Engineering Applications of Artificial Intelligence,

Slides:



Advertisements
Similar presentations
4 Intelligent Systems.
Advertisements

Institute of Intelligent Power Electronics – IPE Page1 Introduction to Basics of Genetic Algorithms Docent Xiao-Zhi Gao Department of Electrical Engineering.
Spie98-1 Evolutionary Algorithms, Simulated Annealing, and Tabu Search: A Comparative Study H. Youssef, S. M. Sait, H. Adiche
Applying Genetic Algorithms to Decision Making in Autonomic Computing Systems Authors: Andres J. Ramirez, David B. Knoester, Betty H.C. Cheng, Philip K.
Dynamic Face Recognition Committee Machine Presented by Sunny Tang.
Data classification based on tolerant rough set reporter: yanan yean.
Learning Classifier Systems to Intrusion Detection Monu Bambroo 12/01/03.
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications Department of Computer Science and Information Engineering National.
Genetic Algorithms Learning Machines for knowledge discovery.
Artificial Intelligence Genetic Algorithms and Applications of Genetic Algorithms in Compilers Prasad A. Kulkarni.
Neural Optimization of Evolutionary Algorithm Strategy Parameters Hiral Patel.
Path Planning of Robot in Three- dimensional Grid Environment based on Genetic Algorithms Hua Zhang, Manlu Liu, Ran Liu, Tianlian Hu Intelligent Control.
On the Application of Artificial Intelligence Techniques to the Quality Improvement of Industrial Processes P. Georgilakis N. Hatziargyriou Schneider ElectricNational.
Attention Deficit Hyperactivity Disorder (ADHD) Student Classification Using Genetic Algorithm and Artificial Neural Network S. Yenaeng 1, S. Saelee 2.
Chirag N. Modi and Prof. Dhiren R. Patel NIT Surat, India Ph. D Colloquium, CSI-2011 Signature Apriori based Network.
Revision Michael J. Watts
CHAPTER 12 ADVANCED INTELLIGENT SYSTEMS © 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Discovering Outlier Filtering Rules from Unlabeled Data Author: Kenji Yamanishi & Jun-ichi Takeuchi Advisor: Dr. Hsu Graduate: Chia- Hsien Wu.
Dr M F Abbod Using Intelligent Optimisation Methods to Improve the Group Method of Data Handling in Time Series Prediction Maysam Abbod and Karishma Dashpande.
Genetic Programming on Program Traces as an Inference Engine for Probabilistic Languages Vita Batishcheva, Alexey Potapov
A Genetic Algorithm-Based Approach for Building Accurate Decision Trees by Z. Fu, Fannie Mae Bruce Golden, University of Maryland S. Lele, University of.
Comparing the Parallel Automatic Composition of Inductive Applications with Stacking Methods Hidenao Abe & Takahira Yamaguchi Shizuoka University, JAPAN.
Network Intrusion Detection Using Random Forests Jiong Zhang Mohammad Zulkernine School of Computing Queen's University Kingston, Ontario, Canada.
Slides are based on Negnevitsky, Pearson Education, Lecture 12 Hybrid intelligent systems: Evolutionary neural networks and fuzzy evolutionary systems.
Cristian Urs and Ben Riveira. Introduction The article we chose focuses on improving the performance of Genetic Algorithms by: Use of predictive models.
TECHNOLOGY GUIDE FOUR Intelligent Systems.
Hierarchical Distributed Genetic Algorithm for Image Segmentation Hanchuan Peng, Fuhui Long*, Zheru Chi, and Wanshi Siu {fhlong, phc,
GA-Based Feature Selection and Parameter Optimization for Support Vector Machine Cheng-Lung Huang, Chieh-Jen Wang Expert Systems with Applications, Volume.
1 Integration of Neural Network and Fuzzy system for Stock Price Prediction Student : Dah-Sheng Lee Professor: Hahn-Ming Lee Date:5 December 2003.
RECENT DEVELOPMENTS OF INDUCTION MOTOR DRIVES FAULT DIAGNOSIS USING AI TECHNIQUES 1 Oly Paz.
An Overview of Intrusion Detection Using Soft Computing Archana Sapkota Palden Lama CS591 Fall 2009.
The Generational Control Model This is the control model that is traditionally used by GP systems. There are a distinct number of generations performed.
Applying Genetic Algorithm to the Knapsack Problem Qi Su ECE 539 Spring 2001 Course Project.
Genetic Algorithms K.Ganesh Reasearch Scholar, Ph.D., Industrial Management Division, Humanities and Social Sciences Department, Indian Institute of Technology.
Intelligent vs Classical Control Bax Smith EN9940.
ICNSC 2007Slide 1 A Novel Soft Computing Model Using Adaptive Neuro-Fuzzy Inference System for Intrusion Detection Authors: A. Nadjaran Toosi;
1 Optimization of Regular Expression Pattern Matching Circuits on FPGA Department of Computer Science and Information Engineering National Cheng Kung University,
© 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang 12-1 Chapter 12 Advanced Intelligent Systems.
Institute of Intelligent Power Electronics – IPE Page1 A Dynamical Fuzzy System with Linguistic Information Feedback Xiao-Zhi Gao and Seppo J. Ovaska Institute.
Intelligent Database Systems Lab N.Y.U.S.T. I. M. Externally growing self-organizing maps and its application to database visualization and exploration.
Chapter 9 Genetic Algorithms.  Based upon biological evolution  Generate successor hypothesis based upon repeated mutations  Acts as a randomized parallel.
WEEK INTRODUCTION IT440 ARTIFICIAL INTELLIGENCE.
Project 2: Classification Using Genetic Programming Kim, MinHyeok Biointelligence laboratory Artificial.
An Automated Signature-Based Approach against Polymorphic Internet Worms Yong Tang; Shigang Chen; IEEE Transactions on Parallel and Distributed Systems,
Learning Classifier Systems (Introduction) Muhammad Iqbal Evolutionary Computation Research Group School of Engineering and Computer Science Victoria University.
Improving Support Vector Machine through Parameter Optimized Rujiang Bai, Junhua Liao Shandong University of Technology Library Zibo , China { brj,
Application of the GA-PSO with the Fuzzy controller to the robot soccer Department of Electrical Engineering, Southern Taiwan University, Tainan, R.O.C.

