4.7 Article

A feature reduced intrusion detection system using ANN classifier

Journal

EXPERT SYSTEMS WITH APPLICATIONS
Volume 88, Issue -, Pages 249-257

Publisher

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.eswa.2017.07.005

Keywords

Intrusion Detection System (IDS); Feature Ranking; Feature Reduction; ANN

Ask authors/readers for more resources

Rapid increase in internet and network technologies has led to considerable increase in number of attacks and intrusions. Detection and prevention of these attacks has become an important part of security. Intrusion detection system is one of the important ways to achieve high security in computer networks and used to thwart different attacks. Intrusion detection systems have curse of dimensionality which tends to increase time complexity and decrease resource utilization. As a result, it is desirable that important features of data must be analyzed by intrusion detection system to reduce dimensionality. This work proposes an intelligent system which first performs feature ranking on the basis of information gain and correlation. Feature reduction is then done by combining ranks obtained from both information gain and correlation using a novel approach to identify useful and useless features. These reduced features are then fed to a feed forward neural network for training and testing on KDD99 dataset. Pre-processing of KDD-99 dataset has been done to normalize number of instances of each class before training. The system then behaves intelligently to classify test data into attack and non-attack classes. The aim of the feature reduced system is to achieve same degree of performance as a normal system. The system is tested on five different test datasets and both individual and average results of all datasets are reported. Comparison of proposed method with and without feature reduction is done in terms of various performance metrics. Comparisons with recent and relevant approaches are also tabled. Results obtained for proposed method are really encouraging. (C) 2017 Elsevier Ltd. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

A CNN-based scheme for COVID-19 detection with emergency services provisions using an optimal path planning

Ahmed Barnawi, Prateek Chhikara, Rajkumar Tekchandani, Neeraj Kumar, Mehrez Boulares

Summary: This paper presents the applications of unmanned air vehicles (UAVs) in the medical field, particularly in tackling the COVID-19 outbreak by delivering medication and emergency kits to hospitals. It also proposes a deep convolution neural architecture for detecting COVID-19 cases and compares its performance with state-of-the-art models.

MULTIMEDIA SYSTEMS (2023)

Article Computer Science, Information Systems

Security enhancement in cellular networks employing D2D friendly jammer for V2V communication

J. Senthil Kumar, Akhil Gupta, Sudeep Tanwar, Neeraj Kumar, Sedat Akleylek

Summary: This paper thoroughly investigates the security aspects in vehicle-to-vehicle communication with the backbone cellular network, using a device-to-device communication link that shares spectral resources. The study derives the ergodic secrecy capacity and ergodic capacity for the wiretap channel and D2D link, and emphasizes the importance of optimizing power allocation and security through D2D communications for V2V applications.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)

Article Computer Science, Software Engineering

Postal Automation System in Gurmukhi Script using Deep Learning

Sandhya Sharma, Sheifali Gupta, Neeraj Kumar, Tanvi Arora

Summary: The postal automation system is a major research area in the era of automation. Developing a postal automation system for India is challenging due to its multi-script and multi-lingual behavior. This study focuses on the postal automation of district names in Punjab, India, written in the Gurmukhi script. A segmentation-free technique using Convolutional Neural Network (CNN) and Deep learning (DL) is utilized for recognition. A database of 22000 handwritten images in Gurmukhi script for all 22 districts of Punjab is prepared, and two CNN models achieve validation accuracies of 90% and 98% respectively.

INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS (2023)

Review Computer Science, Theory & Methods

EEG Based Emotion Recognition: A Tutorial and Review

Xiang Li, Yazhou Zhang, Prayag Tiwari, Dawei Song, Bin Hu, Meihong Yang, Zhigang Zhao, Neeraj Kumar, Pekka Marttinen

Summary: Emotion recognition technology using EEG signals is crucial in Artificial Intelligence, with applications in emotional health care, human-computer interaction, and multimedia content recommendation. This paper reviews recent representative works in EEG-based emotion recognition research from the perspective of researchers taking the first step in this field. It introduces the scientific basis of EEG-based emotion recognition and categorizes reviewed works into different technical routes, providing readers with a better understanding of the motivation behind these studies. The paper also discusses existing challenges and future research directions.

ACM COMPUTING SURVEYS (2023)

Article Computer Science, Hardware & Architecture

Blockchain and artificial intelligence-empowered smart agriculture framework for maximizing human life expectancy

Nilesh Kumar Jadav, Tejal Rathod, Rajesh Gupta, Sudeep Tanwar, Neeraj Kumar, Ahmed Alkhayyat

Summary: →Massive population growth and rising environmental issues pose challenges in agriculture, such as land scarcity, pesticide overuse, and global food demand. To tackle this, we proposed a blockchain and AI-powered smart agriculture framework to predict pesticide levels in crops. The blockchain ensures data integrity, storing records securely. Evaluation metrics show that our framework outperforms baseline approaches in accuracy, scalability, and latency.

COMPUTERS & ELECTRICAL ENGINEERING (2023)

Review Computer Science, Theory & Methods

Fusion of blockchain and IoT in scientific publishing: Taxonomy, tools, and future directions

Sudeep Tanwar, Dakshita Ribadiya, Pronaya Bhattacharya, Anuja R. Nair, Neeraj Kumar, Minho Jo

Summary: Scientific publishing systems (SPS) provide a platform for authors, reviewers, and editors to share their research, leading to the advancement of the academic community. However, traditional SPS face challenges in managing large databases, complex queries and retrievals, lengthy publishing processes, and lack of rewarding methods for peer review and storage of unsuccessful articles. In this paper, a fusion of blockchain and IoT technologies is proposed to address these limitations and provide a secure, transparent, and efficient publishing platform.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Computer Science, Artificial Intelligence

GenSMILES: An enhanced validity conscious representation for inverse design of molecules

Arun Singh Bhadwal, Kamal Kumar, Neeraj Kumar

Summary: This paper proposes a new representation called GenSMILES to overcome the limitations of SMILES representation and improve the validity and diversity of generated molecules. GenSMILES relies on derivative rules to address syntactical and semantic issues, and it allows for more efficient generation of valid molecules.

KNOWLEDGE-BASED SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

Physiotherapy-based human activity recognition using deep learning

Disha Deotale, Madhushi Verma, P. Suresh, Neeraj Kumar

Summary: This study focuses on physiotherapy video dataset and proposes a deep learning-based neural network framework to address the issues in continuous human activity recognition.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Computer Science, Artificial Intelligence

A systematic analysis of deep learning methods and potential attacks in internet-of-things surfaces

Ahmed Barnawi, Shivani Gaba, Anna Alphy, Abdoh Jabbari, Ishan Budhiraja, Vimal Kumar, Neeraj Kumar

Summary: This paper aims to enhance the security of IoT systems by exploring deep learning algorithms. It identifies and evaluates potential security threats and attack surfaces for IoT, and provides a systematic survey of deep learning methods for IoT security. This research opens the door for future studies by highlighting the advantages, disadvantages, and opportunities in this field.

NEURAL COMPUTING & APPLICATIONS (2023)

Review Computer Science, Information Systems

Swarm of UAVs for Network Management in 6G: A Technical Review

Muhammad Asghar Khan, Neeraj Kumar, Syed Agha Hassnain Mohsan, Wali Ullah Khan, Moustafa M. Nasralla, Mohammed H. Alsharif, Justyna Zywiolek, Insaf Ullah

Summary: Fifth-generation (5G) cellular networks have led to beyond 5G (B5G) networks that can incorporate autonomous services into swarms of unmanned aerial vehicles (UAVs). These networks provide capacity expansion strategies to address massive connectivity issues and ensure high throughput and low latency in extreme or emergency situations. On the other hand, 6G technology integrates AI/ML, IoT, and blockchain to establish reliable, intelligent, secure, and ubiquitous UAV networks, but also poses new challenges for swarm UAVs due to new enabling technologies and unique network design.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2023)

Article Computer Science, Information Systems

Dynamic SFC Embedding Algorithm Assisted by Federated Learning in Space-Air-Ground-Integrated Network Resource Allocation Scenario

Peiying Zhang, Yi Zhang, Neeraj Kumar, Mohsen Guizani

Summary: This study proposes a service provision method based on service function chaining (SFC) to address the resource allocation challenge in the space-air-ground-integrated network (SAGIN). By using network function virtualization (NFV) and a federated learning (FL)-based algorithm, efficient resource allocation and reduced service blocking rate can be achieved.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Deep AI-Powered Cyber Threat Analysis in IIoT

Iram Bibi, Adnan Akhunzada, Neeraj Kumar

Summary: Distributed Industrial Internet of Things (IIoT) has revolutionized the industrial sector, but threat hunting and intelligence in distributed IIoT is complex due to lack of standard architectures. The authors propose a self-learning multivector threat intelligence and detection mechanism to defend IIoT systems. They introduce a novel ConvLSTM2D mechanism that can efficiently tackle dynamic variants of emerging IIoT threats. The proposed mechanism outperforms benchmark algorithms in detection accuracy with minimal tradeoff in speed efficiency.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Engineering, Electrical & Electronic

Intelligent and Robust UAV-Aided Multiuser RIS Communication Technique With Jittering UAV and Imperfect Hardware Constraints

Abuzar B. M. Adam, Xiaoyu Wan, Mohammed A. M. Elhassan, Mohammed Saleh Ali Muthanna, Ammar Muthanna, Neeraj Kumar, Mohsen Guizani

Summary: In this paper, the authors investigate UAV-aided RIS communication for next generation communication networks, focusing on optimizing active beamforming, passive beamforming, and UAV trajectory to minimize power consumption. They propose a hybrid semi-unfolding deep neural network (HSUDNN) to handle the constraints during channel state information gain, and apply inception-like multi-kernel convolutional long short-term memory (IL-MK-CLSTM) sub networks to handle UAV trajectory and passive beamforming. The proposed HSUDNN achieves superior performance compared to existing techniques.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

Secrecy Rate Maximization in THz-Aided Heterogeneous Networks: A Deep Reinforcement Learning Approach

Himanshu Sharma, Neeraj Kumar, Ishan Budhiraja, Ahmed Barnawi

Summary: This article proposes a scheme to optimize the secrecy rate of terahertz-enabled femtocells. By utilizing deep reinforcement learning techniques, the optimization problem is successfully addressed, and two schemes are presented to maximize the secrecy rate of the femtocells. Simulation results demonstrate significant improvements in secrecy rate, SINR, and energy-efficiency for the proposed schemes.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

A Deep Reinforcement Learning Scheme for Sum Rate and Fairness Maximization Among D2D Pairs Underlaying Cellular Network With NOMA

Vineet Vishnoi, Ishan Budhiraja, Suneet Gupta, Neeraj Kumar

Summary: Device-to-device (D2D) communication is an emerging technology in 5G and upcoming 6G networks that enhances the overall transmission rate. However, interference and connectivity issues pose challenges. To mitigate these issues, researchers integrated power domain non-orthogonal multiple access techniques (PD-NOMA) on base stations (BS). By reducing interference and optimizing power allocation, the proposed solution improves sum rate and fairness among users.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Review Computer Science, Artificial Intelligence

A comprehensive review of slope stability analysis based on artificial intelligence methods

