Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory Konstantinos Demertzis.

Slides:



Advertisements
Similar presentations
Approaches, Tools, and Applications Islam A. El-Shaarawy Shoubra Faculty of Eng.
Advertisements

Using Parallel Genetic Algorithm in a Predictive Job Scheduling
School of Cybernetics, School of Systems Engineering, University of Reading Presentation Skills Workshop March 22, ‘11 Diagnosis of Breast Cancer by Modular.
An Introduction to Artificial Intelligence. Introduction Getting machines to “think”. Imitation game and the Turing test. Chinese room test. Key processes.
4 Intelligent Systems.
Institute of Intelligent Power Electronics – IPE Page1 Introduction to Basics of Genetic Algorithms Docent Xiao-Zhi Gao Department of Electrical Engineering.
The Decision-Making Process IT Brainpower
Evolutionary Algorithms Simon M. Lucas. The basic idea Initialise a random population of individuals repeat { evaluate select vary (e.g. mutate or crossover)
Genetic Algorithms Learning Machines for knowledge discovery.
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 7: Expert Systems and Artificial Intelligence Decision Support.
Natural Computation: computational models inspired by nature Dr. Daniel Tauritz Department of Computer Science University of Missouri-Rolla CS347 Lecture.
Foundations of Computational Intelligence The basis of Smart Adaptive Systems of the future? Bogdan Gabrys Smart Technology Research Centre Computational.
Basic concepts of Data Mining, Clustering and Genetic Algorithms Tsai-Yang Jea Department of Computer Science and Engineering SUNY at Buffalo.
1 MACHINE LEARNING TECHNIQUES IN IMAGE PROCESSING By Kaan Tariman M.S. in Computer Science CSCI 8810 Course Project.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
CS 1 – Introduction to Computer Science Introduction to the wonderful world of Dr. T Dr. Daniel Tauritz.
Learning Programs Danielle and Joseph Bennett (and Lorelei) 4 December 2007.
Neural Optimization of Evolutionary Algorithm Strategy Parameters Hiral Patel.
Genetic Algorithm What is a genetic algorithm? “Genetic Algorithms are defined as global optimization procedures that use an analogy of genetic evolution.
02 -1 Lecture 02 Agent Technology Topics –Introduction –Agent Reasoning –Agent Learning –Ontology Engineering –User Modeling –Mobile Agents –Multi-Agent.
Artificial Intelligence
Artificial Intelligence
Revision Michael J. Watts
CHAPTER 12 ADVANCED INTELLIGENT SYSTEMS © 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Department of Information Technology Indian Institute of Information Technology and Management Gwalior AASF hIQ 1 st Nov ‘09 Department of Information.
Slides are based on Negnevitsky, Pearson Education, Lecture 12 Hybrid intelligent systems: Evolutionary neural networks and fuzzy evolutionary systems.
TECHNOLOGY GUIDE FOUR Intelligent Systems.
An Introduction to Artificial Intelligence and Knowledge Engineering N. Kasabov, Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering,
Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Decision Support Systems Chapter 10.
Lecture 8: 24/5/1435 Genetic Algorithms Lecturer/ Kawther Abas 363CS – Artificial Intelligence.
Basic Data Mining Technique
Chapter 8 The k-Means Algorithm and Genetic Algorithm.
RECENT DEVELOPMENTS OF INDUCTION MOTOR DRIVES FAULT DIAGNOSIS USING AI TECHNIQUES 1 Oly Paz.
An Overview of Intrusion Detection Using Soft Computing Archana Sapkota Palden Lama CS591 Fall 2009.
Introduction to Artificial Intelligence and Soft Computing
Overview of Part I, CMSC5707 Advanced Topics in Artificial Intelligence KH Wong (6 weeks) Audio signal processing – Signals in time & frequency domains.
1 Machine Learning 1.Where does machine learning fit in computer science? 2.What is machine learning? 3.Where can machine learning be applied? 4.Should.
I Robot.
Genetic Algorithms. Evolutionary Methods Methods inspired by the process of biological evolution. Main ideas: Population of solutions Assign a score or.
Data Mining and Decision Trees 1.Data Mining and Biological Information 2.Data Mining and Machine Learning Techniques 3.Decision trees and C5 4.Applications.
Chapter 1: Introduction to Neuro-Fuzzy (NF) and Soft Computing (SC)
Artificial Intelligence: Research and Collaborative Possibilities a presentation by: Dr. Ernest L. McDuffie, Assistant Professor Department of Computer.
Anomaly Detection. Network Intrusion Detection Techniques. Ştefan-Iulian Handra Dept. of Computer Science Polytechnic University of Timișoara June 2010.
A field of study that encompasses computational techniques for performing tasks that require intelligence when performed by humans. Simulation of human.
Organic Evolution and Problem Solving Je-Gun Joung.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 28 Data Mining Concepts.
DATA MINING TECHNIQUES (DECISION TREES ) Presented by: Shweta Ghate MIT College OF Engineering.
TECHNOLOGY GUIDE FOUR Intelligent Systems. TECHNOLOGY GUIDE OUTLINE TG4.1 Introduction to Intelligent Systems TG4.2 Expert Systems TG4.3 Neural Networks.
An Evolutionary Algorithm for Neural Network Learning using Direct Encoding Paul Batchis Department of Computer Science Rutgers University.
Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory Konstantinos Demertzis.
George Yauneridge.  Machine learning basics  Types of learning algorithms  Genetic algorithm basics  Applications and the future of genetic algorithms.
Course Outline (6 Weeks) for Professor K.H Wong
Evolving Computational Intelligence System for Malware Detection
Big data classification using neural network
Machine Learning for Computer Security
CHAPTER 1 Introduction BIC 3337 EXPERT SYSTEM.
Intro to Machine Learning
School of Computer Science & Engineering
TECHNOLOGY GUIDE FOUR Intelligent Systems.
RESEARCH APPROACH.
What is Pattern Recognition?
Artificial Intelligence introduction(2)
Chapter 12 Advanced Intelligent Systems
Introduction to Artificial Intelligence and Soft Computing
Prepared by: Mahmoud Rafeek Al-Farra
3.1.1 Introduction to Machine Learning
MACHINE LEARNING TECHNIQUES IN IMAGE PROCESSING
MACHINE LEARNING TECHNIQUES IN IMAGE PROCESSING
Introduction to Artificial Intelligence Instructor: Dr. Eduardo Urbina
Presentation transcript:

Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory Konstantinos Demertzis – Lazaros Iliadis ESADM ECISMD Hybrid Artificial Intelligence System for Cyber Security

2  Agenda –Introduction –Hybrid Artificial Intelligence System for Cyber Security (HAISCS) –Evolving Spiking Anomaly Detection Model (ESADM) –Evolving Computational Intelligence System for Malware Detection (ECISMD) –ESADM –Spiking Neural Network Classification –Spiking Neural Network Pattern Recognition –ECISMD –Spiking Neural Network Classification –Evolving Classification Function (ECF) –Genetic Algorithm for Offline ECF Optimization –Results –Future Directions –Conclusions Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

3  Introduction –Artificial Intelligence (AI) –is the intelligence exhibited by machines or software, and the branch of computer science that develops machines and software with intelligence. –Machine Learning –a branch of artificial intelligence, concerns the construction and study of systems that can learn from data. Hybrid Artificial Intelligence System for Cyber Security –Pattern Recognition –in machine learning aims to classify data (patterns) based on either priori knowledge extracted from the patterns. –Classification –is the problem of identifying to which of a set of categories (sub-populations) a new observation belongs, on the basis of a training set of data containing observations (or instances) whose category membership is known (Supervised Learning). Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

4  Hybrid Artificial Intelligence System for Cyber Security (HAISCS) Hybrid Evolving Spiking Anomaly Detection Model (HESADM) Hybrid Artificial Intelligence System for Cyber Security ESADM ECISMD Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

5  Evolving Spiking Anomaly Detection Model (ESADM) Hybrid Artificial Intelligence System for Cyber Security ESADM Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

6  Evolving Spiking Anomaly Detection Model (ESADM) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

7  Evolving Spiking Anomaly Detection Model (ESADM) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

8  Evolving Spiking Anomaly Detection Model (ESADM) –Evolving Spiking Neural Network (eSNN) Classification –Gaussian Receptive Fields –Rank Order Population Encoding –One-Pass Learning Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

9  Evolving Spiking Anomaly Detection Model (ESADM) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

10  Evolving Spiking Anomaly Detection Model (ESADM) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

11  Evolving Spiking Anomaly Detection Model (ESADM) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

12  Evolving Spiking Anomaly Detection Model (ESADM) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

13  Evolving Spiking Anomaly Detection Model (ESADM) Hybrid Artificial Intelligence System for Cyber Security Traf_Red_Full Dataset Classifier Train Accuracy Test Accuracy NaiveBayes96.387% % RBFNetwork % % MLP % % LibSVM % % k-NN % % J % % RandomForest97.57% % LogisticRegression % % BayesNet % % AdaBoost %95.947% eSNN98,9%97,7% normalFull Dataset Classifier Train Accuracy Test Accuracy NaiveBayes %98.895% RBFNetwork % % MLP % % LibSVM99.673% % k-NN % % J %99.719% RandomForest % % LogisticRegression98.998% % BayesNet % % AdaBoost % % eSNN99.999%99.9% Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

14  Evolving Computational Intelligence System for Malware Detection (ECISMD) Hybrid Artificial Intelligence System for Cyber Security ESADM ECISMD Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

15  Evolving Computational Intelligence System for Malware Detection (ECISMD) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

16  Evolving Computational Intelligence System for Malware Detection (ECISMD) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

