Optimized Anomaly based Risk Reduction using PCA based Genetic Classifier

α
C.Kavitha
C.Kavitha
σ
Dr. K.Iyakutti
Dr. K.Iyakutti
α Madurai Kamaraj University

Send Message

To: Author

Optimized Anomaly based Risk Reduction using PCA based Genetic Classifier

Article Fingerprint

ReserarchID

CSTSDEPC68H

Optimized Anomaly based Risk Reduction using PCA based Genetic Classifier Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Security risk analysis is the thrust area for the information based world. The researchers in this field deployed numerous techniques to overcome the information security oriented problem. In this paper the researcher tried for a approach of using anomaly detection for the risk reduction. The hub initiative for this work is that the anomalies are the deviation which could increase the percentage of risk. The anomaly detection is guided by the PCA and the genetic based multi class classifier is used. The classification is induced by the decision tree approach were the genetic algorithm is set out for the optimization in the process of finding the nodes of the tree. The proposed approach is evaluated with the bench mark on PCA based ANN classifier. The proposed approach outperforms the existing one. The results are demonstrated.

References

19 Cites in Article
  1. Alireza Tamjidyamcholo,Dawoud Rawaa,Al-Dabbagh (2012). Genetic Algorithm Approach for Risk Reduction of Information Security.
  2. A Chandrasekar,V Vasudevan,P Yogesh (2009). Social Network Security Using Anomaly Detection.
  3. Rodrigo Barros,P M´arcio,Basgalupp,C Andr´e,Alex De Carvalho,Freitas (2012). A Survey of Evolutionary Algorithms for Decision Tree Induction.
  4. Asmaa Shaker Ashoor,Sharad Gore (2011). Importance of Intrusion Detection System.
  5. F Tamer,Wail Ghanema,Elkilani,M Hatem,Abdul-Kader (2014). A hybrid approach for efficient anomaly detection using metaheuristic methods.
  6. Salvatore Stolfo,Shlomo Hershkop,Linh Bui,Ryan Ferster,Ke Wang (2005). Anomaly Detection in Computer Security and an Application to File System Accesses.
  7. Varun Chandola,Arindam Banerjee,Vipin Kumar (2009). Anomaly detection.
  8. Jonathon Shlens (2014). A Tutorial on Principal Component Analysis.
  9. Nayot Poolsappasit,Rinku Dewri,Indrajit Ray (2012). Dynamic Security Risk Management Using Bayesian Attack Graphs.
  10. Ming-Chang Lee (2014). Information Security Risk Analysis Methods and Research Trends: AHP and Fuzzy Comprehensive Method.
  11. Y Gao,J Luo (2009). Information security risk assessment based on grey relational decision making algorithm.
  12. F Liu,K Dai,Z Wang (2004). Research on the technology of quantitative security evaluation based on fuzzy number arithmetic operation.
  13. P Chang,K Hung,C (2005). Applying the fuzzy weighted average approach to evaluation network security systems.
  14. Nan Feng,Minqiang Li (2011). An information systems security risk assessment model under uncertain environment.
  15. Irfan Syamsuddin,Junseok Hwang (2010). The Use of AHP in Security Policy Decision Making: An Open Office Calc Application.
  16. Irfan Syamsuddin,Irfan Syamsuddin (2012). Evaluation of Strategic Information Security with Fuzzy AHP Method.
  17. Shanta Rangaswamy,Dr Shobha,G Sandeep R V,Raj Kiran (2014). Comparative Study of Decision Tree Classifier with and without GA based feature selection.
  18. Herve Abdi (2010). Normalizing Data.
  19. Sini Shilpa Lakhina,Bhupendra Joseph,Verma (2010). Feature Reduction using Principal Component Analysis for Effective Anomaly-Based Intrusion Detection on NSL-KDD.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

C.Kavitha. 2014. \u201cOptimized Anomaly based Risk Reduction using PCA based Genetic Classifier\u201d. Global Journal of Computer Science and Technology - C: Software & Data Engineering GJCST-C Volume 14 (GJCST Volume 14 Issue C7): .

Download Citation

Issue Cover
GJCST Volume 14 Issue C7
Pg. 31- 37
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Version of record

v1.2

Issue date

September 25, 2014

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 8696
Total Downloads: 2323
2026 Trends
Related Research

Published Article

Security risk analysis is the thrust area for the information based world. The researchers in this field deployed numerous techniques to overcome the information security oriented problem. In this paper the researcher tried for a approach of using anomaly detection for the risk reduction. The hub initiative for this work is that the anomalies are the deviation which could increase the percentage of risk. The anomaly detection is guided by the PCA and the genetic based multi class classifier is used. The classification is induced by the decision tree approach were the genetic algorithm is set out for the optimization in the process of finding the nodes of the tree. The proposed approach is evaluated with the bench mark on PCA based ANN classifier. The proposed approach outperforms the existing one. The results are demonstrated.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Optimized Anomaly based Risk Reduction using PCA based Genetic Classifier

C.Kavitha
C.Kavitha Madurai Kamaraj University
Dr. K.Iyakutti
Dr. K.Iyakutti

Research Journals