Wei Gao, Shuangshuang Ge

Summary: This study provides a comprehensive review of slope stability research based on artificial intelligence methods, focusing on slope stability computation and evaluation. The review covers studies using quasi-physical intelligence methods, simulated evolutionary methods, swarm intelligence methods, hybrid intelligence methods, artificial neural network methods, vector machine methods, and other intelligence methods. The merits, demerits, and state-of-the-art research advancement of these studies are analyzed, and possible research directions for slope stability investigation based on artificial intelligence methods are suggested.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Machine learning approaches for lateral strength estimation in squat shear walls: A comparative study and practical implications

Khuong Le Nguyen, Hoa Thi Trinh, Saeed Banihashemi, Thong M. Pham

Summary: This study investigated the influence of input parameters on the shear strength of RC squat walls and found that ensemble learning models, particularly XGBoost, can effectively predict the shear strength. The axial load had a greater influence than reinforcement ratio, and longitudinal reinforcement had a more significant impact compared to horizontal and vertical reinforcement. The performance of XGBoost model outperforms traditional design models and reducing input features still yields reliable predictions.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

DHESN: A deep hierarchical echo state network approach for algal bloom prediction

Bo Hu, Huiyan Zhang, Xiaoyi Wang, Li Wang, Jiping Xu, Qian Sun, Zhiyao Zhao, Lei Zhang

Summary: A deep hierarchical echo state network (DHESN) is proposed to address the limitations of shallow coupled structures. By using transfer entropy, candidate variables with strong causal relationships are selected and a hierarchical reservoir structure is established to improve prediction accuracy. Simulation results demonstrate that DHESN performs well in predicting algal bloom.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Learning high-dependence Bayesian network classifier with robust topology

Limin Wang, Lingling Li, Qilong Li, Kuo Li

Summary: This paper discusses the urgency of learning complex multivariate probability distributions due to the increase in data variability and quantity. It introduces a highly scalable classifier called TAN, which utilizes maximum weighted spanning tree (MWST) for graphical modeling. The paper theoretically proves the feasibility of extending one-dependence MWST to model high-dependence relationships and proposes a heuristic search strategy to improve the fitness of the extended topology to data. Experimental results demonstrate that this algorithm achieves a good bias-variance tradeoff and competitive classification performance compared to other high-dependence or ensemble learning algorithms.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Make a song curative: A spatio-temporal therapeutic music transfer model for anxiety reduction

Zhejing Hu, Gong Chen, Yan Liu, Xiao Ma, Nianhong Guan, Xiaoying Wang

Summary: Anxiety is a prevalent issue and music therapy has been found effective in reducing anxiety. To meet the diverse needs of individuals, a novel model called the spatio-temporal therapeutic music transfer model (StTMTM) is proposed.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

A modified reverse-based analysis logic mining model with Weighted Random 2 Satisfiability logic in Discrete Hopfield Neural Network and multi-objective training of Modified Niched Genetic Algorithm

Nur Ezlin Zamri, Mohd. Asyraf Mansor, Mohd Shareduwan Mohd Kasihmuddin, Siti Syatirah Sidik, Alyaa Alway, Nurul Atiqah Romli, Yueling Guo, Siti Zulaikha Mohd Jamaludin

Summary: In this study, a hybrid logic mining model was proposed by combining the logic mining approach with the Modified Niche Genetic Algorithm. This model improves the generalizability and storage capacity of the retrieved induced logic. Various modifications were made to address other issues. Experimental results demonstrate that the proposed model outperforms baseline methods in terms of accuracy, precision, specificity, and correlation coefficient.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

On taking advantage of opportunistic meta-knowledge to reduce configuration spaces for automated machine learning

David Jacob Kedziora, Tien-Dung Nguyen, Katarzyna Musial, Bogdan Gabrys

Summary: The paper addresses the problem of efficiently optimizing machine learning solutions by reducing the configuration space of ML pipelines and leveraging historical performance. The experiments conducted show that opportunistic/systematic meta-knowledge can improve ML outcomes, and configuration-space culling is optimal when balanced. The utility and impact of meta-knowledge depend on various factors and are crucial for generating informative meta-knowledge bases.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Optimal location for an EVPL and capacitors in grid for voltage profile and power loss: FHO-SNN approach

