SlideShare a Scribd company logo
1 of 5
Download to read offline
Ms. Gargi Joshi Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.88-92

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Anomaly Extraction Using Association Rule Mining
Ms. Gargi Joshi*
* (Department of Computer Engineering, Dr. D.Y Patil College of Engineering, Ambi, Pune)

Abstract
Today network security, uptime and performance of network are important and serious issue in computer
network. Anomaly is deviation from normal behavior which is factor that affects on network security. So
Anomaly Extraction which detects and extracts anomalous flow from network is requirement of network
operator. Anomaly extraction refers to automatically finding in a large set of flows observed during an
anomalous time interval, the flows associated with the anomalous event(s). It is important for root cause
analysis, network forensics, and attack mitigation and anomaly modeling. We use meta data provided by several
histogram based detectors to identify suspicious flows, and then apply association rule mining to find and
summarize anomalous flows. Using Histogram based detector to identify anomalies and then applying
Association rule mining, anomalies will be extracted. Apriori and FP Growth algorithm will be used to generate
the set of rule applied on metadata. Using traffic data from a network this technique effectively finds the flow
associated with the anomalous event(s). it triggers a very small number of false positives, which exhibit specific
patterns and can be sorted out by an administrator this anomaly extraction method significantly reduces the
work hours needed for analyzing alarms, making anomaly detection systems more practical.
Keywords – Anomaly Extraction, Association Rules, computer network, data mining, Apriori Algorithm,FP
Growth Algorithm.
false positives or simplifying training and calibration,
remain to be solved.
I.
INTRODUCTION
An anomaly detection system may provide
II.
PROBLEM DEFINITION
meta-data relevant to an alarm that help to narrow
Aim of this system is to identify an anomaly
down the set of candidate anomalous flows. For
from the network traffic during a time interval and
example, anomaly detection systems analyzing
find the flows associated with the event(s) that
histograms may indicate the histogram bins that an
triggered an observed anomaly.
anomaly affected, e.g., a range of IP addresses or port
numbers. Such meta-data can be used to restrict the
2.1 EXISTING SYSTEM
candidate anomalous flows to these that have IP
Identifying network anomalies is critical for
addresses or port numbers within the affected range.
the timely mitigation of events, like attacks or failures
To extract anomalous flows, one could build a model
that can affect the security and performance of
describing normal flow characteristics and use the
network. Traditional approaches to anomaly detection
model to identify deviating flows. However, building
use attack signatures built in an Intrusion Detection
such a microscopic model is very challenging due to
System (IDS) that can identify attacks with known
the wide variability of flow characteristics. Similarly,
patterns. Significant research efforts have focused on
one could compare flows during an interval with flows
building IDS’s and, therefore, related production
from normal or past intervals and search for changes,
systems are presently employed in many networks.
like new flows that were not previously observed or
Although signature-based detection finds most known
flows with significant increase/decrease in their
attacks, it fails to identify new attacks and other
volume. Such approaches essentially perform anomaly
problems that have not appeared before and do not
detection at the level of individual flows and could be
have known signatures.
used to identify anomalous flows.
A number of studies have focused on
Anomaly detection techniques are the last
developing volume-based anomaly detection schemes
line of defense when other approaches fail to detect
[2]–[7]. For example, Barford et al. [2] used wavelets
security threats or other problems. They have been
to distinguish between predictable and anomalous
extensively studied since they pose a number of
traffic volume changes. More recently, Zhang et al. [6]
interesting research problems, involving statistics,
introduced a general framework that aims to identify
modeling, and efficient data structures. Nevertheless,
anomalies from network-wide link load traffic data.
they have not yet gained widespread adaptation, as a
These studies are successful in identifying anomalies
number of challenges, like reducing the number of
that result in (network-wide) traffic volume
www.ijera.com

88 | P a g e
Ms. Gargi Joshi Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.88-92
deviations. However, they are not so effective in
detecting stealth attacks, such as low-rate port
scanning, that do not result in notable traffic volume
changes.
The anomaly detection scheme by Guet al.
[10] uses a single composite feature distribution to
characterize traffic and computes a parametric model
of the distribution using training data. Observed
network traffic is, then, compared to the constructed
model to identify anomalies. The authors assume that
the training data-set does not contain any anomalies.
The proposed anomaly detection scheme uses
Principal Component Analysis (PCA) to identify an
orthogonal basis along which the measurement data
exhibit the highest variance. The principal components
with high variance model the normal behavior of a
network, whereas the remaining components of small
variance are used to identify and classify anomalies.
The proposed scheme aims at finding anomalies in
large backbone networks and, consequently,
aggregates traffic into origin-destination (OD) flows
between network ingress and egress points. But it is
hard to select the right number of principal
components to achieve: 1) a low false-positive rate
and 2) a subspace of PCA components
that
is
anomaly-free.
2.2 PROPOSED SYSTEM
Our system contains three different phases.
One is histogram detector that will observe the
network traffic and alert the system upon anomaly
detection. Second phase consists of histogram cloning
which assures the anomaly detection and finds the
suspicious flows from network traffic. Finally third
phase is to apply association rule mining algorithm i.e.
FP Growth to find the frequent item sets.
Process Summary:
1] Form network between computers or laptops.
2] Histogram detector will observe network for certain
interval.
3] On anomaly detection form clones of histogram and
find suspicious flows in
network.
4] Apply FP Growth algorithm to this suspicious
flows.
5] Find frequent item sets from the set of suspicious
flows.
We build a histogram-based detector for our
evaluation that uses the Kullback–Leibler (KL)
distance to detect anomalies. Each histogram detector
monitors a flow feature distribution, like the
distribution of source ports or destination IP
addresses. We assume n histogram-based detectors
that correspond to n different traffic features and have
each m histogram bins.
As an alternative to arbitrary binning, we introduce
histogram cloning. With histogram cloning, different
www.ijera.com

