Reduction of Rejection Instances Using Particle Swarm Optimization in Ids
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
An intrusion detection system (IDS) is a tool or software function which examines a network or systems for malevolent action or policy infringements. An IDS mechanism by observing system action by probing vulnerabilities in the system, the sum of files and conducting an study of patterns based on already known attacks. It also directly monitors the Internet to explore for most recent threats which could result in a future attack. This paper introduces optimization techniques with advantages and algorithm. We proposed new technique to decrease the rejected instances of the dataset. This performed simulation in MATLAB on the given dataset then compute the various parameters like rejected instances, true positive rate(TPR), false positive rate(FPR) and false negative rate(FNR). The graph confirmed that the proposed work is healthier than the existing work by reducing rejection rate.
Authors and Affiliations
Shilpi Goyal, Sushil Chaturvedi
Scientometric Analysis of “Open Software Engineering Journals”
Open software engineering journals Studies had taken for this study covers from 2007-2012. The paper analyses the authorship pattern, the range and frequency of articles published. The maximum number of paper published...
Thermal Analysis of Dental Drilling: A Review
Dental drilling is a common practice for dental surgeons. Heat generated during dental drilling causes elevation in temperature of bone being drilled. Heat generation is affected by different factors like: drill diamete...
Disease Predictor: A Disease Prediction App
Mobile technologies have become digital fabric of our lives. We are living in an age where these mobile technologies can help us do various things which one could not even think of a little while ago .One such thing can...
Shadow Detection and Its Removal from Images Using Advance Strong Edge Detection Method (ASED)
Shadow causes dilemma during the recognition of objects from images in different computer vision applications, so it is a very critical job to confiscate shadow from images that’s why in this paper a new method for shad...
Performance Comparison of Cryptanalysis Techniques over DES
The primary requirement of a good encryption technique is that it is either impossible or difficult to deduce the plaintext out of a ciphertext without the knowledge of key. Cryptanalysis is the technique that violates...