Computer Science And Technology - Research Publications

Permanent URI for this collectionhttps://kr.cup.edu.in/handle/32116/82

Browse

Search Results

Now showing 1 - 3 of 3
  • Thumbnail Image
    Item
    Resolving the celestial classification using fine k-NN classifier
    (Institute of Electrical and Electronics Engineers Inc., 2016) Yadav, Sangeeta; Kaur, Amandeep; Bhauryal, Neeraj Singh
    With the rapid growth in space technology, space exploration is on the high demand. With each such type of mission, data is accumulating in heaps. Be it manned or unmanned mission, its credibility is defined by the quality of research which can be conducted on the data collected in such missions through remote or on the capsule experiments. Thus there is huge demand of soft techniques, which can make the space or celestial data as useful as possible. One of the major issues is dearth of automated technique for image classification of celestial bodies. Though many image classification techniques exist, but none of them is totally attributed to celestial bodies. An artificial neural network based classifier is proposed to classify celestial object from its image. Texture features are extracted from 90 images of size of 225-225 of different planets. Different classifiers were applied on this training data. Accuracy of different classifiers is compared to find out the best classifier for space data classification. Different validation schemes are applied and the results are compared to figure out the best validation scheme. ? 2016 IEEE.
  • Item
    Detection of phishing websites using C4.5 data mining algorithm
    (Institute of Electrical and Electronics Engineers Inc., 2018) Priya, A.; Meenakshi, E.
    Phishing sites are fake sites that are made by deceptive persons which are copy of genuine sites. These websites look like an official website of any company such as bank, institute, etc. The main aim of phishing is that to steal sensitive information of user such as password, username, pin number, etc. Victims of phishing attacks may uncover their money related delicate data to the attackers who may utilize this data for budgetary and criminal exercises. Different technical and non-technical approaches have been proposed to identify phishing sites. Non-Technical approach has no solution against the fast disappearance feature of phishing websites. Data mining technique, one of the classifications of technical approach, has shown promising results in detection of phishing websites. As compared to non-technical approaches, data mining techniques can generate classification models which can make prediction on phishing websites in real-time. In this paper analysis of C4.5 (J48) data mining algorithm has been done using WEKA tool. C4.5 is a benchmark data mining technique which can accurately identify phishing websites. A training dataset of 750 URLs has been made to train the algorithm J48, which is an implementation of C4.5 algorithm in WEKA. Testing dataset of 300 URLs is used to make prediction using the classifier generated after the training of J48. True positive rate, True negative rate, False positive rate, False negative rate, Success rate, Error rate and Accuracy are calculated after testing process. Result shows C4.5 has an accuracy of 82.6%. ? 2017 IEEE.
  • Thumbnail Image
    Item
    Comparison of classification techniques for intrusion detection dataset using WEKA
    (Institute of Electrical and Electronics Engineers Inc., 2014) Garg, T.; Khurana, S.S.
    As the network based applications are growing rapidly, the network security mechanisms require more attention to improve speed and precision. The ever evolving new intrusion types pose a serious threat to network security. Although numerous network security tools have been developed, yet the fast growth of intrusive activities is still a serious issue. Intrusion detection systems (IDSs) are used to detect intrusive activities on the network. Machine learning and classification algorithms help to design 'Intrusion Detection Models' which can classify the network traffic into intrusive or normal traffic. In this paper we present the comparative performance of NSL-KDD based data set compatible classification algorithms. These classifiers have been evaluated in WEKA (Waikato Environment for Knowledge Analysis) environment using 41 attributes. Around 94,000 instances from complete KDD dataset have been included in the training data set and over 48,000 instances have been included in the testing data set. Garrett's Ranking Technique has been applied to rank different classifiers according to their performance. Rotation Forest classification approach outperformed the rest. ? 2014 IEEE.