www.ijera.com

clones provide alternative ways to group feature
values into a desired number of bins/groups creating
effectively additional views along which an anomaly
may be visible. The cloning mechanism is coupled
with a simple voting scheme that controls the
sensitivity of the detector and eventually affects a
tradeoff between false positives and negatives.
Assume a time interval with an anomaly. Pre
filtering selects all flows that match the union of the
meta-data Vj provided by n detectors, i.e., all flows
that match where are filtered. Pre filtering usually
removes a large part of the normal traffic. This is
desirable for two reasons. First, it generates a
substantially smaller dataset that results in faster
processing in the following steps. Second, it improves
the accuracy of association rule mining by removing
flows that could result in false-positive item-sets.
Here, we apply the first step of association
rule mining, i.e., we find frequent item-sets to extract
anomalous flows from a large set of flows observed
during a time interval. The standard algorithm for
discovering frequent item-sets is the Apriori
algorithm.

III.

OBJECTIVE

Identifying an anomaly from the network traffic
during a time interval and find the flows associated
with the event(s) that triggered an observed anomaly.

FIG.1 ANOMALY EXTRACTION PATH
In this project, we are observing the network
traffic for time interval t and identifying the anomaly
using histogram detector. Upon detection of anomaly,
we build the clones of histogram detector and find
suspicious flows that causes anomaly in the network.
We then filter this data to eliminate large fraction of
normal flows. A summary report of frequent item-sets
in the set of suspicious flows is generated by applying
association rule mining.

IV.

LITERATURE SURVEY

F, Silveira and Diot [1] introduced a tool
called URCA that searches for anomalous flows by
iteratively eliminating subsets of normal flows. URCA
also classifies the type of a detected anomaly.
Nevertheless, it requires to repeatedly evaluating an
anomaly detector on different flow subsets, which can
be costly. Compared to this work, we simply
computing frequent item-sets on pre filtered flows is
sufficient to identify anomalous flows.
89 | P a g e
Ms. Gargi Joshi Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.88-92
Do Witcher [2] is a scalable system for worm
detection and containment in backbone networks. Part
of the system automatically constructs a flow-filter
mask from the intersection of suspicious attributes
(meta-data) provided by different detectors leverage
suspicious attributes from an anomaly detector and
study the anomaly extraction problem in more depth.
We highlight that using the intersection can miss
anomalous flows and find that the union of the metadata combined with association rule mining gives
better results.
Dewaele et al. [3] use sketches to create
multiple random projections of a traffic trace, then
model the marginal’s of the sub traces using
Gamma laws and identify deviations in the
parameters of the models as anomalies. In addition,
their method finds possible anomalous source or
destination IP addresses by taking the intersection of
the addresses hashing into anomalous sub traces.
Compared to this work, we introduce and validate
techniques to address the more challenging problem of
finding anomalous flows rather than IP addresses.
Lakhina et al. [4] use SNMP data to detect
network-wide volume anomalies and to pinpoint the
origin-destination (OD) flow along which an anomaly
existed. In contrast, our approach takes as input a large
number of flow records, e.g., standard 5-tuple flows,
and extracts anomalous flows. An OD flow may
include millions of both normal and anomalous 5tuple flows and, therefore, can form the input to our
methodology.
Li et al. [5], use sketches to randomly aggregate flows
as an alternative to OD aggregation. The authors show
that random aggregation can detect more anomalies
than OD aggregation in the PCA subspace anomaly
detection method. In addition, the authors discuss how
their method can be used for anomaly extraction.
However, the work and evaluation focus primarily on
anomaly detection.
Lee and Stolfo [6] show how association
rules can be used to extract interesting intrusion
patterns from system calls and tcp dump logs.
Vaarandi [7] introduces a tool called LogHound that
provides an optimized implementation of Apriori and
demonstrates how LogHound can be used to
summarize traffic flow records.
Yoshida et al. [8] also use frequent item-set mining to
identify interesting events in traces from the MAWI
traffic archive.
Li and Deng [9] outline a variant of the Eclat
frequent item-set mining algorithm] that operates in a
sliding window fashion and evaluate it using traffic
flow traces from a Chinese university.
Chandola and Kumar [10] describe heuristics for
finding a minimal set of frequent item-sets that
summarizes a large set of flows.

