Purushottam Patil - Academia.edu (original) (raw)
Uploads
Papers by Purushottam Patil
Network basedIntrusion detection systems(NIDS) ared esigned to identify and prevent the misuse of... more Network basedIntrusion detection systems(NIDS) ared esigned to identify and prevent the misuse of computer networks and systems. Effective and intell gent design approaches of NIDS using Machine Learn ing and Evolutionary computation is major research topic in Network and system security domain. The evolving n etwork security systems need be part of the life system an d this is possible only by entrenching knowledge in to the network.Intrusion detection does not, in general, i nclude prevention of intrusions. Effectiveness, ada ptability and extensibility are the quality measures of NIDS. NID S said more effective when it has high intrusion de tection rate (TP Rate), low false alarm (FP Rate) and area under curve of ROC is 1. In this paper an NIDS haspropos ed an intrusion based on adaptive genetic algorithm with clustering. A clustering algorithm will be used for c eating intrusion and non-intrusion clusters. Adaptive Gene tic Algorithm will be used to generate the perceive d trait...
2009 Second International Conference on Emerging Trends in Engineering & Technology, 2009
AbstractMost Data mining Algorithms and Tools when applied to Industrial problems such as CRM (C... more AbstractMost Data mining Algorithms and Tools when applied to Industrial problems such as CRM (Customer Relationship Management) are useful in pointing out Customers who are likely attritors and customers who are Loyal , but they require human experts to post ...
International journal of health sciences
This system presents an idea of distributing the tasks different processor to balance load in the... more This system presents an idea of distributing the tasks different processor to balance load in the field of parallel computers. Types of algorithms that can be used are static algorithms, which do not take into account the state of the different machines, and dynamic algorithms, which are usually more general and more efficient, but require exchanges of information between the different computing units, at the risk of a loss of efficiency. These algorithms are also suitable for heterogeneous environment more effectively to execute different set of task on different processors with different configurations.
Journal of Big Data, 2020
Computer networks intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) are ... more Computer networks intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) are critical aspects that contribute to the success of an organization. Over the past years, IDSs and IPSs using different approaches have been developed and implemented to ensure that computer networks within enterprises are secure, reliable and available. In this paper, we focus on IDSs that are built using machine learning (ML) techniques. IDSs based on ML methods are effective and accurate in detecting networks attacks. However, the performance of these systems decreases for high dimensional data spaces. Therefore, it is crucial to implement an appropriate feature extraction method that can prune some of the features that do not possess a great impact in the classification process. Moreover, many of the ML based IDSs suffer from an increase in false positive rate and a low detection accuracy when the models are trained on highly imbalanced datasets. In this paper, we present an analysis ...
Governments especially in semi-arid regions of the world designate areas of forests as forest res... more Governments especially in semi-arid regions of the world designate areas of forests as forest reserves to kindle rainfall, reduce wind attrition, stem the tide of logging and halt the infringement of the desert. Therefore, in India and many other countries, forest reserves enjoy judicial and/or constitutional protection under a legal system. After air and water, forests are the next most important resources of nature on earth. They essentially support life on earth by absorbing carbon dioxide and releasing oxygen, thereby maintaining balance in the gaseous atmosphere and also in the completion of the hydrological cycle to cause rainfall. Forests are sources of food, medicine, timber, and many other products. They play protective roles against soil erosion, drought, floods, intense radiation, etc. Forest also performs accessory functions which include the role of forests in recreation, aesthetics and as the habitat of diverse wildlife. The six major operations that are essential in m...
Network basedIntrusion detection systems(NIDS) ared esigned to identify and prevent the misuse of... more Network basedIntrusion detection systems(NIDS) ared esigned to identify and prevent the misuse of computer networks and systems. Effective and intell gent design approaches of NIDS using Machine Learn ing and Evolutionary computation is major research topic in Network and system security domain. The evolving n etwork security systems need be part of the life system an d this is possible only by entrenching knowledge in to the network.Intrusion detection does not, in general, i nclude prevention of intrusions. Effectiveness, ada ptability and extensibility are the quality measures of NIDS. NID S said more effective when it has high intrusion de tection rate (TP Rate), low false alarm (FP Rate) and area under curve of ROC is 1. In this paper an NIDS haspropos ed an intrusion based on adaptive genetic algorithm with clustering. A clustering algorithm will be used for c eating intrusion and non-intrusion clusters. Adaptive Gene tic Algorithm will be used to generate the perceive d trait...
2009 Second International Conference on Emerging Trends in Engineering & Technology, 2009
AbstractMost Data mining Algorithms and Tools when applied to Industrial problems such as CRM (C... more AbstractMost Data mining Algorithms and Tools when applied to Industrial problems such as CRM (Customer Relationship Management) are useful in pointing out Customers who are likely attritors and customers who are Loyal , but they require human experts to post ...
International journal of health sciences
This system presents an idea of distributing the tasks different processor to balance load in the... more This system presents an idea of distributing the tasks different processor to balance load in the field of parallel computers. Types of algorithms that can be used are static algorithms, which do not take into account the state of the different machines, and dynamic algorithms, which are usually more general and more efficient, but require exchanges of information between the different computing units, at the risk of a loss of efficiency. These algorithms are also suitable for heterogeneous environment more effectively to execute different set of task on different processors with different configurations.
Journal of Big Data, 2020
Computer networks intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) are ... more Computer networks intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) are critical aspects that contribute to the success of an organization. Over the past years, IDSs and IPSs using different approaches have been developed and implemented to ensure that computer networks within enterprises are secure, reliable and available. In this paper, we focus on IDSs that are built using machine learning (ML) techniques. IDSs based on ML methods are effective and accurate in detecting networks attacks. However, the performance of these systems decreases for high dimensional data spaces. Therefore, it is crucial to implement an appropriate feature extraction method that can prune some of the features that do not possess a great impact in the classification process. Moreover, many of the ML based IDSs suffer from an increase in false positive rate and a low detection accuracy when the models are trained on highly imbalanced datasets. In this paper, we present an analysis ...
Governments especially in semi-arid regions of the world designate areas of forests as forest res... more Governments especially in semi-arid regions of the world designate areas of forests as forest reserves to kindle rainfall, reduce wind attrition, stem the tide of logging and halt the infringement of the desert. Therefore, in India and many other countries, forest reserves enjoy judicial and/or constitutional protection under a legal system. After air and water, forests are the next most important resources of nature on earth. They essentially support life on earth by absorbing carbon dioxide and releasing oxygen, thereby maintaining balance in the gaseous atmosphere and also in the completion of the hydrological cycle to cause rainfall. Forests are sources of food, medicine, timber, and many other products. They play protective roles against soil erosion, drought, floods, intense radiation, etc. Forest also performs accessory functions which include the role of forests in recreation, aesthetics and as the habitat of diverse wildlife. The six major operations that are essential in m...