Intrusion Detection using unsupervised learning
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
Clustering is the one of the efficient datamining techniques for intrusion detection. In clustering algorithm kmean clustering is widely used for intrusion detection. Because it gives efficient results incase of huge datasets. But sometime kmean clustering fails to give best result because of class dominance problem and no class problem. So for removing these problems we are proposing two new algorithms for cluster to class assignment. According to our experimental results the proposed algorithm are having high precision and recall for low class instances.
Authors and Affiliations
Kusum bharti , Sanyam Shukla , Shweta Jain
Optimized design of BCD adder and Carry skip BCD adder using reversible logic gates
Reversible logic is very essential for the construction of low power, low loss computational structures which are very essential for the construction of arithmetic circuits used in quantum computation, nano technology an...
Tree-kNN: A Tree-Based Algorithm for Protein Sequence Classification
The phylogenomic classification of protein sequences attempts to categorize a given protein within the evolutionary context of the entire family. It involves mainly four steps: selection of homologous sequences, multiple...
Opinion Mining Classification Using Key Word Summarization Based on Singular Value Decomposition
With the popularity of online shopping it is increasingly becoming important for manufacturers and service providers to ask customers to review their product and associated service. Typically the number of customer revie...
Language Specific Speech Feature Variation
Speech is basically used to impart message from one person to another. There are various properties of speech that may vary from person to person or from language to language. The power of human language is found to be e...
A Comparative study of Forward Secure Publickey Method Using HIBE and BTE
T h e threat of key exposure becoming more acute as yptographic computations are performed more frequently on poorly protected devices (smart-cards, mobile phones, even PCs), new techniques are needed to deal with this...