www.ijera.com

www.ijera.com

Mahoney and Chan [11] use association rule
mining to find rare events that are suspected to
represent anomalies in packet payload data. They
evaluate their method on the 1999 DARPA/Lincoln
Laboratory traces. Their approach targets edge
networks where mining rare events is possible. In
massive backbone data, however, this approach is less
promising. Another application of rule mining in edge
networks is eXpose, which learns fine-grained
communication rules by exploiting the temporal
correlation between flows within very short time
windows.
Compared to these studies, association rule
mining can be combined with anomaly detection to
effectively extract anomalous flows. Hierarchical
heavy-hitter detection methods [10], [7] group traffic
into hierarchical clusters of high resource
consumption and focus primarily on optimizing
computational performance for summarizing normal
traffic. For example, they have been used to identify
clusters of Web servers in hosting farms. Hierarchical
heavy-hitter detection is similar to frequent item-set
mining in that both approaches find different forms of
multidimensional heavy hitters. Compared to these
studies, intelligently combining multidimensional
heavy-hitters with anomaly detection enables us to
extract anomalous flows. In addition, frequent item-set
mining scales to higher dimensions much better than
existing hierarchical heavy-hitter detection methods.
Finally, substantial work has focused on
dimensionality reduction for anomaly detection in
backbone network. These papers investigate
techniques and appropriate metrics for detecting
traffic anomalies, but do not focus on the anomaly
extraction problem which we are addressing in this
project.

V.

MATHEMATICAL MODEL

1] U is main set of users (ATM Holders) like u1, u2,
u3….
U = {u1, u2, u3…….}
2] A is main set of Administrators like a1, a2, a3….
A = {a1, a2, a3…….}
3] C is the main set of histogram clones like c1, c2,
c3....
C = {c1, c2, c3......}
4] Identify the processes as P.
P = {Set of processes}
P = {P1, P2, P3……}
If (anomaly is detected in the network)
then
P1 = {e1, e2, e3, e4}
Where
{e1=i|i is to build c number of
clones}
{e2=j|j is to find anomalous bins
from histogram}
90 | P a g e
Ms. Gargi Joshi Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.88-92
{e3=k|k is to filter suspicious data}
{e4=l|l is to find frequent item sets
from given suspicious data}
Else
P1 = {e1, e2}
Where
{e1=i|i is to observe network traffic
during time interval t}
{e2=j|j is to check whether anomaly
detects or not}

VI.

2.

Use histogram cloning to reduce collisions
and false positives

7.1.2 Filtering:
Filter flows that match union of meta-data
provided by N detectors
1. Filtered flows are called „suspicious“ flows
7.1.3 Mining:
Use association rules to extract and summarize
anomalous flows from the set of suspicious flows

PROJECT SETUP

Operating Environment:a) S/W Specification
Operating System : Windows 7.
Development End : JAVA [JDK 1.6]
IDE
: Eclipse Helios
Tool
: JCreator
b) H/W Specification
Processor
: PIV– 500 MHz to 3.0 GHz.
RAM
: 1GB.
Disk
: 20 GB.
Monitor
: Any Color Display.
Key Board : Standard Windows Keyboard

Fig.3 Anomaly Extraction Steps
7.2 Association Rule Mining
Given a a number of itemsets, find frequent subsets
which are common to at least a minimum number s of
the itemsets. An itemset is a flow (7-tuple): {srcIP,
dstIP, srcPort, dstPort, proto, #packets, #bytes}
Key intuition: anomalies trigger a large number of
flows with one or more common feature values, e.g.,
src IP addr, dst port, #packets. Use modified Apriori
algorithm to find frequent subset

VIII.

Fig.2 System Architecture

VII.

DEVELOPMENT METHODOLOGY

7.1 MODULE INFORMATION
Module1:
Design the Graphical User Interface (GUI) for our
system with client and server.
Module2:
Build histogram detector to observe the traffic on the
network and detect anomalies.
Module3:
Find suspicious flows from the network traffic that
causes anomaly in the network.
Module4:
Implement Apriori and FP Growth algorithm to find
frequent item sets
Approach Overview (3 steps)
7.1.1 Detection:
Use a number of histogram-based detectors:
1. Identify affected bins and create set V of
corresponding feature values
www.ijera.com

www.ijera.com

CONCLUSION

We are implementing FP Growth algorithm
and Apriori algorithm to find out frequent item sets.
We will compare the results of Apriori algorithm and
FP Growth algorithm and show how FP Growth
algorithm achieves better results in reducing the time
and space complexity and provides better optimization
results as compared to Apriori Algorithm.
Implementation by FP Growth Algorithm will be the
extension to our work.
The proposed methodology is very useful for
finding the root cause of detected anomalies, which
helps in anomaly mitigation, network forensics and
anomaly modeling.

REFERENCES
[1]

[2]

[3]

F. Silveira and C. Diot, “URCA: Pulling out
anomalies by their root causes,” in Proc.
IEEE INFOCOM, Mar. 2010, pp. 1-9.
S. Ranjan, S. Shah, A. Nucci, M. M.
Munafò, R. L. Cruz, and S.M
Muthukrishnan, “Dowitcher: Effective worm
detection and containment in the Internet
core,” in Proc. IEEE INFOCOM, 2007,
pp.2541-2545.
G. Dewaele, K. Fukuda, P. Borgnat, P. Abry,
and K. Cho, “Extracting hidden anomalies
using sketch and non Gaussian multi
resolution statistical detection procedures,”
91 | P a g e
Ms. Gargi Joshi Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.88-92
[4]

[5]

[6]

[7]

[8]

[9]

[10]