17  Evolving Computational Intelligence System for Malware Detection (ECISMD) –Evolving Classification Function (ECF) –used for pattern classification, generates rule nodes in an N dimensional input space and associate them with classes. Each rule node is defined with its centre, radius (influence field) and the class it belongs to. A learning mechanism is designed in such a way that the nodes can be generated. Hybrid Artificial Intelligence System for Cyber Security Rule 1:if X1 is ( 2: 0.50 ) X2 is ( 1: 0.69 ) X3 is ( 1: 0.95 ) X4 is ( 1: 0.95 ) X5 is ( 1: 0.94 ) X6 is ( 1: 0.52 ) X7 is ( 1: 0.95 ) X8 is ( 2: 0.87 ) X9 is ( 2: 0.82 ) then Class is [1] Radius = , 20 in node Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

18  Evolving Computational Intelligence System for Malware Detection (ECISMD) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

19  Evolving Computational Intelligence System for Malware Detection (ECISMD). Hybrid Artificial Intelligence System for Cyber Security –Genetic Algorithm for Offline ECF Optimization –A Genetic Algorithm is an evolutionary algorithm in which the principles of the Darwin's theory of evolution are applied to a population of solutions to a problem in order to "breed" better solutions. –Solutions, in this case the parameters of the ECF network, are encoded in a binary string and each solution is given a score depending on how well it performs. –Good solutions are selected more frequently for breeding, and are subjected to crossover and mutation (loosely analogous to those operations found in biological systems). –After several generations, the population of solutions should converge on a "good" solution. Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

20  Evolving Computational Intelligence System for Malware Detection (ECISMD) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

21  Evolving Computational Intelligence System for Malware Detection (ECISMD) Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

22  Evolving Computational Intelligence System for Malware Detection (ECISMD) Hybrid Artificial Intelligence System for Cyber Security Packed Dataset Classifier Train Accuracy Test Accuracy RBFNetwork % % NaiveBayes % % MLP % % LibSVM % % k-NN % % eSNN99.8%99.2% Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

23  Evolving Computational Intelligence System for Malware Detection (ECISMD) Hybrid Artificial Intelligence System for Cyber Security Malware Dataset Classifier Train Accuracy Test Accuracy RBFNetwork % % NaiveBayes % % MLP %97.289% LibSVM % % k-NN % % ECF99.05%95.561% Optimized ECF 99.87%97.992% Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

24  Evolving Computational Intelligence System for Malware Detection (ECISMD) –Future Directions Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

25  [1] Delorme A., Perrinet L. & Thorpe S. J., (2000), «Networks of Integrate-and-Fire Neurons using Rank Order Coding B: Spike Timing Dependant Plasticity and Emergence of Orientation Selectivity», Published in Neurocomputing, 38-40(1-4), ,  [2] Garcıa P. - Teodoro, Dıaz-Verdejo J., Macia-Fernandez G., Vazquez E., (2009), «Anomaly-based network intrusion detection: Techniques, systems and challenges», Elsevier computers & security 28 (2009) 18–28.  [3] Kasabov Nikola, (2006), «Evolving Connectionist Systems: The Knowledge Engineering Approach», Springer-Verlag New York, Inc., NJ, USA.  [4] Wysoski Simei Gomes, Benuskova Lubica, Kasabov Nikola K., (2006), «Adaptive learning procedure for a network of spiking neurons and visual pattern recognition. In Advanced Concepts for Intelligent Vision Systems», pages 1133–1142, Berlin/Heidelberg, Springer.  [5] Thorpe Simon J. and Jacques Gautrais, (1998), «Rank order coding», In CNS ’97: Proceedings of the 6th annual conference on Computational neuroscience: trends in research, pages 113–118, New York, NY, USA, 1998, Plenum Pressity.  [6] Stolfo Salvatore J., Fan Wei, Wenke Lee, Prodromidis Andreas, and Philip K. Chan, (2000), «Cost-based Modeling and Evaluation for Data Mining With Application to Fraud and Intrusion Detection: Results from the JAM Project», DARPA Information Survivability Conference and Exposition, DISCEX '00.  [7] Thorpe Simon J., Delorme Arnaud, and Rufin van Rullen, (2001), «Spike-based strategies for rapid processing», Neural Networks, 14(6-7):715–725.  [8] Schliebs S., Defoin-Platel M., Kasabov N, (2009), «Integrated feature and parameter optimization for an evolving spiking neural network», 15 th ICONIP 2008, Auckland, New Zealand. Hybrid Artificial Intelligence System for Cyber Security Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

26 Hybrid Artificial Intelligence System for Cyber Security  Forest Informatics Laboratory  Director of the Lab Professor Lazaros S. Iliadis  Research Areas –Fuzzy Logic –Computational Intelligence –Soft Computing –Machine Learning –Pattern Recognition –Neural Networks –Support Vector Machines –Genetic Algorithms –Adaptive Fuzzy Clustering –Heuristic Models –Intelligent Agents – multiAgent Systems –Expert Systems - Knowledge Systems - Fuzzy Inference Systems –Intelligent Information Systems and Applications in Risk Management Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory

27 | Hybrid Artificial Intelligence System for Cyber Security  Conclusion Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory