18 research outputs found
Efficient Network Traffic Classification and Visualizing Abnormal Part Via Hybrid Deep Learning Approach : Xception + Bidirectional GRU
Due to a rapid development in the field of information and communication, the information technologies yielded novel changes in both individual and organizational operations. Therefore, the accessibility of information became easier and more convenient than before, and malicious approaches such as hacking or spying aimed at various information kept increasing. With the aim of preventing malicious approaches, both classification and detecting malicious traffic are vital. Therefore, our research utilized various deep learning and machine learning models for better classification. The given dataset consists of normal and malicious data and these data types are png files. In order to achieve precise classification, our experiment consists of three steps. Firstly, only vanilla CNN was used for the classification and the highest score was 86.2%. Second of all, for the hybrid approach, the machine learning classifiers were used instead of fully connected layers from the vanilla CNN and it yielded about 87% with the extra tree classifier. At last, the Xception model was combined with the bidirectional GRU and it attained a 95.6% accuracy score, which was the highest among all
On domain modelling of the service system with its application to enterprise information systems
Information systems are a kind of service systems and they are throughout every element of a modern industrial and business system, much like blood in our body. Types of information systems are heterogeneous because of extreme uncertainty in changes in modern industrial and business systems. To effectively manage information systems, modelling of the work domain (or domain) of information systems is necessary. In this paper, a domain modelling framework for the service system is proposed and its application to the enterprise information system is outlined. The framework is defined based on application of a general domain modelling tool called function-context-behaviour-principle-state-structure (FCBPSS). The FCBPSS is based on a set of core concepts, namely: function, context, behaviour, principle, state and structure and system decomposition. Different from many other applications of FCBPSS in systems engineering, the FCBPSS is applied to both infrastructure and substance systems, which is novel and effective to modelling of service systems including enterprise information systems. It is to be noted that domain modelling of systems (e.g. enterprise information systems) is a key to integration of heterogeneous systems and to coping with unanticipated situations facing to systems.postprin
A divide-and-conquer strategy using feature relevance and expert knowledge for enhancing a data mining approach to bank telemarketing
The discovery of knowledge through data mining provides a valuable asset for addressing decision making problems. Although a list of features may characterize a problem, it is often the case that a subset of those features may influence more a certain group of events constituting a sub-problem within the original problem. We propose a divide-and-conquer strategy for data mining using both the data-based sensitivity analysis for extracting feature relevance and expert evaluation for splitting the problem of characterizing telemarketing contacts to sell bank deposits. As a result, the call direction (inbound/outbound) was considered the most suitable candidate feature. The inbound telemarketing sub-problem re-evaluation led to a large increase in targeting performance, confirming the benefits of such approach and considering the importance of telemarketing for business, in particular in bank marketing
Visa trial of international trade: evidence from support vector machines and neural networks
International trade depends on networking, interaction and in-person meetings which stimulate cross-border travels. The countries are seeking policies to encourage inbound mobility to support bilateral trade, tourism, and foreign direct investments. Some nations have been implementing liberal visa regimes as an important part of facilitating policies in view of security concerns. Turkey has been among the nations introducing liberal visa policies to support trade in the last decade and recorded significant increases in the volumes of exports. In this paper, we employed machine learning methodologies, Support vector machines (SVM) and Neural networks (NN), to investigate the facilitating impact of liberal visa policies on bilateral trade, using the export data from Turkey for the period of 2000–2014. The research disentangled the variables that have the strongest impact on trade utilizing SVM and NN models and exhibited that visa policies have significant impacts on the bilateral trade. More relaxed visa policies are recommended for the countries in the pursuit of increasing exports
Automated Inference System for End-To-End Diagnosis of Network Performance Issues in Client-Terminal Devices
Traditional network diagnosis methods of Client-Terminal Device (CTD)
problems tend to be laborintensive, time consuming, and contribute to increased
customer dissatisfaction. In this paper, we propose an automated solution for
rapidly diagnose the root causes of network performance issues in CTD. Based on
a new intelligent inference technique, we create the Intelligent Automated
Client Diagnostic (IACD) system, which only relies on collection of
Transmission Control Protocol (TCP) packet traces. Using soft-margin Support
Vector Machine (SVM) classifiers, the system (i) distinguishes link problems
from client problems and (ii) identifies characteristics unique to the specific
fault to report the root cause. The modular design of the system enables
support for new access link and fault types. Experimental evaluation
demonstrated the capability of the IACD system to distinguish between faulty
and healthy links and to diagnose the client faults with 98% accuracy. The
system can perform fault diagnosis independent of the user's specific TCP
implementation, enabling diagnosis of diverse range of client devicesComment: arXiv admin note: substantial text overlap with arXiv:1207.356
Recommended from our members
The Classification Performance of Multiple Methods and Datasets: Cases from the Loan Credit Scoring Domain
Decisions to extend credit to potential customers are complex, risky and even potentially catastrophic for the credit granting institution and the broader economy as underscored by credit failures in the late 2000s. Thus, the ability to accurately assess the likelihood of default is an important issue. In this paper the authors contrast the classification accuracy of multiple computational intelligence methods using five datasets obtained from five different decision contexts in the real world. The methods considered are: logistic regression (LR), neural network (NN), radial basis function neural network (RBFNN), support vector machine (SVM), k-nearest neighbor (kNN), and decision tree (DT). The datasets have various characteristics with respect to the number of cases, the number and type of attributes, the extent of missing values as well as different ratios for bad loans/good loans. Using areas under ROC charts as well as the classification accuracy rates for overall, bad loans, and good loans the performances of six methods across five datasets and the five datasets across the methods are examined to find if there are significant differences between the methods and datasets. Our results reveal some interesting findings which may be useful to practitioners. Even though no method consistently outperformed any other method using the above metrics on all datasets, this study provides some guidelines as to the most appropriate methods suitable for each specific data set. In addition, the study finds that customer financial attributes are much more relevant than the personal, social, or employment attributes for predictive accuracy