[11]

www.ijera.com

in Proc. LSAD, 2007, pp. 145-152. [10]
A. Lakhina, M. Crovella, and C.
Diot,“Diagnosing
network-wide traffic
anomalies,” in Proc. ACM SIGCOMM, 2004,
pp. 219-230.
X. Li, F. Bian, M. Crovella, C. Diot, R.
Govindan, G. Iannaccone, and A. Lakhina,
“Detection and identification of network
anomalies using sketch subspaces,” in Proc.
6th ACM SIGCOMM IMC, 2006, pp. 147152.
W. Lee and S. J. Stolfo, “Data mining
approaches for intrusion detection,” in Proc.
7th USENIX Security Symp., 1998, vol. 7, p.
6.
R. Vaarandi, “Mining event logs with SLCT
and LogHound,” in Proc.IEEE NOMS, Apr.
2008, pp. 1071-1074.
K. Yoshida, Y. Shomura, and Y. Watanabe
“Visualizing network status,” in Proc. Int.
Conf. Mach. Learning Cybern., Aug. 2007,
vol.4, pp. 2094-2099.
X. Li and Z.-H. Deng, “Mining frequent
patterns from network flows for monitoring
network,” Expert Syst. Appl. vol. 37, no. 12,
pp.8850-8860, 2010.
V.
Chandola
and
V.
Kumar,
“Summarization—Compressing data into an
informative representation,” Knowl. Inf.
Syst., vol. 12, pp. 355-378, 2007.
M. V.Mahoney and P. K. Chan, “Learning
rules for anomaly detection of hostile
network traffic,” in Proc. 3rd IEEE ICDM,
2003, pp.601-604.

www.ijera.com

92 | P a g e

More Related Content

What's hot

IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET Journal
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java ProjectsVijay Karan
 
A Survey of HTTP Botnet Detection
A Survey of HTTP Botnet DetectionA Survey of HTTP Botnet Detection
A Survey of HTTP Botnet DetectionIRJET Journal
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java ProjectsVijay Karan
 
Intrusion detection system based on web usage mining
Intrusion detection system based on web usage miningIntrusion detection system based on web usage mining
Intrusion detection system based on web usage miningIJCSEA Journal
 
Multisensor data fusion for defense application
Multisensor data fusion for defense applicationMultisensor data fusion for defense application
Multisensor data fusion for defense applicationSayed Abulhasan Quadri
 
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKDETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKIJCI JOURNAL
 
презентация за варшава
презентация за варшавапрезентация за варшава
презентация за варшаваValeriya Simeonova
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionGyan Prakash
 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET -  	  Survey on Malware Detection using Deep Learning MethodsIRJET -  	  Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning MethodsIRJET Journal
 
By passing infected areas in wireless sensor networks using bpr
By passing infected areas in wireless sensor networks using bprBy passing infected areas in wireless sensor networks using bpr
By passing infected areas in wireless sensor networks using bprLogicMindtech Nologies
 
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET -  	  Crime Analysis and Prediction - by using DBSCAN AlgorithmIRJET -  	  Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET - Crime Analysis and Prediction - by using DBSCAN AlgorithmIRJET Journal
 
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...IJMER
 
Anomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyAnomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyeSAT Publishing House
 
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...Papitha Velumani
 
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...IJNSA Journal
 
Multisensor Data Fusion : Techno Briefing
Multisensor Data Fusion : Techno BriefingMultisensor Data Fusion : Techno Briefing
Multisensor Data Fusion : Techno BriefingPaveen Juntama
 
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMSDETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMSAAKANKSHA JAIN
 

What's hot (20)

IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java Projects
 
A Survey of HTTP Botnet Detection
A Survey of HTTP Botnet DetectionA Survey of HTTP Botnet Detection
A Survey of HTTP Botnet Detection
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java Projects
 
Intrusion detection system based on web usage mining
Intrusion detection system based on web usage miningIntrusion detection system based on web usage mining
Intrusion detection system based on web usage mining
 
Multisensor data fusion for defense application
Multisensor data fusion for defense applicationMultisensor data fusion for defense application
Multisensor data fusion for defense application
 
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKDETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
 
презентация за варшава
презентация за варшавапрезентация за варшава
презентация за варшава
 
Data fusion
Data fusionData fusion
Data fusion
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET -  	  Survey on Malware Detection using Deep Learning MethodsIRJET -  	  Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning Methods
 
By passing infected areas in wireless sensor networks using bpr
By passing infected areas in wireless sensor networks using bprBy passing infected areas in wireless sensor networks using bpr
By passing infected areas in wireless sensor networks using bpr
 
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET -  	  Crime Analysis and Prediction - by using DBSCAN AlgorithmIRJET -  	  Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
 
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
 
Anomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyAnomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a survey
 
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
 
My
MyMy
My
 
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
 
Multisensor Data Fusion : Techno Briefing
Multisensor Data Fusion : Techno BriefingMultisensor Data Fusion : Techno Briefing
Multisensor Data Fusion : Techno Briefing
 
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMSDETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
 

Viewers also liked

Viewers also liked (20)

J41027175
J41027175J41027175
J41027175
 
Bj4102451460
Bj4102451460Bj4102451460
Bj4102451460
 
U4101128133
U4101128133U4101128133
U4101128133
 
Ab4102211213
Ab4102211213Ab4102211213
Ab4102211213
 
Presentation on Goa
Presentation on Goa Presentation on Goa
Presentation on Goa
 
Goa ppt
Goa pptGoa ppt
Goa ppt
 
Tutorial 1º acesso à comunidade Jovem SUS
Tutorial 1º acesso à comunidade Jovem SUSTutorial 1º acesso à comunidade Jovem SUS
Tutorial 1º acesso à comunidade Jovem SUS
 
