Documente Academic
Documente Profesional
Documente Cultură
networks). Some of the unsupervised learning algorithms Although a number of algorithms are investigated, a sample
are maps of adaptive resonance theory [6] self- number of algorithms are presented here and their
organizingfeatures [7]. One of ANN's major uses is in the performances are discussed.
field of pattern recognition. A pattern is a sequence of
entries and exits. Based on the topology of the network, 2.1 Convolution of an Image
either supervised or unsupervised training method may be 1. Line up the image and the features.
employed to train an ANN. The difference between 2. Multiply each image pixel by pixel of the corresponding
network measured performance and desired performance of Feature.
pattern is minimized in the supervised training. 3. Fill in the values to find the sum.
Convergence weights are adjusted to get the minimum 4. Split the sum by the total pixel count in the feature.
difference. This technique is adopted for all trends. 5. Find the preceding image.
6. The process is done with the first 2 moves itself.
Lippmann [8] has given the state of the ANN in his 7. Considered an image of a feature and one pixel of it.
pioneering work. The thesis has subsequently addressed the 8. With the current image we multiplied this, and the result
new advances in supervised learning in [9]. It was is stored in another buffer feature image.
mentioned in [10] that the desire to grow ANN began in the 9. Complete the last 2 steps with the considered image.
late forties. Ebro’s' contribution to his doctoral thesis in the Apply certain values that contributed to the number.
field of neural feed forward networks was the first and 10.Split this number in the feature image by the total
foremost. Conventionally a supervised learning employs number of pixels.
the well-known BPA with a linear weight function and uses 11. The final value obtained will be put in the center of the
the steepest-descent method (SDM) as found in [11] for filtered image.
weight updating. Several others [12] have strengthened the 12.Now, pass around this filter and do the same for every pi
BPA by implementing other improvements to quicker xel in the image.
convergence. Hirose [13] used an algorithm to analyze the
number of hidden nodes, based on the mean squared error. 2.2 ReLu Layer
1. Rectified Linear Unit (ReLU) transform function only
Besides the above, optimal discriminating plane activates a node if the input is above a certain quantity,
technique [14] was used to map n-dimensional pattern into while the input is below zero, the output is zero.
a 2-dimensional pattern to train the ANN. Echo state 2. When the input rises above a certain threshold, it has a
Neural Network [15] possesses a highly interconnected and linear relationship with the dependent variable.
recurrent nonlinear Processing Elements (PEs) topology 3. Considered a simple function. So that function only
that constitutes a "reservoir of rich dynamics" and includes performs an operation if that value is obtained by the
knowledge on the past of input and output sequence. This dependent variable.
was attempted at detection of intrusion. Throughout the 4. Remove all the negative values from the convolution. All
work the various algorithms developed were used for the positive values remain the same but all the negative
intrusion detection on data obtained during Knowledge values get changed to zero.
Discovery and Data mining (KDD). Additionally, the well- 5. After processing a particular feature we get an output,
known XOR issue was used as benchmark data. likewise do the same process to all the other feature images.
3. Experimental Analysis
The algorithm relies on
the supervised learning. Thenumber of iterations needed for
different values fordifferent ranges of convergence weights
for SVM, thenumber of iterations needed for constant weig
hts forSVM and the number of iterations required for
different hidden nodes for SVM with one hidden layer. A
distinction is made between the iterations necessary by one
hidden layer and two hidden layers in SVM, the iterations
needed for the nodes in the hidden layer for various value
of SVM and the iterations necessary by the collection was
isolated from each other as teaching and testing (intrusion
detection).Education involves the creation of weights
suggesting a detailed understanding of intrusion and natural
packets along with correct marking.
Figure 1 indicates the convergence rate of supervised
Fig2. Multiple layer perceptron
algorithm success in classification is shown in Table 1.
Table 2, shows false acceptance rates and false refusal rates
3.1 ANN’s Structural variants-Hierarchical structures
.
(HS)
Thedirectclassificationmethod forthe two classification
problem is simple to implement andrequires no assumption
about an effective partitioning of the whole problem into
subtasks. With hierarchicalclassification one can
independently design parts of theentire system.The aim of
anyone is to break down thecomplexity of the problem and
describe every differentsub problems those are easier to be
solved by each. Thevarious approach has 2
advantages.Hierarchical classification is introduced with a
view to classifying and preventingother attacks.Which
results from thefactwhich discriminating regions are in
conflict withthose of other groups for trends of these two
classes.Second, we can create more complex decision
making regions with this scheme than simple classification
ones.
Statistical Methods
Fig1. Mean squared error curve The characteristics ofthe patterns are standardized by taking
the maximum value of each the
Table 1. Classification performance attribute and splitting the same characteristic values for all
patterns.
Total This is because the sigmoid function outputs will never reac
Packet No. No.
No. h 0.0 or 1.0.When using functional update method, the patte
type classified misclassified
tested rn is coded in binary.
