naïve Bayes algorithm is used to detect abnormal activity from normal behavior. The second level is the multinomial logistic regression algorithm of which is used to classify abnormal activity into main four attack types in addition to a normal class. To evaluate the proposed system, the KDDCUP99 dataset of the intrusion detection system was used and K-fold cross-validation was performed. The experimental results show that the performance of the proposed system is improved with less false alarm rate.


Author(s):  
Habeeb Bello-Salau ◽  
A. J. Onumanyi ◽  
B. O. Sadiq ◽  
H. Ohize ◽  
A. T. Salawudeen ◽  
...  

Accelerometers are widely used in modern vehicular technologies to automatically detect and characterize road anomalies such as potholes and bumps. However, measurements from an accelerometer are usually plagued by high noise levels, which typically increase the false alarm and misdetection rates of an anomaly detection system. To address this problem, we have developed in this paper an adaptive threshold estimation technique to filter accelerometer measurements effectively to improve road anomaly detection and characterization in vehicular technologies. Our algorithm decomposes the output signal of an accelerometer into multiple scales using wavelet transformation (WT). Then, it correlates the wavelet coefficients across adjacent scales and classifies them using a newly proposed adaptive threshold technique. Furthermore, our algorithm uses a spatial filter to smoothen further the correlated coefficients before using these coefficients to detect road anomalies. Our algorithm then characterizes the detected road anomalies using two unique features obtained from the filtered wavelet coefficients to differentiate potholes from bumps. The findings from several comparative tests suggest that our algorithm successfully detects and characterizes road anomalies with high levels of accuracy, precision and low false alarm rates as compared to other known methods.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 245
Author(s):  
S. Vimala ◽  
V. Khanna ◽  
C. Nalini

In MANETs, versatile hubs can impart transparently to each other without the need of predefined framework. Interruption location framework is a fundamental bit of security for MANETs. It is uncommonly convincing for identifying the Intrusions and for the most part used to supplement for other security segment. That is the reason Intrusion discovery framework (IDS) is known as the second mass of assurance for any survivable framework security. The proposed fluffy based IDSs for recognition of Intrusions in MANETs are not prepared to adjust up all sort of assaults. We have examined that all proposed fluffy based IDSs are seen as to a great degree obliged segments or qualities for data collection which is specific for a particular assault. So that these IDSs are simply recognize the particular assault in MANETs. The fluffy motor may perceive blockage from channel mistake conditions, and along these lines helps the TCP blunder discovery. Examination has been made on the issues for upgrading the steady quality and precision of the decisions in MANET. This approach offers a strategy for joining remote units' estimation comes to fruition with alliance information open or priori decided at conglomerating hubs. In our investigation work, the best need was to reduce the measure of information required for getting ready and the false alarm rate. We are chiefly endeavoring to improve the execution of a present framework rather than endeavoring to supplant current Intrusion recognition systems with an information mining approach. While current mark based Intrusion identification procedures have imperatives as communicated in the past region, they do even now give basic organizations and this normal us to choose how information mining could be used as a piece of a correlative way to deal with existing measures and improves it.


In present trends organizations are very much interested to protect data and prevent malware attack by using well flourished and excellent tools. Many algorithms are used for the intrusion detection system (IDS) and it has pros and cons. Here we proposed a novel method of intrusion detection using hybrid optimization techniques such as Gravity search algorithm with gray wolf optimization (GSGW). In this method the gray wolf technique has a leader for the continuous monitoring of the attacker and has a low false alarm rate and a high detection rate. The performance evaluation is done by the feature selection in NSL-KDD dataset. In the proposed method the experimental result reveals less false alarm rate, better accuracy and high Detection when compared to previous analysis.


Sensors ◽  
2020 ◽  
Vol 20 (9) ◽  
pp. 2559 ◽  
Author(s):  
Celestine Iwendi ◽  
Suleman Khan ◽  
Joseph Henry Anajemba ◽  
Mohit Mittal ◽  
Mamdouh Alenezi ◽  
...  

The pursuit to spot abnormal behaviors in and out of a network system is what led to a system known as intrusion detection systems for soft computing besides many researchers have applied machine learning around this area. Obviously, a single classifier alone in the classifications seems impossible to control network intruders. This limitation is what led us to perform dimensionality reduction by means of correlation-based feature selection approach (CFS approach) in addition to a refined ensemble model. The paper aims to improve the Intrusion Detection System (IDS) by proposing a CFS + Ensemble Classifiers (Bagging and Adaboost) which has high accuracy, high packet detection rate, and low false alarm rate. Machine Learning Ensemble Models with base classifiers (J48, Random Forest, and Reptree) were built. Binary classification, as well as Multiclass classification for KDD99 and NSLKDD datasets, was done while all the attacks were named as an anomaly and normal traffic. Class labels consisted of five major attacks, namely Denial of Service (DoS), Probe, User-to-Root (U2R), Root to Local attacks (R2L), and Normal class attacks. Results from the experiment showed that our proposed model produces 0 false alarm rate (FAR) and 99.90% detection rate (DR) for the KDD99 dataset, and 0.5% FAR and 98.60% DR for NSLKDD dataset when working with 6 and 13 selected features.


2014 ◽  
Vol 1044-1045 ◽  
pp. 818-824
Author(s):  
Bo Fan Yang ◽  
Rui Wang ◽  
Gang Wang ◽  
Li Zhao

Aiming at signal detection of radar target, concerning about on the basis of the influence of SNR on detection probability when false alarm probability is given based on N-P criterion, a kind of multi-sensor fusion detection based on SNR is put forward. It can improve system’s detection probability under the condition of required false alarm probability in the detection of low SNR signal. The simulation results show that the detection performance is significantly increased, no matter fusion detection system is composed of same sensors working in the same working point or different sensors.


2014 ◽  
Vol 556-562 ◽  
pp. 2711-2714
Author(s):  
Soo Young Shin ◽  
Isnan Arif Wicaksono

Wireless Networks suffer from many constraints including wireless communication channel, internal and external attacks, security becomes the main concern to deal with such kind of networks. Therefore, an intrusion detection system (IDS) is required that monitors the network, detects misbehavior or anomalies and notifies other nodes in the network to avoid or punish the misbehaving nodes. This paper describes the simple method to detect the intruder in wireless communication system based on physical layer characteristics. Channel prediction method is used in receiver part to predict the transmission channel for the next time slot. Then, in the next time slot the result is compared with the actual value of channel from the channel estimation. Number of detection and false alarm ratio is measured as performance matrices of the simulation. Based on simulation result, the proposed intrusion detection system give high detection ratio and low false alarm ratio for given threshold.


Sign in / Sign up

Export Citation Format

Share Document