Intrusion detection system using Expert system (AI) and Pattern recognition (MFCC and improved VQA)

2014 
This Paper presents the review of Intrusion Detection system using techniques of Expert systems (Artificial Intelligence).With the growing need of computer networking and e-commerce, the security of the web systems are of the major concern . IDS is the one that can be used for monitoring data congestion and also recognizing the user behavior to identify the malicious attacks and also the illegitimate access of intruders..The main aim of IDS is to safeguard the data confidentiality and integrity. Using the AI techniques once the intrusion is detected it can be represented using alerts to the security officer. The term to develops for intrusion detection in relation to border protection, perimeter detection, and similar guarding Home security, banking locker etc. The solutions provide early detection and warning by creating an extended virtual perimeter, thereby increasing the time available to react and ensuring that the correct measures are taken before disaster strikes. The recent MOtion-based Video Integrity Evaluation (MOVIE) index emerges as the leading objective VQA algorithm in our study, while the performance of the Video Quality Metric (VQM) and the Multi-Scale Structural SIMilarity (MS-SSIM) index is noteworthy. The LIVE Video Quality Database is freely available for download 1 and we hope that our study provides researchers with a valuable tool to benchmark and improve the performance of objective VQA algorithms. Mel Frequency Cepstral Coefficents (MFCCs) are a feature widely used in automatic speech and speaker recognition. They were introduced by Davis and Mermelstein in the 1980's, and have been state-of-the-art ever since. Prior to the introduction of MFCCs, Linear Prediction Coefficients (LPCs) and Linear Prediction Cepstral Coefficients (LPCCs) and were the main feature type for automatic speech recognition (ASR). This page will go over the main aspects of MFCCs, why they make a good feature for ASR, and how to implement them . An IDS examines the inbound and outbound activity of the network and also reports if any suspicious pattern is observed.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    12
    References
    3
    Citations
    NaN
    KQI
    []