Normal 1500 1492 8 It is necessary to selectpatterns for the
Intrusion 2500 1415 140 training the neural network, since they should be representa
tive of all patterns collected duringmachining. So,the
Table 2. False acceptance / Rejection rate statistical methods were used for identify the patterns of
training and research. Selected for each class pattern
Packet False Acceptance False Rejection with maximum, VEi2 variance. .
type Rate (FAR) Rate (FRR)
Normal 5.6% (140/2500) 0.53% (8/1500) The maximum VEi2 of a pattern can be found at the equati
Intrusion 9.4%(140/1500) 0.3%(8/2500) on,
nf
(A ij A j )2
j 1
VEi2=
i2
1 L
i2 ( Aij A j ) 2
L i 1
[16] P Vincent, H. Larochelle, I. Lajoie, Y. Bengio, and P.- [29] Y. Wang, W.-D. Cai, and P.-C. Wei, "A deep learning
A. Manzagol,"Stacked denoising autoencoders: approach for detecting malicious JavaScript code,"
Learning useful representations in a deep network with Security Commun. Netw, vol. 9, no. 11,pp. 1520-1534,
a local denoising criterion," J. Mach. Learn. Res.,vol. Jul. 2016
11, pp. 3371-3408, 2010 [30] H.-W. Lee, N.-R. Kim, and J.-H. Lee, "Deep neural
[17] G E. Hinton and R. R. Salakhutdinov, "Reducing the network self-training based on unsupervised learning
dimensionality of data with neural networks," Science, and dropout," Int. J. Fuzzy Logic Intell.Syst., vol. 17,
vol. 313, no. 5786, pp. 504-507,2006 no. 1, pp. 1-9, Mar. 2017
[18] Y. Wang, H. Yao, and S. Zhao, "Auto-encoder based
dimensionality reduction," Neurocomputing, vol. 184, AUTHOR
pp. 232-242, 2016 Mr. Manjunath H, received the B.Tech in Computer
[19] Z. Liang, G. Zhang, J. X. Huang, and Q. V. Hu, "Deep Science and Engineering, MTech degree in Computer
learning for healthcare decision making with EMRs," Science Engineering from VTU. He is working as Assistant
in Proc. IEEE Int. Conf. Bioinformat.Biomed., Nov. Professor in Department of CSE at CMRU and is a research
2014, pp. 556-559 scholar. He doing is research in Arificial Intelligence at
CMRU, Bangalore.He has worked in Evry India as Oracle
[20] F. Falcini, G. Lami, and A. M. Costanza, "Deep
developer for 3 years.
learning in automotive software," IEEE Softw., vol. 34,
Dr S Saravana Kumar received the B.Tech in Information
no. 3, pp. 56-63, May 2017. [Online]. Available:
Technology, M.E. degrees in Computer Science
http://ieeexplore.ieee.org/document/7927925/
Engineering from Anna Universityand PhD in Artificial
[21] A. Luckow, M. Cook, N. Ashcraft, E. Weill, E. Intelligence. He working as Professor in Department of
Djerekarov, and B. Vorster,"Deep learning in the CSE at CMRU. He has Published 105 international Journal
automotive industry: Applications and tools," in Proc. and Presented 80 papers in International Conference. His
IEEE Int. Conf. Big Data, Dec. 2016, pp. 3759-3768. research area in Artificial Intelligence, Deep Learning and
[Online].Available: Computer Vision.
http://ieeexplore.ieee.org/document/7841045/
[22] H. Lee, Y. Kim, and C. O. Kim, "A deep learning
model for robust wafer fault monitoring with sensor
measurement noise," IEEE Trans. Semicond.Manuf.,
vol. 30, no. 1, pp. 23-31, Feb. 2017
[23] L. You, Y. Li, Y. Wang, J. Zhang, and Y. Yang, "A
deep learning based RNNs model for automatic
security audit of short messages," in Proc. 16th Int.
Symp. Commun. Inf. Technol., Qingdao, China, Sep.
2016. 225-229
[24] R. Polishetty, M. Roopaei, and P. Rad, "A next-
generation secure cloudbased deep learning license
plate recognition for smart cities," in Proc.15th IEEE
Int. Conf. Mach. Learn. Appl., Anaheim, CA, USA,
Dec. 2016. 286-293
[25] K. Alrawashdeh and C. Purdy, "Toward an online
anomaly intrusion detection system based on deep
learning," in Proc. 15th IEEE Int. Conf. Mach. Learn.
Appl., Anaheim, CA, USA, Dec. 2016. 195-200.
[26] J. Kim, N. Shin, S. Y. Jo, and S. H. Kim, "Method of
intrusion detection using deep neural network," in
Proc. IEEE Int. Conf. Big Data Smart Comput., Hong
Kong, China, Feb. 2017, pp. 313-316
[27] E. Hodo, X. J. A. Bellekens, A. Hamilton, C.
Tachtatzis, and R. C. Atkinson, Shallow and deep
networks intrusion detection system: A taxonomy and
survey, Submitted to ACM Survey, 2017, [Online].
Available:http://arxiv.org/abs/1701.02145
[28] Q. Niyaz, W. Sun, and A. Y. Javaid, A deep learning
based DDOS detection system in software-defined
networking (SDN), Submitted to EAI Endorsed
Transactions on Security and Safety, In Press, 2017,
[Online].Available: http://arxiv.org/abs/1611.07400