Grammar Based Pre-Processing for PPM William J. Teahan1 and Nojood O. Aljehane2, 1University of B... more Grammar Based Pre-Processing for PPM William J. Teahan1 and Nojood O. Aljehane2, 1University of Bangor Bangor, UK and 2University of Tabuk, Saudi Arabia http://aircconline.com/ijcsit/V9N1/9117ijcsit01.pdf Fault Tolerant Leader Election in Distributed Systems Marius Rafailescu, Politehnica University of Bucharest, Romania http://aircconline.com/ijcsit/V9N1/9117ijcsit02.pdf Towards a New Framework Linking Knowledge Management Systems and Organizational Agility : An Empirical Study Mohamed Amine Marhraoui and Abdellah El Manouar, Mohammed V University in Rabat, Morocco http://aircconline.com/ijcsit/V9N1/9117ijcsit03.pdf Fuzzy Logic Based Approach for Automation of Emotion Detection in Misophonia Nilima Salankar1, Neelu Ahuja1, Sandeep Chaurasia2 and Ninni Singh1, 1University of Petroleum and Energy Studies, India and 2Manipal University, India http://aircconline.com/ijcsit/V9N1/9117ijcsit04.pdf Design and Optimization a Circular Shape Network Antenna Micro Strip for Some Application Louati Siwar, Fethi Mejri and Aguili Taoufik, University Tunis El Manar, Tunisia http://aircconline.com/ijcsit/V9N1/9117ijcsit05.pdf
The objective of the study is to design a heuristic supervised learning algorithm, that locates I... more The objective of the study is to design a heuristic supervised learning algorithm, that locates Intrusion and improves performance of network. In this paper we have proposed the algorithm using existing supervised learning approach and evaluated IDS for MANETs. The trained dataset of KDDCUP is loaded and known four attacks are taken for evaluation. We assume that discussed four attacks dominate the network traffic. The algorithm is iterative in nature to produce optimum results. The performance of proposed supervised algorithm is evaluated under different network traffic and mobility patterns for Dos, PRB, R2L and U2R attacks. The results indicate high accuracy for almost all the four attacks. The proposed algorithms, results show high accuracy on discussed four attacks of KDD 99. It also produces low high positive rate.
Grammar Based Pre-Processing for PPM William J. Teahan1 and Nojood O. Aljehane2, 1University of B... more Grammar Based Pre-Processing for PPM William J. Teahan1 and Nojood O. Aljehane2, 1University of Bangor Bangor, UK and 2University of Tabuk, Saudi Arabia http://aircconline.com/ijcsit/V9N1/9117ijcsit01.pdf Fault Tolerant Leader Election in Distributed Systems Marius Rafailescu, Politehnica University of Bucharest, Romania http://aircconline.com/ijcsit/V9N1/9117ijcsit02.pdf Towards a New Framework Linking Knowledge Management Systems and Organizational Agility : An Empirical Study Mohamed Amine Marhraoui and Abdellah El Manouar, Mohammed V University in Rabat, Morocco http://aircconline.com/ijcsit/V9N1/9117ijcsit03.pdf Fuzzy Logic Based Approach for Automation of Emotion Detection in Misophonia Nilima Salankar1, Neelu Ahuja1, Sandeep Chaurasia2 and Ninni Singh1, 1University of Petroleum and Energy Studies, India and 2Manipal University, India http://aircconline.com/ijcsit/V9N1/9117ijcsit04.pdf Design and Optimization a Circular Shape Network Antenna Micro Strip for Some Application Louati Siwar, Fethi Mejri and Aguili Taoufik, University Tunis El Manar, Tunisia http://aircconline.com/ijcsit/V9N1/9117ijcsit05.pdf
The objective of the study is to design a heuristic supervised learning algorithm, that locates I... more The objective of the study is to design a heuristic supervised learning algorithm, that locates Intrusion and improves performance of network. In this paper we have proposed the algorithm using existing supervised learning approach and evaluated IDS for MANETs. The trained dataset of KDDCUP is loaded and known four attacks are taken for evaluation. We assume that discussed four attacks dominate the network traffic. The algorithm is iterative in nature to produce optimum results. The performance of proposed supervised algorithm is evaluated under different network traffic and mobility patterns for Dos, PRB, R2L and U2R attacks. The results indicate high accuracy for almost all the four attacks. The proposed algorithms, results show high accuracy on discussed four attacks of KDD 99. It also produces low high positive rate.
Uploads
Papers by Shanthi Harold
performance of network. In this paper we have proposed the algorithm using existing supervised learning approach and
evaluated IDS for MANETs. The trained dataset of KDDCUP is loaded and known four attacks are taken for evaluation. We
assume that discussed four attacks dominate the network traffic. The algorithm is iterative in nature to produce optimum
results. The performance of proposed supervised algorithm is evaluated under different network traffic and mobility
patterns for Dos, PRB, R2L and U2R attacks. The results indicate high accuracy for almost all the four attacks. The proposed
algorithms, results show high accuracy on discussed four attacks of KDD 99. It also produces low high positive rate.
performance of network. In this paper we have proposed the algorithm using existing supervised learning approach and
evaluated IDS for MANETs. The trained dataset of KDDCUP is loaded and known four attacks are taken for evaluation. We
assume that discussed four attacks dominate the network traffic. The algorithm is iterative in nature to produce optimum
results. The performance of proposed supervised algorithm is evaluated under different network traffic and mobility
patterns for Dos, PRB, R2L and U2R attacks. The results indicate high accuracy for almost all the four attacks. The proposed
algorithms, results show high accuracy on discussed four attacks of KDD 99. It also produces low high positive rate.