Using An Improved Data Reduction Method in Intrusion detection system
Journal Title: International Journal of Engineering Research and Advanced Technology - Year 2017, Vol 3, Issue 1
Abstract
The information security is an issue of serious global concern. has become a very important and critical issue in network, data and information security. An Intrusion detection system collects and analyzes information from different areas within a computer or a network to identify possible security threats that include threats from both outside as well as inside the organization. The Intrusion detection system deals with large amount of data which contains various irrelevant and redundant features resulting in increased processing time and low detection rate. Therefore feature reduction plays an important role in intrusion detection..In this paper an improvement is suggested to SVD data reduction method and implemented with Back-Propagation algorithm to detect different types of attacks .the performance is evaluated using detection rate, error rate and accuracy
Speeding Up Back-Propagation Learning (SUBPL) Algorithm: A New Modified Back-Propagation Algorithm
The convergence speed is the most important feature of Back-Propagation (BP) algorithm. A lot of improvements were proposed to this algorithm since its presentation, in order to speed up the convergence phase. In this pa...
Active Packaging In Keeping The Food Fresh – A Review
The demand for safe and high quality foods, as well as changes in consumer preferences have led to the development of innovative and novel approaches in food packaging technology. One such development is the smart or int...
DIGITAL GOVERNMENT: A PRIMER
Digital government is the use of ICT to enable government agencies to carry out their civic duties. It enables citizens to interact with the government and improves the services that governments offer their citizens. It...
An Adjusted Methods on Classification Algorithm for Streaming Data
In recent years, advances in hardware technology have facilitated the abilityto collect data continuously. Simple transactions of everyday life such as using a credit card, a phone or browsing the web lead to automated d...
Investigation of strength characteristics of cement bagasse ash mortars using full factorial approach
The cement industry is one of the largest embodied energy consuming and CO2 emitting industry. It is found that to produce one kg of cement, it requires 4.2MJ of energy and liberates about one kg of CO2 which is one of t...