A Novel Method for Intrusion Detection Based on SARSA and Radial Bias Feed Forward Network (RBFFN)
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 7, Issue 3
Abstract
The Internet, computer networks and information are vital resources of current information trend and their protection has increased importance in current existence. Any attempt, successful or unsuccessful to finding the middle ground the discretion, truthfulness and accessibility of any information resource or the information itself is measured a security attack or an intrusion. Intrusion compromised a loose of information credential and trust of security concern. The mechanism of intrusion detection faced a problem of new generated schema and pattern of attack data. Various authors and researchers proposed a method for intrusion detection based on machine learning approach and neural network approach all these compromised with new pattern and schema. Now in this paper a new model of intrusion detection based on SARAS reinforced learning scheme and RBF neural network has proposed. SARAS method imposed a state of attack behaviour and RBF neural network process for training pattern for new schema. Our empirical result shows that the proposed model is better in compression of SARSA and other machine learning technique.
Authors and Affiliations
Anshul Chaturvedi, Prof. Vineet Richharia
A Hybrid Approach of AES and File Encryption to Enhance The Cloud Security
Cloud computing is a paradigm shift in the way we define software and hardware, and architect our IT solutions. The emerging cloud technologies, due to their various unique and attractive properties, are evolving with tr...
Finite State Testing and Syntax Testing
This paper is concerned with the testing of the software which is being developed in a structured way. The advantages which accrue from a well-structured or modular organization of software depend upon an ability to inde...
IMPLEMENTATION OF MOBILE VIRTUAL LABORATORY: CONTRIBUTORY FACTORS IN A DEVELOPING COUNTRY
The growing availability of mobile devices across developing countries and coupled with increase awareness of mobile learning as well as the use of mobile devices for laboratory practical warrant the exploration of its w...
Forensic Analysis of Databases by Combining Multiple Evidences
The information security for securing enterprise databases from internal and external attacks and violations of mutual policy is an interminable struggle. With the growing number of attacks and frauds, the organizations...
A Multi-Level Multi-Objective Quadratic Programming Problem with Fuzzy Parameters on Objective Functions
This paper proposes an algorithm to solve multi-level multi-objective quadratic programming problem with fuzzy parameters in the objective functions, This algorithm uses the tolerance membership function concepts and mul...