Artificial Intelligence and Data Mining Approaches in Security Frameworks. Группа авторов

Чтение книги онлайн.

Читать онлайн книгу Artificial Intelligence and Data Mining Approaches in Security Frameworks - Группа авторов страница 13

Artificial Intelligence and Data Mining Approaches in Security Frameworks - Группа авторов

Скачать книгу

mining schemes. To study irregular and usual outlines from the training set, Decision Trees and Genetic Algorithms of Machine Learning can be employed and then on the basis of generated classifiers, there could be labeled as Normal or Abnormal classes for test data. The labelled data, “Abnormal”, is helpful to point out the presence of an intrusion.

      a) Decision Trees

      b) Genetic Algorithms (GA)

      1 Fitness function

      2 Individuals representation

      3 Genetic algorithms parameters

      For designing an artificial immune system, genetic algorithm-based method can be used. By using this method, a method for smartphone malware detection has been proposed by Bin et al. (Wu et al., 2015). In this approach, static and dynamic signatures of malwares were extracted to obtain the malicious scores of tested samples.

      c) Random Forest

      1 A sample of N cases is arbitrarily selected from the original dataset which represents the training set required for growing the tree.

      2 Out of the M input variables, m variables can be selected arbitrarily. Value of m will be constant at the time of growing the forest.

      3 Maximum possible value can be given to each tree in the forest. There is no requirement of trimming or Pruning of the tree.

      4 To form the random forest, all classification trees can be combined. The problem of overfitting on large dataset can be fixed with the help of random forest. It can also train/ test quickly on complex data set. It can also be referred as Operational Data mining technique.

      Each and every classification tree can be used to cast vote for a class because of its special feature. On the basis of maximum votes assigned to a class, a solution class is built.

      d) Association-rule mining

      Breadth First Search (BFS) with Counting Occurrences: An eminent algorithm in this group is Apriori algorithm. By clipping the candidates with rare subsets and with the help of this algorithm, the downward closure property of an itemset can be utilized. It should be done before counting their support. Two important parameters to be measured at the time of association rule evaluation which is: support and confidence. In BFS, it is possible to do desired optimization by knowing the support values of all subsets of the candidates in advance. The main drawback of the above mentioned is the increment in computational complexity in a rule that has been extracted from a large database. An improved, dispersed and unsecured form of the Apriori algorithm is Fast Distributed Mining (FDM) algorithm (Lee et al., 1999). Organizations are able to use data more competently with the help of advancements in data mining techniques.

      It

Скачать книгу