IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Learning with Querying and its Application in Network Security

Learning with Querying and its Application in Network Security
View Sample PDF
Author(s): Liang-Bin Lai (National Taiwan University, Taiwan, ROC), Shu-Yu Lin (National Taiwan University, Taiwan, ROC), Ray-I Chang (National Taiwan University, Taiwan, ROC)and Jen-Shiang Kouh (National Taiwan University, Taiwan, ROC)
Copyright: 2012
Pages: 18
Source title: Machine Learning Algorithms for Problem Solving in Computational Applications: Intelligent Techniques
Source Author(s)/Editor(s): Siddhivinayak Kulkarni (University of Ballarat, Australia)
DOI: 10.4018/978-1-4666-1833-6.ch021

Purchase

View Learning with Querying and its Application in Network Security on the publisher's website for pricing and purchasing information.

Abstract

Understanding the ability of learning in both humans and non-humans is an important research crossing the boundaries between several scientific disciplines from computer science to brain science and psychology. In this chapter, the authors first introduce a query based learning concept (learning with query) in which all the minds’ beliefs and actions will be revised by observing the outcomes of past mutual interactions (selective-attention and self-regulation) over time. That is, moving into an active learning and aggressive querying method will be able to focus on effectiveness to achieve learning goals and desired outcomes. Secondly, they show that the proposed method has better effectiveness for several learning algorithms, such as decision tree, particle swarm optimization, and self-organizing maps. Finally, a query based learning method is proposed to solve network security problems as a sample filter at intrusion detection. Experimental results show that the proposed method can not only increase the accuracy detection rate for suspicious activity and recognize rare attack types but also significantly improve the efficiency of intrusion detection. Therefore, it is good to design and to implement an effective learning algorithm for information security.

Related Content

Bhargav Naidu Matcha, Sivakumar Sivanesan, K. C. Ng, Se Yong Eh Noum, Aman Sharma. © 2023. 60 pages.
Lavanya Sendhilvel, Kush Diwakar Desai, Simran Adake, Rachit Bisaria, Hemang Ghanshyambhai Vekariya. © 2023. 15 pages.
Jayanthi Ganapathy, Purushothaman R., Ramya M., Joselyn Diana C.. © 2023. 14 pages.
Prince Rajak, Anjali Sagar Jangde, Govind P. Gupta. © 2023. 14 pages.
Mustafa Eren Akpınar. © 2023. 9 pages.
Sreekantha Desai Karanam, Krithin M., R. V. Kulkarni. © 2023. 34 pages.
Omprakash Nayak, Tejaswini Pallapothala, Govind P. Gupta. © 2023. 19 pages.
Body Bottom