A New Clustering Approach for Anomaly Intrusion Detection
DOI:
https://doi.org/10.32628/IJSRST52310667Keywords:
AI, Handling, Cancer Detection, AI psychotherapistsAbstract
This study looks into the possibilities and related challenges of using artificial intelligence (AI) to identify cancer. AI technologies have become attractive tools in oncology because of the growing complexity of medical data and the need for precise and timely cancer diagnosis. In reviewing the state of AI applications for cancer detection today, the paper focuses on biomarker analysis, medical imaging, and biomarker analysis. Additionally continuing conversation on how to use technology to improve cancer diagnostics' efficiency and accuracy while maintaining ethical norms and patient safety.
References
- J. Anderson, “Computer security threat monitoring and surveillance”, 1980.
- Dorothy E. Denning, “An intrusion-detection model”, IEEE Transactions on software engineering, pp. 222–232, 1987.
- Kemmerer, R., and Vigna, G. “Intrusion Detection: A Brief History and Overview.” IEEE Security & Privacy, v1 n1, Apr 2002, p27-30.
- S. Staniford-Chen, S. Cheung, R. Crawford., M. Dilger, J. Frank, J. Hoagland, K. Levitt, C.Wee, R. Yip, D. Zerkle . “GrIDS- A Graph-Based Intrusion Detection system for Large Networks.” Proc National Information Systems Security conf, 1996.
- M.Jianliang, S.Haikun and B.Ling. The Application on Intrusion Detection based on K- Means Cluster Algorithm. International Forum on Information Technology and Application, 2009.
- Yu Guan, Ali A. Ghorbani and Nabil Belacel. Y-means: a clustering method for Intrusion Detection. In Canadian Conference on Electrical and Computer Engineering, pages 14, Montral, Qubec, Canada, May 2003.
- Zhou Mingqiang, HuangHui, WangQian, “A Graph-based Clustering Algorithm for Anomaly Intrusion Detection” In computer science and education (ICCSE), 7th International Conference ,2012.
- Chitrakar, R. and Huang Chuanhe, “Anomaly detection using Support Vector Machine Classification with K-Medoids clustering” In Internet (AH-ICI), 3rd Asian Himalayas International conference, 2012.
- Yang Jian, “An Improved Intrusion Detection Algorithm Based on DBSCAN”, Micro Computer Information, 25,1008-0570(2009)01- 3- 0058-03, 58-60,2009.
- Li Xue-yong, Gao Guo- “A New Intrusion Detection Method Based on Improved DBSCAN”, In Information Engineering (ICIE), WASE International conference, 2010.
- Lei Li, De-Zhang, Fang-Cheng Shen, “ A novel rule-based Intrusion Detection System using data mining”, In ICCSIT, IEEE International conference, 2010.
- Z. Muda, W. Yassin, M.N. Sulaiman and N.I.Udzir, “Intrusion Detection based on K-Means Clustering and OneR Classification” In Information Assurance and Security (IAS), 7th International conference, 2011.
- Zhengjie Li, Yongzhong Li, Lei Xu, “Anomaly intrusion detection method based on K-means clustering algorithm with particle swarm optimization”, In ICM, 2011.
- Kapil Wankhade, Sadia Patka, Ravindra Thool, “An Overview of Intrusion Detection Based on Data Mining Techniques”, In Proceedings of 2013 International Conference on Communication Systems and Network Technologies, IEEE, 2013, pp.626-629.
- H. Fatma, L. Mohamed, “A two-stage technique to improve intrusion detection systems based on data mining algorithms”, In ICMSAO, 2013.
- A.M. Chandrasekhar, K. Raghuveer, “Intrusion detection technique by using K-means,fuzzy neural network and SVM classifiers”, In ICCCI, 2013.
- Margaret H. Dunham, “Data Mining: Introductory and Advanced Topics”,ISBN: 0130888923, published by Pearson Education, Inc.,2003.
- KDD.KDDCup1999Data.http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, 1999.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.