37 research outputs found

    Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit

    Get PDF
    In this paper, we review an extension of the learning rules in a Principal Component Analysis network which has been derived to be optimal for a specific probability density function. We note that this probability density function is one of a family of pdfs and investigate the learning rules formed in order to be optimal for several members of this family. We show that, whereas we have previously (Lai et al., 2000; Fyfe and MacDonald, 2002) viewed the single member of the family as an extension of PCA, it is more appropriate to view the whole family of learning rules as methods of performing Exploratory Projection Pursuit. We illustrate this on both artificial and real data sets

    A Climatologycal Analysis by Means of Soft Computing Models

    Get PDF
    This research analyzes the meteorological conditions of four different places in Spain. The case study is based on real data provided by the AEMET (Meteorological Spanish Agency) in 2009. Thirteen variables with atmospheric conditions are considered. Different Statistical and Soft Computing Models are applied to show the great variability of the environmental conditions in the four well selected places. The results are confirmed by the Annual Environmental Summarized 2009 provided by the AEMET

    Unsupervised Visualization of SQL Attacks by Means of the SCMAS Architecture

    Get PDF
    This paper presents an improvement of the SCMAS architecture aimed at securing SQL-run databases. The main goal of such architecture is the detection and prevention of SQL injection attacks. The improvement consists in the incorporation of unsupervised projection models for the visual inspection of SQL traffic. Through the obtained projections, SQL injection queries can be identified and subsequent actions can be taken. The proposed approach has been tested on a real dataset, and the obtained results are shown

    Constructing a Global and Integral Model of Business Management Using a CBR System

    Get PDF
    Knowledge has become the most strategic resource in the new business environment. A case-based reasoning system, which incorporates a novel clustering and retrieval method, has been developed for identifying critical situations in business processes. The proposed method is based on a Cooperative Maximum Likelihood Hebbian Learning model, which can be used to categorize the necessities for the Acquisition, Transfer and Updating of Knowledge of the different departments of a firm. This technique is used as a tool to develop a part of a Global and Integral Model of business Management, which brings about a global improvement in the firm, adding value, flexibility and competitiveness. From this perspective, the model tries to generalise the hypothesis of organizational survival and competitiveness, so that the organisation that is able to identify, strengthen, and use key knowledge will reach a pole position

    The Importance of Time in the Identification of Anomalous Situations by Means of MOVICAB-IDS

    Get PDF
    Intrusion Detection Systems (IDSs) are a part of the computer security infrastructure of most organizations. They are designed to detect suspect patterns by monitoring and analysing computer network events. Different areas of artificial intelligence, statistical and signature verification techniques have been applied in the field of IDSs. Additionally, visualization tools have been applied for intrusion detection, some of them providing visual measurements of network traffic. As described in previous works, MOVICAB-IDS (MObile VIsualization Cooperative Agent-Based IDS) is a bio-inspired tool based on the use of unsupervised Neural Networks (NN), and provides the network administrator with a snapshot of network traffic, protocol interactions and traffic volume. It offers a complete and more intuitive visualization of the network traffic by depicting each simple packet. To improve the accessibility of the system, the administrator may visualize the results on a mobile device (such as PDA’s, mobile phones or embedded devices), enabling informed decisions to be taken anywhere and at any time. It is a combination of a connectionist model and a multiagent system enriched by a functional and mobile visualization. The viability and effectiveness of MOVICAB-IDS has been shown in previous works. This paper focuses on the importance of the time-information dependence in the identification of anomalous situations in the case of the proposed model. Several experiments show that the connectionist method on which MOVICAB-IDS is based (that has never been applied to the IDS and network security field before the beginning of this research) can highlight the evolution of packets along time. That is, MOVICAB-IDS identifies anomalous situations by taking into account the time-related dimension among others and by using unsupervised bio-inspired models

    8th International Conference on Practical Applications of Agents and Multiagent Systems

    Get PDF
    PAAMS, the International Conference on Practical Applications of Agents and Multi-Agent Systems is an international yearly forum to present, to discuss, and to disseminate the latest developments and the most important outcomes related to real-world applications. It provides a unique opportunity to bring multi-disciplinary experts, academics and practitioners together to exchange their ex-perience in the development of Agents and Multi-Agent Systems. This volume presents the papers that have been accepted for the 2010 edition in the Special Sessions and Workshops. PAAMS'10 Special Sessions and Workshops are a very useful tool in order to complement the regular program with new or emerging topics of particular interest to the participating community. Special Ses-sions and Workshops that emphasize on multi-disciplinary and transversal aspects, as well as cutting-edge topics were especially encouraged and welcomed

    IDS Based on Bio-inspired Models

    Get PDF
    Unsupervised projection approaches can support Intrusion Detection Systems for computer network security. The involved technologies assist a network manager in detecting anomalies and potential threats by an intuitive display of the progression of network traffic. Projection methods operate as smart compression tools and map raw, high-dimensional traffic data into 2-D or 3-D spaces for subsequent graphical display. The paper compares three projection methods, namely, Cooperative Maximum Likelihood Hebbian Learning, Auto-Associative Back-Propagation networks and Principal Component Analysis. Empirical tests on anomalous situations related to the Simple Network Management Protocol (SNMP) confirm the validity of the projection-based approach. One of these anomalous situations (the SNMP community search) is faced by these projection models for the first time. This work also highlights the importance of the time-information dependence in the identification of anomalous situations in the case of the applied methods

    Understanding Honeypot Data by an Unsupervised Neural Visualization

    Get PDF
    Neural projection techniques can adaptively map high-dimensional data into a low-dimensional space, for the user-friendly visualization of data collected by different security tools. Such techniques are applied in this study for the visual inspection of honeypot data, which may be seen as a complementary network security tool that sheds light on internal data structures through visual inspection. Empirical verification of the proposed projection methods was performed in an experimental domain where data were captured from a honeypot network. Experiments showed that visual inspection of these data, contributes to easily gain a deep understanding of attack patterns and strategies

    MOVICAB-IDS: Visual Analysis of Network Traffic Data Streams for Intrusion Detection

    Full text link
    MOVICAB-IDS enables the more interesting projections of a massive traffic data set to be analysed, thereby providing an overview of any possible anomalous situations taking place on a computer network. This IDS responds to the challenges presented by traffic volume and diversity. It is a connectionist agent-based model extended by means of a functional and mobile visualization interface. The IDS is designed to be more flexible, accessible and portable by running on a great variety of applications, including small mobile ones such as PDA’s, mobile phones or embedded devices. Furthermore, its effectiveness has been demonstrated in different tests

    IDS Based on Bio-inspired Models

    Get PDF
    Unsupervised projection approaches can support Intrusion Detection Systems for computer network security. The involved technologies assist a network manager in detecting anomalies and potential threats by an intuitive display of the progression of network traffic. Projection methods operate as smart compression tools and map raw, high-dimensional traffic data into 2-D or 3-D spaces for subsequent graphical display. The paper compares three projection methods, namely, Cooperative Maximum Likelihood Hebbian Learning, Auto-Associative Back-Propagation networks and Principal Component Analysis. Empirical tests on anomalous situations related to the Simple Network Management Protocol (SNMP) confirm the validity of the projection-based approach. One of these anomalous situations (the SNMP community search) is faced by these projection models for the first time. This work also highlights the importance of the time-information dependence in the identification of anomalous situations in the case of the applied methods
    corecore