Design of Anomaly Detection System for Outlier Detection in Hardware Profile Using PCA
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 9
Abstract
In this paper, we design an Anomaly Detection System for Outlier Detection in Hardware Profile by using Principal Component Analysis (PCA) that helps reduce the dimension of data. Anomaly detection methods can detect new intrusions, but they suffer from false alarms. Another approach is misuse detection that identifies only known attacks by matching with the previous patterns. Host based Intrusion Detection Systems (HIDSs) use anomaly detection approach to identify malicious attacks i.e. intrusion. Data being of large dimensional generates features in terms of large set of dimensions and hence the system takes considerable time for processing the huge amount of data. The PCA is used to reduce the dimensionality of the host based data without any loss of useful information such as non-redundant data. We experimentally show that the proposed intrusion detection system has detection rate in the range of 90% - 97.5% and false alarm rate in the range of 2.5% - 7.5% depending upon the major and minor principal components.
Authors and Affiliations
Hari Om , Tanmoy Hazra
Scalability Performance of MANET Routing Protocols with Reference to Variable Pause Time
As mobile networking continues to experience increasing popularity, the need to connect large numbers of wireless devices will become more prevalent. Many recent proposals for ad hoc routing have certain characteristics....
Optimized Query Plan Algorithm for the Nested Query
The SQL language allows users to express the queries that have nested sub-queries in them. Optimization of nested queries has received considerable attention over the last few years. Most of the previous optimization wor...
Impulse Noise removal in Digital Images
In this paper, we introduce a new class of filter, the modified spatial median filter (MSMF) for the removal of impulse noise in digital images. The proposed filter is compared with four different filtering algorithms ba...
MAULIK: An Effective Stemmer for Hindi Language
In this paper, a new stemmer has been proposed named as “Maulik” for Hindi Language. This stemmer is purely based on Devanagari script and it uses the Hybrid approach (combination of brute force and suffix removal approa...
An Investigation on Cloud data Storage and Confidentiality Techniques
Cloud computing gives an enormous measure of virtual storage to the clients. Cloud storage essentially serves to little and medium scale commercial enterprises. This will lessen their ventures and support of capacity ser...