Projetoslide
ProjetoslideProjetoslide
Projetoslide
 
Acao 1063 do @MPF_Go Lupama GIANFRANCO ANTONIO VITORIO ARTUR PERASSO da CSA ...
Acao 1063 do @MPF_Go Lupama GIANFRANCO ANTONIO VITORIO ARTUR PERASSO  da CSA ...Acao 1063 do @MPF_Go Lupama GIANFRANCO ANTONIO VITORIO ARTUR PERASSO  da CSA ...
Acao 1063 do @MPF_Go Lupama GIANFRANCO ANTONIO VITORIO ARTUR PERASSO da CSA ...
 
Apresentação Atualizada goldprimer em 3D
Apresentação Atualizada  goldprimer em 3D Apresentação Atualizada  goldprimer em 3D
Apresentação Atualizada goldprimer em 3D
 
GEO_ANI Project Overview
GEO_ANI Project OverviewGEO_ANI Project Overview
GEO_ANI Project Overview
 
Sept2016 sv nabsys
Sept2016 sv nabsysSept2016 sv nabsys
Sept2016 sv nabsys
 
Sept2016 smallvar rtg
Sept2016 smallvar rtgSept2016 smallvar rtg
Sept2016 smallvar rtg
 
VCM_WebDesign_A_v3
VCM_WebDesign_A_v3VCM_WebDesign_A_v3
VCM_WebDesign_A_v3
 
Sept2016 sv pac_bio_visualization
Sept2016 sv pac_bio_visualizationSept2016 sv pac_bio_visualization
Sept2016 sv pac_bio_visualization
 
Sept2016 smallvar 10_x
Sept2016 smallvar 10_xSept2016 smallvar 10_x
Sept2016 smallvar 10_x
 
Cystite femme
Cystite femmeCystite femme
Cystite femme
 
Incumbencias_IMA
Incumbencias_IMAIncumbencias_IMA
Incumbencias_IMA
 
EastMarket
EastMarketEastMarket
EastMarket
 
English resume-CPA
English resume-CPAEnglish resume-CPA
English resume-CPA
 

Similar to M41028892

G03403041052
G03403041052G03403041052
G03403041052theijes
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 
A Survey On Intrusion Detection Systems
A Survey On Intrusion Detection SystemsA Survey On Intrusion Detection Systems
A Survey On Intrusion Detection SystemsMary Calkins
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIOSR Journals
 
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion ApproachEnhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion ApproachIJCI JOURNAL
 
Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...IJECEIAES
 
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmCongestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmEditor IJCATR
 
Application of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion RecognitionApplication of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion RecognitionIOSR Journals
 
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...IJCSIS Research Publications
 
Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery
Efficient Doubletree: An Algorithm for Large-Scale Topology DiscoveryEfficient Doubletree: An Algorithm for Large-Scale Topology Discovery
Efficient Doubletree: An Algorithm for Large-Scale Topology DiscoveryIOSR Journals
 
A STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKS
A STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKSA STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKS
A STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKSJournal For Research
 
fast publication journals
fast publication journalsfast publication journals
fast publication journalsrikaseorika
 
System Event Monitoring for Active Authentication
System Event Monitoring for Active AuthenticationSystem Event Monitoring for Active Authentication
System Event Monitoring for Active AuthenticationCoveros, Inc.
 
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprintCao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprintNam Le
 
FUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINE
FUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINEFUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINE
FUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINEJournal For Research
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
Internet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniquesiosrjce
 

Similar to M41028892 (20)

G03403041052
G03403041052G03403041052
G03403041052
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
690 698
690 698690 698
690 698
 
A Survey On Intrusion Detection Systems
A Survey On Intrusion Detection SystemsA Survey On Intrusion Detection Systems
A Survey On Intrusion Detection Systems
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
 
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion ApproachEnhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach
 
Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...
 
spatio final.ppt
spatio final.pptspatio final.ppt
spatio final.ppt
 
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmCongestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
 
Application of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion RecognitionApplication of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion Recognition
 
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
 
Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery
Efficient Doubletree: An Algorithm for Large-Scale Topology DiscoveryEfficient Doubletree: An Algorithm for Large-Scale Topology Discovery
Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery
 
A STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKS
A STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKSA STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKS
A STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKS
 
fast publication journals
fast publication journalsfast publication journals
fast publication journals
 
System Event Monitoring for Active Authentication
System Event Monitoring for Active AuthenticationSystem Event Monitoring for Active Authentication
System Event Monitoring for Active Authentication
 
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprintCao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
 
FUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINE
FUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINEFUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINE
FUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINE
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
Internet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniques
 
L017317681
L017317681L017317681
L017317681
 

Recently uploaded

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

M41028892

  • 1. Ms. Gargi Joshi Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.88-92 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Anomaly Extraction Using Association Rule Mining Ms. Gargi Joshi* * (Department of Computer Engineering, Dr. D.Y Patil College of Engineering, Ambi, Pune) Abstract Today network security, uptime and performance of network are important and serious issue in computer network. Anomaly is deviation from normal behavior which is factor that affects on network security. So Anomaly Extraction which detects and extracts anomalous flow from network is requirement of network operator. Anomaly extraction refers to automatically finding in a large set of flows observed during an anomalous time interval, the flows associated with the anomalous event(s). It is important for root cause analysis, network forensics, and attack mitigation and anomaly modeling. We use meta data provided by several histogram based detectors to identify suspicious flows, and then apply association rule mining to find and summarize anomalous flows. Using Histogram based detector to identify anomalies and then applying Association rule mining, anomalies will be extracted. Apriori and FP Growth algorithm will be used to generate the set of rule applied on metadata. Using traffic data from a network this technique effectively finds the flow associated with the anomalous event(s). it triggers a very small number of false positives, which exhibit specific patterns and can be sorted out by an administrator this anomaly extraction method significantly reduces the work hours needed for analyzing alarms, making anomaly detection systems more practical. Keywords – Anomaly Extraction, Association Rules, computer network, data mining, Apriori Algorithm,FP Growth Algorithm. false positives or simplifying training and calibration, remain to be solved. I. INTRODUCTION An anomaly detection system may provide II. PROBLEM DEFINITION meta-data relevant to an alarm that help to narrow Aim of this system is to identify an anomaly down the set of candidate anomalous flows. For from the network traffic during a time interval and example, anomaly detection systems analyzing find the flows associated with the event(s) that histograms may indicate the histogram bins that an triggered an observed anomaly. anomaly affected, e.g., a range of IP addresses or port numbers. Such meta-data can be used to restrict the 2.1 EXISTING SYSTEM candidate anomalous flows to these that have IP Identifying network anomalies is critical for addresses or port numbers within the affected range. the timely mitigation of events, like attacks or failures To extract anomalous flows, one could build a model that can affect the security and performance of describing normal flow characteristics and use the network. Traditional approaches to anomaly detection model to identify deviating flows. However, building use attack signatures built in an Intrusion Detection such a microscopic model is very challenging due to System (IDS) that can identify attacks with known the wide variability of flow characteristics. Similarly, patterns. Significant research efforts have focused on one could compare flows during an interval with flows building IDS’s and, therefore, related production from normal or past intervals and search for changes, systems are presently employed in many networks. like new flows that were not previously observed or Although signature-based detection finds most known flows with significant increase/decrease in their attacks, it fails to identify new attacks and other volume. Such approaches essentially perform anomaly problems that have not appeared before and do not detection at the level of individual flows and could be have known signatures. used to identify anomalous flows. A number of studies have focused on Anomaly detection techniques are the last developing volume-based anomaly detection schemes line of defense when other approaches fail to detect [2]–[7]. For example, Barford et al. [2] used wavelets security threats or other problems. They have been to distinguish between predictable and anomalous extensively studied since they pose a number of traffic volume changes. More recently, Zhang et al. [6] interesting research problems, involving statistics, introduced a general framework that aims to identify modeling, and efficient data structures. Nevertheless, anomalies from network-wide link load traffic data. they have not yet gained widespread adaptation, as a These studies are successful in identifying anomalies number of challenges, like reducing the number of that result in (network-wide) traffic volume www.ijera.com 88 | P a g e
  • 2. Ms. Gargi Joshi Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.88-92 deviations. However, they are not so effective in detecting stealth attacks, such as low-rate port scanning, that do not result in notable traffic volume changes. The anomaly detection scheme by Guet al. [10] uses a single composite feature distribution to characterize traffic and computes a parametric model of the distribution using training data. Observed network traffic is, then, compared to the constructed model to identify anomalies. The authors assume that the training data-set does not contain any anomalies. The proposed anomaly detection scheme uses Principal Component Analysis (PCA) to identify an orthogonal basis along which the measurement data exhibit the highest variance. The principal components with high variance model the normal behavior of a network, whereas the remaining components of small variance are used to identify and classify anomalies. The proposed scheme aims at finding anomalies in large backbone networks and, consequently, aggregates traffic into origin-destination (OD) flows between network ingress and egress points. But it is hard to select the right number of principal components to achieve: 1) a low false-positive rate and 2) a subspace of PCA components that is anomaly-free. 2.2 PROPOSED SYSTEM Our system contains three different phases. One is histogram detector that will observe the network traffic and alert the system upon anomaly detection. Second phase consists of histogram cloning which assures the anomaly detection and finds the suspicious flows from network traffic. Finally third phase is to apply association rule mining algorithm i.e. FP Growth to find the frequent item sets. Process Summary: 1] Form network between computers or laptops. 