Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Arvindhan, M.
- Clustering Algorithm Networks Test Cost Sensitive for Specialist Divisions
Abstract Views :187 |
PDF Views:0
Authors
Affiliations
1 School of Computing Science and Engineering, Galgotias University, IN
2 Department of Computer Science and Engineering, Malla Reddy Institute of Technology and Science, IN
1 School of Computing Science and Engineering, Galgotias University, IN
2 Department of Computer Science and Engineering, Malla Reddy Institute of Technology and Science, IN
Source
ICTACT Journal on Image and Video Processing, Vol 10, No 2 (2019), Pagination: 2098-2102Abstract
It has been proven that deeper Convolutional Neural Networks (CNN) can result in better accuracy in many problems, but this accuracy comes with a high computational cost. Also, input instances have not the same difficulty. As a solution for accuracy vs. computational cost dilemma, we introduce a new test-cost-sensitive method for convolution neural networks. This method trains a CNN with a set Based on the difficulty of the input instance, the expert branches decide to use a shallower part of the network or go deeper to the end. The expert branches learn to determine: is the current network prediction wrong and if the instance passed to deeper network layers it will generate the right output; if not, then the expert branches will stop the process of computation. The experimental results on the standard CIFAR-10 dataset indicate that in comparison with basic models, the proposed method can train models with lower test cost and competitive accuracy.Keywords
Test-Cost-Sensitive Learning, Deep Learning, CNN with Expert Branches, Instance-Based Cost.References
- S.P.S. Gurjar, S. Gupta and R. Srivastava, “Automatic Image Annotation Model using LSTM Approach”, Signal and Image Processing: An International Journal, Vol. 8, No. 4, pp. 25-37, 2017.
- S. Maity, M. Abdel-Mottaleb and S.S. Asfour, “Multimodal Biometrics Recognition from Facial Video via Deep Learning”, Signal and Image Processing: An International Journal, Vol. 8, No. 1, pp. 67-75, 2017.
- K. He, X. Zhang, S. Ren and J. Sun, “Deep Residual Learning for Image Recognition”, Proceedings of International Conference on Computer Vision, pp. 1-9, 2015.
- D. Kadam, A.R. Madane, K. Kutty and B.S.V. Bonde, “Rain Streaks Elimination Using Image Processing Algorithms”, Signal and Image Processing: An International Journal, Vol. 10, No. 3, pp. 21-32, 2019.
- A. Massaro, V. Vitti and A. Galiano, “Automatic Image Processing Engine Oriented on Quality Control of Electronic Boards”, Signal and Image Processing: An International Journal, Vol. 9, No. 2, pp. 1-14, 2018.
- X. Li, Z. Liu, P. Luo, C. Change Loy and X. Tang, “Not All Pixels Are Equal: Difficulty-Aware Semantic Segmentation via Deep Layer Cascade”, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 3193-3202, 2017.
- M. Naghibi, R. Anvari, A. Forghani and B. Minaei, “Cost-Sensitive Topical Data Acquisition from the Web”, International Journal of Data Mining and Knowledge Management Process, Vol. 9, No. 3, pp. 39-56, 2019.
- A. Polyak and L. Wolf, “Channel-Level Acceleration of Deep Face Representations”, IEEE Access, Vol. 3, pp. 2163-2175, 2015.
- A. Lavin and S. Gray, “Fast Algorithms for Convolutional Neural Networks”, Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition, pp. 4013-4021, 2016.
- L. J. Ba and R. Caruana, “Do Deep Nets Really Need to be Deep?”, Proceedings of International Conference on Advances in Neural Information Processing Systems, pp. 2654-2662, 2014.
- A. Romero, N. Ballas, S.E. Kahou, A. Chassang, C. Gatta and Y. Bengio, “Fitnets: Hints for Thin Deep Nets”, Proceedings of International Conference on Neural and Evolutionary Computing, pp. 782-789, 2014.
- X. Zhang, J. Zou, K. He and J. Sun, “Accelerating Very Deep Convolutional Networks for Classification and Detection”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 38, No. 1, pp. 1943-1955, 2015.
- E.L. Denton, W. Zaremba, J. Bruna, Y. LeCun and R. Fergus, “Exploiting Linear Structure Within Convolutional Networks for Efficient Evaluation”, Proceedings of 27th International Conference on Neural Information Processing Systems, pp. 1269-1277, 2014.
- M. Jaderberg, A. Vedaldi and A. Zisserman, “Speeding Up Convolutional Neural Networks with Low Rank Expansions”, Proceedings of International Conference on Computer Vision and Pattern Recognition, pp. 1-12, 2014.
