Analyzing Intrusion Detection Using Machine Learning Adaboost Algorithm: An Observations Study
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 6
Abstract
The current approaches for intrusion detection have some problems that adversely affect the effectiveness of the Intrusion Detection System. Current approaches often suffer from relatively high falsealarm rates. As most network behaviors are normal, resources are wasted on checking a large number of alarms that turn out to be false. Secondly their computational complexities are oppressively high.The adaboost algorithm gives better results for intrusion detection in this respect. The paper here mainly has its focus on these results.
Authors and Affiliations
Ms. S. S. Kazi
A Study on performance evaluation of Reed Solomon Codes through an AWGN Channel model for an efficient Communication System
In wireless, satellite, and space communication systems, reducing error is critical. High bit error rates of the wireless communication system require employing various coding methods on the data transferred. Chann...
Potential of Hydro Power Plant in India and its Impact on Environment
This paper presents a survey report of hydro power plant in India. There are various renewable energy resources like sun, wind, water, ocean, tidal etc. Among all the source, hydro plant are emerging in the developing In...
Power Qualiy Problems and it’s improvement using FACTS devices
Modern power systems are continuously being expanded and upgraded to cater the need of ever growing power demand. This paper explains the problems that are due to poor Power Quality in electrical systems and show...
Performance Analysis with Lifetime Optimization of LEACH Routing Protocol for Wireless Sensor Network
Advancement in technology like MEMS (micro electromechanical systems), wireless communication and digital electronics led the development of wireless sensor network. The distributed nature and dynamic topology of WSN (wi...
Authorization Based Secure Data Transaction in Cloud Computing
Analyze in cloud computing be in the receipt of distributed process in transacting database utilize over cloud servers entities work in the evidence of authorization that are given an explanation for collection certified...