2] Histogram detector will observe network for certain interval. 3] On anomaly detection form clones of histogram and find suspicious flows in network. 4] Apply FP Growth algorithm to this suspicious flows. 5] Find frequent item sets from the set of suspicious flows. We build a histogram-based detector for our evaluation that uses the Kullback–Leibler (KL) distance to detect anomalies. Each histogram detector monitors a flow feature distribution, like the distribution of source ports or destination IP addresses. We assume n histogram-based detectors that correspond to n different traffic features and have each m histogram bins. As an alternative to arbitrary binning, we introduce histogram cloning. With histogram cloning, different www.ijera.com www.ijera.com clones provide alternative ways to group feature values into a desired number of bins/groups creating effectively additional views along which an anomaly may be visible. The cloning mechanism is coupled with a simple voting scheme that controls the sensitivity of the detector and eventually affects a tradeoff between false positives and negatives. Assume a time interval with an anomaly. Pre filtering selects all flows that match the union of the meta-data Vj provided by n detectors, i.e., all flows that match where are filtered. Pre filtering usually removes a large part of the normal traffic. This is desirable for two reasons. First, it generates a substantially smaller dataset that results in faster processing in the following steps. Second, it improves the accuracy of association rule mining by removing flows that could result in false-positive item-sets. Here, we apply the first step of association rule mining, i.e., we find frequent item-sets to extract anomalous flows from a large set of flows observed during a time interval. The standard algorithm for discovering frequent item-sets is the Apriori algorithm. III. OBJECTIVE Identifying an anomaly from the network traffic during a time interval and find the flows associated with the event(s) that triggered an observed anomaly. FIG.1 ANOMALY EXTRACTION PATH In this project, we are observing the network traffic for time interval t and identifying the anomaly using histogram detector. Upon detection of anomaly, we build the clones of histogram detector and find suspicious flows that causes anomaly in the network. We then filter this data to eliminate large fraction of normal flows. A summary report of frequent item-sets in the set of suspicious flows is generated by applying association rule mining. IV. LITERATURE SURVEY F, Silveira and Diot [1] introduced a tool called URCA that searches for anomalous flows by iteratively eliminating subsets of normal flows. URCA also classifies the type of a detected anomaly. Nevertheless, it requires to repeatedly evaluating an anomaly detector on different flow subsets, which can be costly. Compared to this work, we simply computing frequent item-sets on pre filtered flows is sufficient to identify anomalous flows. 89 | P a g e
  • 3. Ms. Gargi Joshi Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.88-92 Do Witcher [2] is a scalable system for worm detection and containment in backbone networks. Part of the system automatically constructs a flow-filter mask from the intersection of suspicious attributes (meta-data) provided by different detectors leverage suspicious attributes from an anomaly detector and study the anomaly extraction problem in more depth. We highlight that using the intersection can miss anomalous flows and find that the union of the metadata combined with association rule mining gives better results. Dewaele et al. [3] use sketches to create multiple random projections of a traffic trace, then model the marginal’s of the sub traces using Gamma laws and identify deviations in the parameters of the models as anomalies. In addition, their method finds possible anomalous source or destination IP addresses by taking the intersection of the addresses hashing into anomalous sub traces. Compared to this work, we introduce and validate techniques to address the more challenging problem of finding anomalous flows rather than IP addresses. Lakhina et al. [4] use SNMP data to detect network-wide volume anomalies and to pinpoint the origin-destination (OD) flow along which an anomaly existed. In contrast, our approach takes as input a large number of flow records, e.g., standard 5-tuple flows, and extracts anomalous flows. An OD flow may include millions of both normal and anomalous 5tuple flows and, therefore, can form the input to our methodology. Li et al. [5], use sketches to randomly aggregate flows as an alternative to OD aggregation. The authors show that random aggregation can detect more anomalies than OD aggregation in the PCA subspace anomaly detection method. In addition, the authors discuss how their method can be used for anomaly extraction. However, the work and evaluation focus primarily on anomaly detection. Lee and Stolfo [6] show how association rules can be used to extract interesting intrusion patterns from system calls and tcp dump logs. Vaarandi [7] introduces a tool called LogHound that provides an optimized implementation of Apriori and demonstrates how LogHound can be used to summarize traffic flow records. Yoshida et al. [8] also use frequent item-set mining to identify interesting events in traces from the MAWI traffic archive. Li and Deng [9] outline a variant of the Eclat frequent item-set mining algorithm] that operates in a sliding window fashion and evaluate it using traffic flow traces from a Chinese university. Chandola and Kumar [10] describe heuristics for finding a minimal set of frequent item-sets that summarizes a large set of flows. www.ijera.com www.ijera.com Mahoney and Chan [11] use association rule mining to find rare events that are suspected to represent anomalies in packet payload data. They evaluate their method on the 1999 DARPA/Lincoln Laboratory traces. Their approach targets edge networks where mining rare events is possible. In massive backbone data, however, this approach is less