- N. Strom, “Sparse Connection and Pruning in Large Dynamic Artificial Neural Networks”, Proceedings of 5th European Conference on Speech Communication and Technology, pp. 1-4, 1997.
- G.E. Hinton, N. Srivastava, A. Krizhevsky, I. Sutskever and R.R. Salakhutdinov, “Improving Neural Networks by Preventing Co-Adaptation of Feature Detectors”, Proceedings of International Conference on Computer Vision and Pattern Recognition, pp. 1-18, 2012.
- N. Vasilache, J. Johnson, M. Mathieu, S. Chintala, S. Piantino and Y. LeCun, “Fast Convolutional Nets with FBFFT: A GPU Performance Evaluation”, Proceedings of International Conference on Learning Representations, pp. 1-17, 2014.
- M. Mathieu, M. Henaff and Y. LeCun, “Fast Training of Convolutional Networks through FFTs”, Proceedings of International Conference on Neural and Evolutionary Computing, pp. 1111-1119, 2013.
- V.N. Murthy, V. Singh, T. Chen, R. Manmatha and D. Comaniciu, “Deep Decision Network for Multi-Class Image Classification”, Proceedings of IEEE conference on Computer Vision and Pattern Recognition, pp. 2240-2248, 2016.
- V. Vanhoucke, A. Senior and M.Z. Mao, “Improving the Speed of Neural Networks on CPUs”, Proceedings of International Workshop on Deep Learning and Unsupervised Feature Learning, pp. 1-8, 2011.
- A. Toshev and C. Szegedy, “Deeppose: Human Pose Estimation via Deep Neural Networks”, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 1653-1660, 2014.
- A. Krizhevsky and G. Hinton, “Learning Multiple Layers of Features from Tiny Images”, Technical Report, University of Toronto, pp. 1-65, 2009.
- C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens and Z. Wojna, “Rethinking the Inception Architecture for Computer Vision”, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818-2826, 2016.
- Data Mining Approach and Security Over DDOS Attacks
Abstract Views :148 |
PDF Views:0
Authors
Affiliations
1 School of Computing Science and Engineering, Galgotias University, IN
2 Department of Computer Science, Gambella University, IN
1 School of Computing Science and Engineering, Galgotias University, IN
2 Department of Computer Science, Gambella University, IN
Source
ICTACT Journal on Soft Computing, Vol 10, No 2 (2020), Pagination: 2061-2065Abstract
The benefit of on-demand services is one of the most important benefits of using cloud computing; therefore, the payment method in the cloud environment is pay per use. This feature results in a new type of DDOS attack called Economic Denial of Sustainability (EDoS), where as a result of the attack the customer pays the cloud provider extra. Similar to other DDoS attacks, EDoS attacks are divided into different groups, such as bandwidth-consuming attacks, specific target attacks, and connections-layer-exhaustion attacks. In this study, we propose a novel system for detecting different types of EDoS attacks by developing a pro le that learns from normal and abnormal behaviors and classifies them. In this sense, the extra demanding resources are allocated only to VMs that are found to be in a normal situation and thus prevent attack and resource dissemination from the cloud environment.Keywords
DDoS Attacks, EDoS Attacks, Cloud Computing, Machine Learning Detection.References
- B.R. Kandukuri, V.R. Paturi and A. Rakshit, “Cloud Security Issues, in: Services Computing”, Proceedings of IEEE International Conference on Services Computing, 2009, pp. 517-520, 2009.
- L.M. Kaufman, “Can Public-Cloud Security meet its Unique Challenges?”, IEEE Security and Privacy, Vol. 4, No. 8, pp. 55-57, 2010.
- W. Xing, E.P.R. Guo and S. Goggins, “Participation-Based Student Final Performance Prediction Model through interpretable Genetic Programming: Integrating Learning Analytics, Educational Data Mining and Theory”, Computers in Human Behavior, Vol. 47, pp. 168-181, 2015.
- Q. Yan, R. Yu, Q. Gong and J. Li, “Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges”, IEEE Communications Surveys and Tutorials, Vol. 18, No. 1, pp. 602-622, 2015.
- G. Somani, M.S. Gaur, D. Sanghi, M. Conti, “DDoS Attacks in Cloud Computing: Collateral Damage to Non-Targets”, Computer Networks, Vol. 109, No. 2, pp. 157-171, 2016.
- A. Badr and A. William, “Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments”, Springer, 2017.
