Enhance Intrusion Detection Systems Based On SVM and Feed Forward Neural Network
Journal Title: International Journal of Engineering Research and Advanced Technology - Year 2015, Vol 1, Issue 3
Abstract
With large increase of internet users network security is important issues in today era. As variety of users have different requirement, so proper identification of safe network is required. This paper focuses on the network intrusion detection using SVM and neural network. Here SVM classify network behavior into two class first is safe and other is unsafe. Once unsafe network is identified then trained neural network identified attack type of the input sessions. Experiment is done on real dataset and obtained results are better than previous works on different parameters.
Speeding Up Back-Propagation Learning (SUBPL) Algorithm: A New Modified Back-Propagation Algorithm
The convergence speed is the most important feature of Back-Propagation (BP) algorithm. A lot of improvements were proposed to this algorithm since its presentation, in order to speed up the convergence phase. In this pa...
An Experimental Investigation on NOx Emission Reduction and Performance Evaluation of CI Engine using EGR System
Internal combustion engines are established as the main power source for the automobile vehicles. At present emission norms became strict for any IC engine. The main pollutants are HC, CO, NOx, Particulate Matter, Soot...
Performance Evaluation of Cement Mortar by Using Fly Ash and Lime as Partial Replacement for Cement
As global demand for mortar follows a growth in this century, energy-efficient, economical and durable building materials are essential for sustainable construction practices. In the present investigation fly ash and lim...
WEB BASED TOOL MANAGEMENT SYSTEM
The aim of the project is to develop tool management system that is able to deliver access to anyone authorized organization anytime, anyplace on a prespective device.The system developed make use of rich tools available...
A Secure Framework for efficient search and mining over an encrypted data using homomorphic encryption
In the emerging networked environments learning tasks are encountering situations in which the relevant data exists in a number of geo-graphically distributed databases that are connected by communication networks. For t...