Multi-objective evolutionary generation of mamdani fuzzy rule-based systems based on rule and condition selection International Workshop On Genetic And.
Agenda  INTRODUCTION  GENETIC ALGORITHMS  GENETIC ALGORITHMS FOR EXPLORING QUERY SPACE  SYSTEM ARCHITECTURE  THE EFFECT OF DIFFERENT MUTATION RATES.
IEEE AI - BASED POWER SYSTEM TRANSIENT SECURITY ASSESSMENT Dr. Hossam Talaat Dept. of Electrical Power & Machines Faculty of Engineering - Ain Shams.
Il-Ahn Cheong Linux Security Research Center Chonnam National University, Korea.
Surface Defect Inspection: an Artificial Immune Approach Dr. Hong Zheng and Dr. Saeid Nahavandi School of Engineering and Technology.
TECHNOLOGY GUIDE FOUR Intelligent Systems. TECHNOLOGY GUIDE OUTLINE TG4.1 Introduction to Intelligent Systems TG4.2 Expert Systems TG4.3 Neural Networks.
An Evolutionary Algorithm for Neural Network Learning using Direct Encoding Paul Batchis Department of Computer Science Rutgers University.
Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory Konstantinos Demertzis.
Facial Smile Detection Based on Deep Learning Features Authors: Kaihao Zhang, Yongzhen Huang, Hong Wu and Liang Wang Center for Research on Intelligent.
EDDIE for Investment Opportunities Forecasting Michael Kampouridis mkampo [at] essex [dot] ac [dot] uk.
 Negnevitsky, Pearson Education, Lecture 12 Hybrid intelligent systems: Evolutionary neural networks and fuzzy evolutionary systems n Introduction.
Author :Shigeomi HARA Hiroshi DOUZONO Yoshio NOGUCHI
<Article Title> <Name of the authors>
TECHNOLOGY GUIDE FOUR Intelligent Systems.
Source: Procedia Computer Science(2015)70:
Network Intrusion Detection Using GA
Chapter 12 Advanced Intelligent Systems
Machine Learning Techniques for the Evaluating of External Skeletal Fixation Structure Dr.Khaled Rasheed Dr. Walter D. Potter Dr. Dennis N. Aron Ning Suo.
Open-Category Classification by Adversarial Sample Generation
<Article Title> <Name of the authors>
Source: Pattern Recognition Letters 29 (2008)
Presentation transcript:

A parallel genetic local search algorithm for intrusion detection in computer networks Engineering Applications of Artificial Intelligence, Vol. 20, Page 1058-1069, Dec. 2007 Authors:Mohammad Saniee Abadeh, Jafar Habibi, Zeynab Barzegar and Muna Sergi Present:Jheng-Hen Jiang 2010/7/22

Outline Introduction Related Work Proposed Scheme Experimental Result Conclusions 2010/7/22

Introduction Finding high-quality fuzzy if-then rules to predict the class of input patterns correctly. Generating low false alarms. 2010/7/22

Related Work Genetic algorithm. Pittsburgh approach. Michigan approach. 2010/7/22

Proposed Scheme(1/7) 2010/7/22

Proposed Scheme(2/7) Initialization Selection Local Search Crossover Fuzzy Rule Set Pool Replacement Mutation Reinitialization Internal Termination Test External Termination Test 2010/7/22 6

Proposed Scheme(3/7) Initialization 2010/7/22

Proposed Scheme(4/7) Selection 2010/7/22

Crossover and Mutation Proposed Scheme(5/7) Crossover and Mutation Crossover One-point crossover. Mutation Mrepeat = 50 2010/7/22

Proposed Scheme(6/7) Local search Fitness(Rj) > Threshold It’s a fuzzy rule Change attribute’s value Reject 2010/7/22

Proposed Scheme(7/7) Replace and Reinitialization Prep = Replacement percentage of the classifier system. Fitness(Rj) > Threshold Change attribute’s value 2010/7/22

Experimental Result(1/4) 2010/7/22

Experimental Result(2/4) 2010/7/22

Experimental Result(3/4) 2010/7/22

Experimental Result(4/4) 2010/7/22

Conclusions It can increasing the detection rate and decreasing the false alarm rate. Training time is decreased by using the suggested parallel learning framework. Every sub dataset’s class are all the same. 2010/7/22