• 제목/요약/키워드: KDD

검색결과 122건 처리시간 0.04초

침입탐지시스템에서의 특징 선택에 대한 연구 (A Study for Feature Selection in the Intrusion Detection System)

  • 한명묵
    • 융합보안논문지
    • /
    • 제6권3호
    • /
    • pp.87-95
    • /
    • 2006
  • 침입은 컴퓨터 자원의 무결성, 기밀성, 유효성을 저해하고 컴퓨터 시스템의 보안정책을 파괴하는 일련의 행위의 집합이다. 이러한 침입을 탐지하는 침입탐지시스템은 데이터 수집, 데이터의 가공 및 축약, 침입 분석 및 탐지 그리고 보고 및 대응의 4 단계로 구성되어진다. 침입탐지시스템의 방대한 데이터가 수집된 후, 침입을 효율적으로 탐지하기 위해서는 특징 선택이 중요하다. 이 논문에서 유전자 알고리즘과 결정트리를 활용한 특징 선택 방법을 제안한다. 또한 KDD 데이터에서 실험을 통해 방법의 유효성을 검증한다.

  • PDF

데이터 마이닝을 위한 퍼지 결정트리 (A Fuzzy Decision Tree for Data Mining)

  • 이중근;민창우;김명원
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 1998년도 가을 학술발표논문집 Vol.25 No.2 (2)
    • /
    • pp.63-65
    • /
    • 1998
  • 사회 전 분야에서 데이터가 폭발적으로 증가함에 따라 데이터를 이해하고 분석하는 새로운 자동적이고 지능적인 데이터 분석 도구와 기술이 필요하게 되었다. KDD(Knowledge Discovery in Databases)는 이러한 필요로부터 데이터에서 유용하고 이해 가능한 지식을 추출하는 연구이다. 데이터 마이닝(Data Mining)은 KDD에서 가장 중요한 단계로 데이터로부터 지식을 추출하는 단계이다. 데이터 마이닝에서 생성된 지식은 좋은 분류율을 가져야하고 이해하기 쉬워야한다. 본 논문에서는 퍼지 결정트리(FDT : Fuzzy Decision Tree)에 기반한 효율적인 데이터 마이닝 알고리즘을 제안한다. FDT의 각 링크는 속성(attribute) 값을 갖는 퍼지 집합이며, EDT의 각 경로는 퍼지 규칙을 생성한다. 제안된 알고리즘은 ID3의 이해성과 퍼지이론의 추론과 표현력을 결합한 방법으로 히스토그램에 이루어진다. 마지막으로 제안된 방법의 타당성을 검증하기 위해 표준적인 패턴 분류 벤치마크 데이터에 대한 실험 결과를 보인다.

  • PDF

Genetic Algorithm에 기반한 경영성과분석 시스템 구현 (Implementation of Management performance Analysis System with Genetic Algorithms)

  • 안동규;조성훈
    • 한국디지털정책학회:학술대회논문집
    • /
    • 한국디지털정책학회 2003년도 창립학술대회
    • /
    • pp.191-210
    • /
    • 2003
  • In modern dynamic management environment, there is growing recognition that information & knowledge management systems are essential for CEO's Efficient/effective decision making, As a key component to cope with this current, we suggest the management performance analysis system based on Knowledge Discovery in Database (KDD). The system measures management performance that is considered with both VA(Value-Added), which represents stakeholder's point of view and EVA(Economic Value-Added), which represents shareholder's point of view, The relationship between management performance and some 80 financial ratios is analyzed, and then important financial ratios are drawn out. In analyzing the relationship, we applied KDD process which includes such as multidimensional cube, OLAP(On -Line Analytic Process), data mining and AHP(Analytic Hierarchy Process). To demonstrate the performance of the system, we conducted a case study using financial data over the 16-years from 1981 to 1996 of Korean automobile industry which is taken from database of KISFAS(Korea Investors Services Financial Analysis System).

  • PDF

Phase Characteristics of Approximated Head-related Transfer Functions(HRTFS) Using IIR Filters on the Sound Localization

  • Kanazawa, Kenichi;Hasegawa, Hiroshi;Kasuga, Masao;Matsumoto, Shuichi;Koike, Atsushi;Yamamoto, Hideo
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 ITC-CSCC -1
    • /
    • pp.237-240
    • /
    • 2000
  • We have proposed a simple method based on IIR filters for realizing sound image localization. How-ever the nonlinearity of phase characteristics of the IIR filters, which are used for sound image localization, cause decrease of the localization accuracy. In this paper we investigate the influence of phase characteristics on the sound localization. Head-related transfer functions (HRTFs) of a dummy-head are approximated by the IIR filter. We carried out sound image localization experiment with 2-loudspeaker reproduction using the approximated HRTFs. Then the errors which obtained from experiments were compared with the theoretical values which were estimated from the phase shifts of the IIR filters. As a result there was little influence of the nonlinear phase characteristics of the IIR fitters in the localization on the horizontal plane.