- L. Feinstein, D. Schnackenberg, R. Balupari and D. Kindred, “Statistical Approaches to DDoS Attack Detection and Response”, Proceedings of IEEE International Conference on Information Survivability Conference and Exposition, pp. 303-314, 2003.
- K. Bunkar, U.K. Singh, B. Pandya and R. Bunkar, “Data Mining: Prediction for Performance Improvement of Graduate Students using Classification”, Proceedings of IEEE International Conference on Wireless and Optical Communications Networks, pp. 20-27, 2012.
- A. Keramati, R.J. Marandi, M. Aliannejadi, I. Ahmadian, M. Mozaffari and U. Abbasi, “Improved Churn Prediction in Telecommunication Industry using Data Mining Techniques”, Applied Soft Computing, Vol. 24, pp. 994-1012, 2014.
- L.P. Macfadyen and S. Dawson. “Mining LMS Data to Develop an “Early Warning System” for Educators: A Proof of Concept”, Computers and Education, Vol. 54, No. 2, pp. 588-599, 2010.
- Xutao Zhao, “Study on DDoS Attacks based on DPDK in Cloud Computing”, Proceedings of 3rd IEEE International Conference on Computational Intelligence and Communication Technology, pp. 1-5, 2017.
- S. Aqeel, L. David, L. Yan and D. Mohammed, “An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment”, IEEE Access, Vol. 5, pp. 6036-6048, 2017.
- G. Somani, M.S. Gaur, D. Sanghi, M. Conti and R. Buyya, “DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions”, Computer Communications, Vol. 107, pp. 30-48, 2017.
- B.B. Gupta and O.P. Badve, “Taxonomy of DoS and DDoS Attacks and Desirable Defense Mechanism in a Cloud Computing Environment”, Neural Computing and Applications, Vol. 28, pp. 3655-3682, 2017.
- N. Agrawal and S. Tapaswi, “Defense Schemes for Variants of Distributed Denial-of-Service (DDoS) Attacks in Cloud Computing: A Survey”, Information Security Journal: A Global Perspective, Vol. 26, No. 2, pp. 1-13, 2017.
- A. Rukavitsyn, K. Borisenko and A.Shorov, “Self-Learning Method for DDoS Detection Model in Cloud Computing”, Proceedings of IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, pp. 1-6, 2017.
- S.M. Himadri, H.M.D. Tariq, H.M.D. Bellal, R.M. Ekhlasur and R. Hasan, “Enhancing Secure Cloud Computing Environment by Detecting DDoS Attack using Fuzzy Logic”, Proceedings of International Conference on Electrical Information and Communication Technology, pp. 7-9, 2017.
- R. Kesavamoorthy and K.R. Soundar, “Swarm Intelligence based Autonomous DDoS Attack Detection and Defense using Multi Agent System”, Springer, 2018.
- W. Alosaimi and K.A. Begain, “A New Method to Mitigate the Impacts of the Economical Denial of Sustainability Attacks against the Cloud”, Proceedings of 14th Annual Post Graduates Symposium on the Convergence of Telecommunication, Networking and Broadcasting, pp. 116-121, 2013.
- H. Wang, Q. Jia, D. Fleck, W. Powell, F. Li and A. Stavrou, “A Moving Target DDoS Defense Mechanism”, Computer Communications, Vol. 46, pp. 10-21, 2014.
- T. Karnwal, T. Sivakumar and G. Aghila, “A Comber Approach to Protect Cloud Computing against XML DDoS and HTTP DDoS Attack”, Proceedings of International Conference on Electrical, Electronics and Computer Science, pp. 1-5, 2012.
- T. Anderson, T. Roscoe and D. Wetherall, “Preventing Internet Denial-of-Service with Capabilities”, Proceedings of ACM International Conference on Computer Communications, pp. 39-44, 2004.
- M. Masood, Z. Anwar, S.A. Raza and M.A. Hur, “EDoS Armor: A Cost Effective Economic Denial of Sustainability Attack Mitigation Framework for E-Commerce Applications in Cloud Environments”, Proceedings of 16th IEEE International Conference on Multi Topic, pp. 37-42, 2013.
- Q. Jia, H. Wang, D. Fleck, F. Li, A. Stavrou and W. Powell, “Catch Me If You can: A Cloud-Enabled DDoS Defense”, Proceedings of IEEE International Conference on Dependable Systems and Networks, pp. 264-275, 2014.
- Q. Chen, W. Lin, W. Dou and S. Yu, “CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment”, Proceedings of IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 427-434, 2011.