18 research outputs found

    Mathematical Basis of Sensor Fusion in Intrusion Detection Systems

    Get PDF

    Sensor Fusion for Enhancement in Intrusion Detection

    Get PDF

    Introductory Chapter: Computer Security Threats

    Get PDF

    Introduction to Complex Systems, Sustainability and Innovation

    Get PDF
    The technological innovations have always proved the impossible possible. Humans have all the time obliterated barriers and set records with astounding regularity. However, there are issues springing up in terms of complexity and sustainability in this context, which we were ignoring for long. Today, in every walk of life, we encounter complex systems, whether it is the Internet, communication systems, electrical power grids, or the financial markets. Due to its unpredictable behavior, any creative change in a complex system poses a threat of systemic risks. This is because an innovation is always introducing something new, introducing a change, possibly to solve an existing problem, the effect of which is nonlinear. Failure to predict the future states of the system due to the nonlinear nature makes any system unsustainable. This necessitates the need for any development to be sustainable by meeting the needs of people today without destroying the potential of future generations to meet their needs. This chapter, which studies systems that are complex due to intricateness in their connectivity, gives insights into their ways of emergence and the nonlinear cause and effects pattern the complex systems use to follow, effectively paving way for sustainable innovation

    Data Mining

    No full text
    This book on data mining explores a broad set of ideas and presents some of the state-of-the-art research in this field. The book is triggered by pervasive applications that retrieve knowledge from real-world big data. Data mining finds applications in the entire spectrum of science and technology including basic sciences to life sciences and medicine, to social, economic, and cognitive sciences, to engineering and computers. The chapters discuss various applications and research frontiers in data mining with algorithms and implementation details for use in real-world. This can be through characterization, classification, discrimination, anomaly detection, association, clustering, trend or evolution prediction, etc. The intended audience of this book will mainly consist of researchers, research students, practitioners, data analysts, and business professionals who seek information on the various data mining techniques and their applications

    Complex Systems, Sustainability and Innovation

    No full text
    The book on complex systems, sustainability, and innovation explores a broad set of ideas and presents some of the state-of-the-art research in this field concisely in six chapters. In a complex system, it is difficult to know exactly how the individual components contribute to an observed behavior and the extent of each component's contributions. It is the interactions of the individual components that determine the emergent functionalities. This makes it difficult to understand and predict the behavior of complex systems and hence the effects of any innovations in this field. This necessitates for the emergence of a new age of innovations with the main focus on user orientation and sustainability. This book explores some of the complex systems and their dependence on the environment to provide a long-term perspective, aiding innovations and supporting a sustainable society. The intended audience of this book will mainly consist of researchers, research students, and practitioners in the field of complex systems and sustainability

    Ontology in Information Science

    No full text
    The book on Ontology in Information Science explores a broad set of ideas and presents some of the state-of-the-art research in this field concisely in 12 chapters. This book provides researchers and practitioners working in the field of ontology and information science an opportunity to share their theories, methodologies, experiences, and experimental results related to ontology development and application in various areas. It also includes the design aspects of domain ontologies considering the architecture, development strategy, and selection of tools. The intended audience of this book will mainly consist of researchers, research students, and practitioners in the field of ontology and information science

    Selection of intrusion detection system threshold bounds for effective sensor fusion

    No full text
    The motivation behind the fusion of Intrusion Detection Systems was the realization that with the increasing traffic and increasing complexity of attacks, none of the present day stand-alone Intrusion Detection Systems can meet the high demand for a very high detection rate and an extremely low false positive rate. Multi-sensor fusion can be used to meet these requirements by a refinement of the combined response of different Intrusion Detection Systems. In this paper, we show the design technique of sensor fusion to best utilize the useful response from multiple sensors by an appropriate adjustment of the fusion threshold. The threshold is generally chosen according to the past experiences or by an expert system. In this paper, we show that the choice of the threshold bounds according to the Chebyshev inequality principle performs better. This approach also helps to solve the problem of scalability and has the advantage of failsafe capability. This paper theoretically models the fusion of Intrusion Detection Systems for the purpose of proving the improvement in performance, supplemented with the empirical evaluation. The combination of complementary sensors is shown to detect more attacks than the individual components. Since the individual sensors chosen detect sufficiently different attacks, their result can be merged for improved performance. The combination is done in different ways like (i) taking all the alarms from each system and avoiding duplications, (ii) taking alarms from each system by fixing threshold bounds, and (iii) rule-based fusion with a priori knowledge of the individual sensor performance. A number of evaluation metrics are used, and the results indicate that there is an overall enhancement in the performance of the combined detector using sensor fusion incorporating the threshold bounds and significantly better performance using simple rule-based fusion
    corecore