Wrapper Approach for IDS Using Fuzzy Genetic Algorithm
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2015, Vol 2, Issue 3
Abstract
The intrusion detection systems (IDS) are becoming indispensable for effective protection against attacks that are constantly changing in magnitude and complexity. This paper proposes a fuzzy genetic algorithm (FGA) for intrusion detection. The FGA system is a fuzzy classifier, whose knowledge base is modeled as a fuzzy rule such as "if-then" and improved by a genetic algorithm. The method is tested on the benchmark KDD'99 intrusion dataset and compared with other existing techniques available in the literature. The results are encouraging and demonstrate the benefits of the proposed approach
Authors and Affiliations
Pooja U. Chavan
Generalized-Non Local Mean Algorithm for Despeckling of Digital Images Using Classical and Wavelet Transform
Recent years, De-speckling of digital images will be a challenging task in image processing applications. Previously there are so many algorithms have been proposed to de-speckle the digital images. Here in this thesis w...
Using Raspberry Pito Design Smart Mirror Applications
Smart mirrors, which proceed with the works today and will have its spot later on innovation, give both mirrorand PC supported data administrations to its clients. Because of the microcontroller cards lo...
Grey Wolf Optimization Algorithm for Colour Image Enhancement Considering Brightness Preservation Constraint
Colour image enhancement plays an important role in Digital Image Processing. Color images provide more and better off information for visual perception than that of the gray images. The purpose of image enhancement is t...
Defect Analysis & Reduction in Rejection on “Governor Support”
Currently the assembly of engine are performed by manually. During assembly of governor support O-ring cut due to improper fitment. In this project we provide additional ring which acts as seal. This seal avoid the leaka...
Detection and Isolation of Multiple Black Hole Attack Using Modified DSR
Mobile Ad hoc Network is a robust infrastructure less wireless network. It can be formed either by mobile nodes or by both fixed and mobile nodes. Nodes are randomly connected with each other and forming arbitrary topolo...