  • PDF

데이터베이스 지식발견체계에 기반한 경영성과 정보시스템의 구축 (Modeling a Business Performance Information System with Knowledge Discovery in Databases)

  • 조성훈;정민용;김종화
    • 산업공학
    • /
    • 제14권2호
    • /
    • pp.164-171
    • /
    • 2001
  • We suggest a Business Performance Information System with Knowledge Discovery in Databases(KDD) as a key component of integrated information and knowledge management system. The proposed system measures business performance by considering both VA(Value-Added), which represents stakeholder's point of view and EVA(Economic Value-Added), which represents shareholder's point of view. In modeling of Business Performance Information System, we apply the following KDD processes : Data Warehouse for consistent management of a performance data, On-Line Analytic Processing(OLAP) for multidimensional analysis, Genetic Algorithms for exploring and finding dominant managing factors and Analytic Hierarchy Process(AHP) for applying expert's knowledge and experience. To demonstrate the performance of the system, we conducted a case study using financial data of Korean automobile industry over 16 years from 1981 to 1996, which is taken from database of KISFAS(Korea Investors Services Financial Analysis System).

  • PDF

Fast Conditional Independence-based Bayesian Classifier

  • Junior, Estevam R. Hruschka;Galvao, Sebastian D. C. de O.
    • Journal of Computing Science and Engineering
    • /
    • 제1권2호
    • /
    • pp.162-176
    • /
    • 2007
  • Machine Learning (ML) has become very popular within Data Mining (KDD) and Artificial Intelligence (AI) research and their applications. In the ML and KDD contexts, two main approaches can be used for inducing a Bayesian Network (BN) from data, namely, Conditional Independence (CI) and the Heuristic Search (HS). When a BN is induced for classification purposes (Bayesian Classifier - BC), it is possible to impose some specific constraints aiming at increasing the computational efficiency. In this paper a new CI based approach to induce BCs from data is proposed and two algorithms are presented. Such approach is based on the Markov Blanket concept in order to impose some constraints and optimize the traditional PC learning algorithm. Experiments performed with the ALARM, as well as other six UCI and three artificial domains revealed that the proposed approach tends to execute fewer comparison tests than the traditional PC. The experiments also show that the proposed algorithms produce competitive classification rates when compared with both, PC and Naive Bayes.

A Better Prediction for Higher Education Performance using the Decision Tree

  • Hilal, Anwar;Zamani, Abu Sarwar;Ahmad, Sultan;Rizwanullah, Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.209-213
    • /
    • 2021
  • Data mining is the application of specific algorithms for extracting patterns from data and KDD is the automated or convenient extraction of patterns representing knowledge implicitly stored or captured in large databases, data warehouses, the Web, other massive information repositories or data streams. Data mining can be used for decision making in educational system. But educational institution does not use any knowledge discovery process approach on these data; this knowledge can be used to increase the quality of education. The problem was happening in the educational management system, but to make education system more flexible and discover knowledge from it huge data, we will use data mining techniques to solve problem.

Hybrid Model Based Intruder Detection System to Prevent Users from Cyber Attacks

  • Singh, Devendra Kumar;Shrivastava, Manish
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.272-276
    • /
    • 2021
  • Presently, Online / Offline Users are facing cyber attacks every day. These cyber attacks affect user's performance, resources and various daily activities. Due to this critical situation, attention must be given to prevent such users through cyber attacks. The objective of this research paper is to improve the IDS systems by using machine learning approach to develop a hybrid model which controls the cyber attacks. This Hybrid model uses the available KDD 1999 intrusion detection dataset. In first step, Hybrid Model performs feature optimization by reducing the unimportant features of the dataset through decision tree, support vector machine, genetic algorithm, particle swarm optimization and principal component analysis techniques. In second step, Hybrid Model will find out the minimum number of features to point out accurate detection of cyber attacks. This hybrid model was developed by using machine learning algorithms like PSO, GA and ELM, which trained the system with available data to perform the predictions. The Hybrid Model had an accuracy of 99.94%, which states that it may be highly useful to prevent the users from cyber attacks.

A Study on Security Event Detection in ESM Using Big Data and Deep Learning

  • Lee, Hye-Min;Lee, Sang-Joon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권3호
    • /
    • pp.42-49
    • /
    • 2021
  • As cyber attacks become more intelligent, there is difficulty in detecting advanced attacks in various fields such as industry, defense, and medical care. IPS (Intrusion Prevention System), etc., but the need for centralized integrated management of each security system is increasing. In this paper, we collect big data for intrusion detection and build an intrusion detection platform using deep learning and CNN (Convolutional Neural Networks). In this paper, we design an intelligent big data platform that collects data by observing and analyzing user visit logs and linking with big data. We want to collect big data for intrusion detection and build an intrusion detection platform based on CNN model. In this study, we evaluated the performance of the Intrusion Detection System (IDS) using the KDD99 dataset developed by DARPA in 1998, and the actual attack categories were tested with KDD99's DoS, U2R, and R2L using four probing methods.

Intrusion Detection using Attribute Subset Selector Bagging (ASUB) to Handle Imbalance and Noise

  • Priya, A.Sagaya;Kumar, S.Britto Ramesh
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.97-102
    • /
    • 2022
  • Network intrusion detection is becoming an increasing necessity for both organizations and individuals alike. Detecting intrusions is one of the major components that aims to prevent information compromise. Automated systems have been put to use due to the voluminous nature of the domain. The major challenge for automated models is the noise and data imbalance components contained in the network transactions. This work proposes an ensemble model, Attribute Subset Selector Bagging (ASUB) that can be used to effectively handle noise and data imbalance. The proposed model performs attribute subset based bag creation, leading to reduction of the influence of the noise factor. The constructed bagging model is heterogeneous in nature, hence leading to effective imbalance handling. Experiments were conducted on the standard intrusion detection datasets KDD CUP 99, Koyoto 2006 and NSL KDD. Results show effective performances, showing the high performance of the model.