Database Intrusion Detection Using Genetic Support Vector Fuzzy Clustering Learning Model (Record no. 10101)

000 -LEADER
fixed length control field a
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20191116100138.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 191116b xxu||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency AIKTC-KRRC
Transcribing agency AIKTC-KRRC
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 10506
Author Brahma, Anitarani
245 ## - TITLE STATEMENT
Title Database Intrusion Detection Using Genetic Support Vector Fuzzy Clustering Learning Model
250 ## - EDITION STATEMENT
Volume, Issue number Vol.6(2), May-Aug
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New Delhi
Name of publisher, distributor, etc. STM Journals
Year 2019
300 ## - PHYSICAL DESCRIPTION
Pagination 32-40p.
520 ## - SUMMARY, ETC.
Summary, etc. The rapid development of computer networks and increasing dependency of almost all companies and government agencies on Internet and cloud computing lead to the problem of stability and security like intrusions in several forms which can cause huge loss to these organizations. During recent years, disaster in data due to intrusions has dramatically increased. The hindrance of such intrusions is entirely dependent on their detection part which can be possible through a high-performance based intrusion detection system in database which has higher accuracy rate and negligible false positive rate. As part of funded effort in database security, soft computing proven to be capable of creating a system capable of detecting and characterizing anomalous behaviour which is composed of evolutionary computing tools with artificial neural networks and/or fuzzy logic. In this progression, here we present a Database Intrusion Detection System, by applying Genetic Algorithm for feature extraction and Fuzzy clustering and Support Vector Machines are used for detection purpose to efficiently detect insider threat with a reasonable false positive rate.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 4622
Topical term or geographic name entry element Computer Engineering
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 10507
Co-Author Panigrahi, Suvasini
773 0# - HOST ITEM ENTRY
Place, publisher, and date of publication Noida STM Journals
Title Journal of artificial intelligence research and advances (JoAIRA)
856 ## - ELECTRONIC LOCATION AND ACCESS
URL http://computers.stmjournals.com/index.php?journal=JoAIRA&page=article&op=view&path%5B%5D=2087
Link text Click here
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Articles Abstract Database
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Barcode Date last seen Price effective from Koha item type
          School of Engineering & Technology School of Engineering & Technology Archieval Section 2019-11-16 2020169 2019-11-16 2019-11-16 Articles Abstract Database
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha