• Title/Summary/Keyword: Algorithm selection

Search Result 2,493, Processing Time 0.034 seconds

FAFS: A Fuzzy Association Feature Selection Method for Network Malicious Traffic Detection

  • Feng, Yongxin;Kang, Yingyun;Zhang, Hao;Zhang, Wenbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.240-259
    • /
    • 2020
  • Analyzing network traffic is the basis of dealing with network security issues. Most of the network security systems depend on the feature selection of network traffic data and the detection ability of malicious traffic in network can be improved by the correct method of feature selection. An FAFS method, which is short for Fuzzy Association Feature Selection method, is proposed in this paper for network malicious traffic detection. Association rules, which can reflect the relationship among different characteristic attributes of network traffic data, are mined by association analysis. The membership value of association rules are obtained by the calculation of fuzzy reasoning. The data features with the highest correlation intensity in network data sets are calculated by comparing the membership values in association rules. The dimension of data features are reduced and the detection ability of malicious traffic detection algorithm in network is improved by FAFS method. To verify the effect of malicious traffic feature selection by FAFS method, FAFS method is used to select data features of different dataset in this paper. Then, K-Nearest Neighbor algorithm, C4.5 Decision Tree algorithm and Naïve Bayes algorithm are used to test on the dataset above. Moreover, FAFS method is also compared with classical feature selection methods. The analysis of experimental results show that the precision and recall rate of malicious traffic detection in the network can be significantly improved by FAFS method, which provides a valuable reference for the establishment of network security system.

Low-complexity Sensor Selection Based on QR factorization (QR 분해에 기반한 저 복잡도 센서 선택 알고리즘)

  • Yoon Hak, Kim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.103-108
    • /
    • 2023
  • We study the problem of selecting a subset of sensor nodes in sensor networks in order to maximize the performance of parameter estimation. To achieve a low-complexity sensor selection algorithm, we propose a greedy iterative algorithm that allows us to select one sensor node at a time so as to maximize the log-determinant of the inverse of the estimation error covariance matrix without resort to direct minimization of the estimation error. We apply QR factorization to the observation matrix in the log-determinant to derive an analytic selection rule which enables a fast selection of the next node at each iteration. We conduct the extensive experiments to show that the proposed algorithm offers a competitive performance in terms of estimation performance and complexity as compared with previous sensor selection techniques and provides a practical solution to the selection problem for various network applications.

VSC HVDC Site Selection Using Power Tracing (Power Tracing을 이용한 VSC HVDC 설치위치 선정)

  • Oh, Sea-Seung;Jang, Gil-Soo;Moon, Seung-Il
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.162-164
    • /
    • 2007
  • This paper presents a HVDC site selection algorithm to increase transfer capability using VSC HVDC system which can control active power as well as reactive power. Using normal powerflow results and simple index $k_r$ the HVDC site selection algorithm is enhanced and more tightly-coupled transmission lines are identified in a domain of generators.

  • PDF

A Study on Hybrid Feature Selection in Intrusion Detection System (침입탐지시스템에서 하이브리드 특징 선택에 관한 연구)

  • Han Myeong-Muk
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.05a
    • /
    • pp.279-282
    • /
    • 2006
  • 네트워크를 기반으로 한 컴퓨터 시스템이 현대 사회에 있어서 더욱 더 불가결한 역할을 하는 것에 따라, 네트워크 기반 컴퓨터 시스템은 침입자의 침입 목표가 되고 있다. 이를 보호하기 위한 침입탐지시스템(Intrusion Detection System : IDS)은 점차 중요한 기술이 되었다. 침입탐지시스템에서 패턴들을 분석한 후 정상/비정상을 판단 및 예측하기 위해서는 초기단계인 특징추출이나 선택이 매우 중요한 부분이 되고 있다. 본 논문에서는 IDS에서 중요한 부분인 feature selection을 Data Mining 기법인 Genetic Algorithm(GA)과 Decision Tree(DT)를 적용해서 구현했다.

