Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 30234

Select areas to restrict search in scientific publication database:
Anomaly Detection with ANN and SVM for Telemedicine Networks
In recent years, a wide variety of applications are developed with Support Vector Machines -SVM- methods and Artificial Neural Networks -ANN-. In general, these methods depend on intrusion knowledge databases such as KDD99, ISCX, and CAIDA among others. New classes of detectors are generated by machine learning techniques, trained and tested over network databases. Thereafter, detectors are employed to detect anomalies in network communication scenarios according to user’s connections behavior. The first detector based on training dataset is deployed in different real-world networks with mobile and non-mobile devices to analyze the performance and accuracy over static detection. The vulnerabilities are based on previous work in telemedicine apps that were developed on the research group. This paper presents the differences on detections results between some network scenarios by applying traditional detectors deployed with artificial neural networks and support vector machines.
Digital Object Identifier (DOI):


[1] Shah, B. & Trivedi, B. H, Improving Performance of Mobile Agent Based Intrusion Detection System, in 'Advanced Computing & Communication Technologies (ACCT), 2015 Fifth International Conference on', pp. 425-430, (2015).
[2] Hoque, M. S.; Mukit, M.; Bikas, M.; Naser, A. & others, 'An implementation of intrusion detection system using genetic algorithm', arXiv preprint arXiv: 1204. 1336. (2012).
[3] Rahman, M. & Cheung, W. M, 'A Novel Cloud Computing Security Model to Detect and Prevent DoS and DDoS Attack', International Journal of Advanced Computer Science and Applications (IJACSA) 5(6), (2014).
[4] Bhat, A. H.; Patra, S. & Jena, D., 'Machine Learning Approach for Intrusion Detection on Cloud Virtual Machines', International Journal of Application or Innovation in Engineering & Management (IJAIEM) 2(6), 56-66, (2013).
[5] Kim, G.; Lee, S. & Kim, S., 'A Novel Hybrid Intrusion Detection Method Integrating Anomaly Detection with Misuse Detection', Expert Systems with Applications 41(4), 1690-1700, (2014).
[6] Murphy, K. P., Machine Learning: A Probabilistic Perspective, MIT press, (2012).
[7] Cifuentes, Y.; Beltrán, L. & Ramirez, L., 'Analysis of Security Vulnerabilities for Mobile Health Applications', 2015 Seventh International Conference on Mobile Computing and Networking (ICMCN 2015).
[8] Mirza, N. A. S.; Abbas, H.; Khan, F. A. & Al Muhtadi, J., Anticipating Advanced Persistent Threat (APT) Countermeasures Using Collaborative Security Mechanisms, in 'Biometrics and Security Technologies (ISBAST), 2014 International Symposium on', pp. 129-132, (2014).
[9] Saied, A.; Overill, R. E. & Radzik, T., Artificial Neural Networks in the Detection of Known and Unknown DDoS Attacks: Proof-of-Concept' Highlights of Practical Applications of Heterogeneous Multi-Agent Systems. The PAAMS Collection', Springer, pp. 309--320, (2014).
[10] Devaraju, S. & Ramakrishnan, S., 'Performance Comparison for Intrusion Detection System Using Neural Network with KDD Dataset.', ICTACT Journal on Soft Computing 4(3), 743-752, (2014).
[11] Macek, N. & Milosavljević, M. (2014), 'Reducing U2R and R2L Category False Negative rates with support vector machines', Serbian Journal of Electrical Engineering 11(1), 175-188.
[12] Hasan, M. A. M.; Nasser, M.; Pal, B. & Ahmad, S., 'Support Vector Machine and Random Forest Modeling for Intrusion Detection System (IDS)', Journal of Intelligent Learning Systems and Applications 2014, (2014).
[13] Guillén, E.; Rodriguez, J.; Páez, R.; Rodriguez, A. Detection of non-content based attacks using GA with extended KDD features. In Proceedings of the World Congress on Engineering and Computer Science, San Francisco, USA, 24-26 October 2012; pp. 30–35.
[14] Guillén, E.; Rodriguez, J.; Páez, R. Evaluating Performance of an Anomaly Detection Module with Artificial Neural Network Implementation. Int. J. Comput. Inf. Syst. Control Eng. 2013, 7, 836–842.
[15] Stolfo, S. J.; Fan, W.; Lee, W.; Prodromidis, A. & Chan, P. K., Cost-based modeling for fraud and intrusion detection: Results from the JAM project, in 'DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00. Proceedings', pp. 130--144, (2000).
[16] Kim, B.-J. & Kim, I. K. (2005), Machine learning approach to real time intrusion detection System' AI 2005: Advances in Artificial Intelligence', Springer, pp. 153-163.
[17] Pati, J. & Shukla, K., A comparison of ARIMA, Neural Network and a Hybrid Technique for Debian Bug Number Prediction, in 'Computer and Communication Technology (ICCCT), 2014 International Conference on', pp. 47-53, (2014).
[18] Ndiaye, A.; Thiaw, L.; Sow, G. & Fall, S., 'Development of a Multilayer Perceptron (MLP) Based Neural Network Controller for Grid Connected Photovoltaic System', Int. J. Phys. Sci 9(3), 41--47, (2014).
[19] Meyer, D. & Wien, F. T., 'Support Vector Machines', The Interface to Libsvm in Package e1071, (2014).
[20] Rüping, S., Incremental Learning with Support Vector Machines, in '2013 IEEE 13th International Conference on Data Mining', pp. 641-641, (2001).
[21] Rüping, S., 'Incremental Learning with Support Vector Machines', Technical Report, Technical Report, SFB, 475: Komplexitдtsreduktion in Multivariaten Datenstrukturen, Universitдt Dortmund, (2002).
[22] Mei, S. & Zhu, X., Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners, in Proceedings of Association for the Advancement of Artificial Intelligence, Austin, Texas USA. January 25 –30, 2015, pp. 2871–2877, (2015).
[23] Levy, B. C., Principles of Signal Detection and Parameter Estimation, Springer Science & Business Media, (2008).
[24] Murphy, K. P., Machine Learning: A Probabilistic Perspective, MIT Press, (2012).
Vol:14 No:01 2020
Vol:13 No:12 2019Vol:13 No:11 2019Vol:13 No:10 2019Vol:13 No:09 2019Vol:13 No:08 2019Vol:13 No:07 2019Vol:13 No:06 2019Vol:13 No:05 2019Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007