promising. Another application of rule mining in edge networks is eXpose, which learns fine-grained communication rules by exploiting the temporal correlation between flows within very short time windows. Compared to these studies, association rule mining can be combined with anomaly detection to effectively extract anomalous flows. Hierarchical heavy-hitter detection methods [10], [7] group traffic into hierarchical clusters of high resource consumption and focus primarily on optimizing computational performance for summarizing normal traffic. For example, they have been used to identify clusters of Web servers in hosting farms. Hierarchical heavy-hitter detection is similar to frequent item-set mining in that both approaches find different forms of multidimensional heavy hitters. Compared to these studies, intelligently combining multidimensional heavy-hitters with anomaly detection enables us to extract anomalous flows. In addition, frequent item-set mining scales to higher dimensions much better than existing hierarchical heavy-hitter detection methods. Finally, substantial work has focused on dimensionality reduction for anomaly detection in backbone network. These papers investigate techniques and appropriate metrics for detecting traffic anomalies, but do not focus on the anomaly extraction problem which we are addressing in this project. V. MATHEMATICAL MODEL 1] U is main set of users (ATM Holders) like u1, u2, u3…. U = {u1, u2, u3…….} 2] A is main set of Administrators like a1, a2, a3…. A = {a1, a2, a3…….} 3] C is the main set of histogram clones like c1, c2, c3.... C = {c1, c2, c3......} 4] Identify the processes as P. P = {Set of processes} P = {P1, P2, P3……} If (anomaly is detected in the network) then P1 = {e1, e2, e3, e4} Where {e1=i|i is to build c number of clones} {e2=j|j is to find anomalous bins from histogram} 90 | P a g e
  • 4. Ms. Gargi Joshi Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.88-92 {e3=k|k is to filter suspicious data} {e4=l|l is to find frequent item sets from given suspicious data} Else P1 = {e1, e2} Where {e1=i|i is to observe network traffic during time interval t} {e2=j|j is to check whether anomaly detects or not} VI. 2. Use histogram cloning to reduce collisions and false positives 7.1.2 Filtering: Filter flows that match union of meta-data provided by N detectors 1. Filtered flows are called „suspicious“ flows 7.1.3 Mining: Use association rules to extract and summarize anomalous flows from the set of suspicious flows PROJECT SETUP Operating Environment:a) S/W Specification Operating System : Windows 7. Development End : JAVA [JDK 1.6] IDE : Eclipse Helios Tool : JCreator b) H/W Specification Processor : PIV– 500 MHz to 3.0 GHz. RAM : 1GB. Disk : 20 GB. Monitor : Any Color Display. Key Board : Standard Windows Keyboard Fig.3 Anomaly Extraction Steps 7.2 Association Rule Mining Given a a number of itemsets, find frequent subsets which are common to at least a minimum number s of the itemsets. An itemset is a flow (7-tuple): {srcIP, dstIP, srcPort, dstPort, proto, #packets, #bytes} Key intuition: anomalies trigger a large number of flows with one or more common feature values, e.g., src IP addr, dst port, #packets. Use modified Apriori algorithm to find frequent subset VIII. Fig.2 System Architecture VII. DEVELOPMENT METHODOLOGY 7.1 MODULE INFORMATION Module1: Design the Graphical User Interface (GUI) for our system with client and server. Module2: Build histogram detector to observe the traffic on the network and detect anomalies. Module3: Find suspicious flows from the network traffic that causes anomaly in the network. Module4: Implement Apriori and FP Growth algorithm to find frequent item sets Approach Overview (3 steps) 7.1.1 Detection: Use a number of histogram-based detectors: 1. Identify affected bins and create set V of corresponding feature values www.ijera.com www.ijera.com CONCLUSION We are implementing FP Growth algorithm and Apriori algorithm to find out frequent item sets. We will compare the results of Apriori algorithm and FP Growth algorithm and show how FP Growth algorithm achieves better results in reducing the time and space complexity and provides better optimization results as compared to Apriori Algorithm. Implementation by FP Growth Algorithm will be the extension to our work. The proposed methodology is very useful for finding the root cause of detected anomalies, which helps in anomaly mitigation, network forensics and anomaly modeling. REFERENCES [1] [2] [3] F. Silveira and C. Diot, “URCA: Pulling out anomalies by their root causes,” in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9. S. Ranjan, S. Shah, A. Nucci, M. M. Munafò, R. L. Cruz, and S.M Muthukrishnan, “Dowitcher: Effective worm detection and containment in the Internet core,” in Proc. IEEE INFOCOM, 2007, pp.2541-2545. G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho, “Extracting hidden anomalies using sketch and non Gaussian multi resolution statistical detection procedures,” 91 | P a g e
  • 5. Ms. Gargi Joshi Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.88-92 [4] [5] [6] [7] [8] [9] [10] [11] www.ijera.com in Proc. LSAD, 2007, pp. 145-152. [10] A. Lakhina, M. Crovella, and C. Diot,“Diagnosing network-wide traffic anomalies,” in Proc. ACM SIGCOMM, 2004, pp. 219-230. X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone, and A. Lakhina, “Detection and identification of network anomalies using sketch subspaces,” in Proc. 6th ACM SIGCOMM IMC, 2006, pp. 147152. W. Lee and S. J. Stolfo, “Data mining approaches for intrusion detection,” in Proc. 7th USENIX Security Symp., 1998, vol. 7, p. 6. R. Vaarandi, “Mining event logs with SLCT and LogHound,” in Proc.IEEE NOMS, Apr. 2008, pp. 1071-1074. K. Yoshida, Y. Shomura, and Y. Watanabe “Visualizing network status,” in Proc. Int. Conf. Mach. Learning Cybern., Aug. 2007, vol.4, pp. 2094-2099. X. Li and Z.-H. Deng, “Mining frequent patterns from network flows for monitoring network,” Expert Syst. Appl. vol. 37, no. 12, pp.8850-8860, 2010. V. Chandola and V. Kumar, “Summarization—Compressing data into an informative representation,” Knowl. Inf. Syst., vol. 12, pp. 355-378, 2007. M. V.Mahoney and P. K. Chan, “Learning rules for anomaly detection of hostile network traffic,” in Proc. 3rd IEEE ICDM, 2003, pp.601-604. www.ijera.com 92 | P a g e