  • PDF

Reactive navigation of mobile robots using optmal via-point selection method (최적 경유점 선택 방법을 이용한 이동로봇의 반응적 주행)

  • 김경훈;조형석
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.227-230
    • /
    • 1997
  • In this paper, robot navigation experiments with a new navigation algorithm are carried out in real environments. The authors already proposed a reactive navigation algorithm for mobile robots using optimal via-point selection method. At each sampling time, a number of via-point candidates is constructed with various candidates of heading angles and velocities. The robot detects surrounding obstacles, and the proposed algorithm utilizes fuzzy multi-attribute decision making in selecting the optimal via-point the robot would proceed at next step. Fuzzy decision making allows the robot to choose the most qualified via-point even when the two navigation goals-obstacle avoidance and target point reaching-conflict each other. The experimental result shows the successful navigation can be achieved with the proposed navigation algorithm for real environments.

  • PDF

An Efficient Stochastic Channel Selection Algorithm for Cognitive Radio Networks (무선인지시스템을 위한 효율적인 채널 선택 알고리즘)

  • Pham, Thi Hong Chau;Koo, In-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.29-35
    • /
    • 2009
  • An efficient stochastic channel selection algorithm for cognitive radio networks is proposed and analyzed in this paper. With the new algorithm utilizing quality of channels, the stationary level of the channels in idle state and history performance, we can find the best channel for secondary users to transmit data. Moreover, this method not only restricts channel switching of secondary users but also adapts to random resource environment of cognitive radio network. The advantages of the proposed algorithm are demonstrated clearly through computer simulation.

  • PDF

Item Selection By Estimated Profit Ranking Based on Association Rule (연관규칙을 이용한 상품선택과 기대수익 예측)

  • Hwang, In-Soo
    • Asia pacific journal of information systems
    • /
    • v.14 no.4
    • /
    • pp.87-97
    • /
    • 2004
  • One of the most fundamental problems in business is ranking items with respect to profit based on historical transactions. The difficulty is that the profit of one item comes from its influence on the sales of other items as well as its own sales, and that there is no well-developed algorithm for estimating overall profit of selected items. In this paper, we developed a product network based on association rule and an algorithm for profit estimation and item selection using the estimated profit ranking(EPR). As a result of computer simulation, the suggested algorithm outperforms the individual approach and the hub-authority profit ranking algorithm.

Packet Scheduling for Cellular Relay Networks by Considering Relay Selection, Channel Quality, and Packet Utility

  • Zhou, Rui;Nguyen, Hoang Nam;Sasase, Iwao
    • Journal of Communications and Networks
    • /
    • v.11 no.5
    • /
    • pp.464-472
    • /
    • 2009
  • In this paper, we propose a packet scheduling algorithm for cellular relay networks by considering relay selection, variation of channel quality, and packet delay. In the networks, mobile users are equipped with not only cellular but also user relaying radio interfaces, where base station exploits adaptive high speed downlink channel. Our proposed algorithm selects a user with good cellular channel condition as a relay station for other users with bad cellular channel condition but can get access to relay link with good quality. This can achieve flexible packet scheduling by adjusting transmission rates of cellular link. Packets are scheduled for transmission depending on scheduling indexes which are calculated based on user's achieved transmission rate, packet utility, and proportional fairness of their throughput. The performance results obtained by using computer simulation show that the proposed scheduling algorithm is able to achieve high network capacity, low packet loss, and good fairness in terms of received throughput of mobile users.

Fuzzy Logic Based Temporal Error Concealment for H.264 Video

  • Lee, Pei-Jun;Lin, Ming-Long
    • ETRI Journal
    • /
    • v.28 no.5
    • /
    • pp.574-582
    • /
    • 2006
  • In this paper, a new error concealment algorithm is proposed for the H.264 standard. The algorithm consists of two processes. The first process uses a fuzzy logic method to select the size type of lost blocks. The motion vector of a lost block is calculated from the current frame, if the motion vectors of the neighboring blocks surrounding the lost block are discontinuous. Otherwise, the size type of the lost block can be determined from the preceding frame. The second process is an error concealment algorithm via a proposed adapted multiple-reference-frames selection for finding the lost motion vector. The adapted multiple-reference-frames selection is based on the motion estimation analysis of H.264 coding so that the number of searched frames can be reduced. Therefore the most accurate mode of the lost block can be determined with much less computation time in the selection of the lost motion vector. Experimental results show that the proposed algorithm achieves from 0.5 to 4.52 dB improvement when compared to the method in VM 9.0.

  • PDF