G. Sophia Jasmine, Rajasekaran Stanislaus, N. Manoj Kumar, Thangamuthu Logeswaran

Summary: In the context of a rapidly expanding electric vehicle market, this research investigates the ideal locations for EV charging stations and capacitors in power grids to enhance voltage stability and reduce power losses. A hybrid approach combining the Fire Hawk Optimizer and Spiking Neural Network is proposed, which shows promising results in improving system performance. The optimization approach has the potential to enhance the stability and efficiency of electric grids.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

NLP-based approach for automated safety requirements information retrieval from project documents

Zhijiang Wu, Guofeng Ma

Summary: This study proposes a natural language processing-based framework for requirement retrieval and document association, which can help to mine and retrieve documents related to project managers' requirements. The framework analyzes the ontology relevance and emotional preference of requirements. The results show that the framework performs well in terms of iterations and threshold, and there is a significant matching between the retrieved documents and the requirements, which has significant managerial implications for construction safety management.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Dog nose-print recognition based on the shape and spatial features of scales

Yung-Kuan Chan, Chuen-Horng Lin, Yuan-Rong Ben, Ching-Lin Wang, Shu-Chun Yang, Meng-Hsiun Tsai, Shyr-Shen Yu

Summary: This study proposes a novel method for dog identification using nose-print recognition, which can be applied to controlling stray dogs, locating lost pets, and pet insurance verification. The method achieves high recognition accuracy through two-stage segmentation and feature extraction using a genetic algorithm.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Fostering supply chain resilience for omni-channel retailers: A two-phase approach for supplier selection and demand allocation under disruption risks

Shaohua Song, Elena Tappia, Guang Song, Xianliang Shi, T. C. E. Cheng

Summary: This study aims to optimize supplier selection and demand allocation decisions for omni-channel retailers in order to achieve supply chain resilience. It proposes a two-phase approach that takes into account various factors such as supplier evaluation and demand allocation.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Accelerating Benders decomposition approach for shared parking spaces allocation considering parking unpunctuality and no-shows

Jinyan Hu, Yanping Jiang

Summary: This paper examines the allocation problem of shared parking spaces considering parking unpunctuality and no-shows. It proposes an effective approach using sample average approximation (SAA) combined with an accelerating Benders decomposition (ABD) algorithm to solve the problem. The numerical experiments demonstrate the significance of supply-demand balance for the operation and user satisfaction of the shared parking system.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Review Computer Science, Artificial Intelligence

Financial fraud detection using graph neural networks: A systematic review

Soroor Motie, Bijan Raahemi

Summary: Financial fraud is a persistent problem in the finance industry, but Graph Neural Networks (GNNs) have emerged as a powerful tool for detecting fraudulent activities. This systematic review provides a comprehensive overview of the current state-of-the-art technologies in using GNNs for financial fraud detection, identifies gaps and limitations in existing research, and suggests potential directions for future research.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Review Computer Science, Artificial Intelligence

Occluded person re-identification with deep learning: A survey and perspectives

Enhao Ning, Changshuo Wang, Huang Zhang, Xin Ning, Prayag Tiwari

Summary: This review provides a detailed overview of occluded person re-identification methods and conducts a systematic analysis and comparison of existing deep learning-based approaches. It offers important theoretical and practical references for future research in the field.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

A hierarchical attention detector for bearing surface defect detection

Jiajun Ma, Songyu Hu, Jianzhong Fu, Gui Chen

Summary: The article presents a novel visual hierarchical attention detector for multi-scale defect location and classification, utilizing texture, semantic, and instance features of defects through a hierarchical attention mechanism, achieving multi-scale defect detection in bearing images with complex backgrounds.

EXPERT SYSTEMS WITH APPLICATIONS (2024)