Yasir Hamid

Yasir Hamid
Pondicherry Engineering College · Department of Computer Science Engineering

9.38
 · 
Pursuing Ph.D
About
43
Research items
13,040
Reads
35
Citations
Education
Feb 2015 - Feb 2018
Pondicherry Engineering College
Field of study
  • Computer Science and Engineering
Jun 2011 - Jun 2014
University of Kashmir
Field of study
  • Computer Science and Applications
Dec 2008 - Dec 2011
University of Kashmir
Field of study
  • Computer Applications
Network
Cited By
Followers
Following
Research
Research items (43)
Article
Full-text available
Network Intrusion Detection is the process of analyzing the network traffic so as to unearth any unsafe and possibly disastrous exchanges happening over the network. In the nature of guaranteeing the confidentiality, availability, and integrity of any networking system, the accurate and speedy classification of the transactions becomes indispensabl...
Article
Data envelopment analysis (DEA) is non-parametric linear programming (LP) based technique for estimating the relative efficiency of different decision making units (DMUs) assessing the homogeneous type of multiple-inputs and multiple-outputs. The procedure does not require a priori knowledge of weights, while the main concern of this non-parametric...
Article
Full-text available
Network Intrusion Detection is the process of monitoring the events occurring in a computer system or the network and analyzing them for the signs of possible intrusions. An intrusion is a potentially harmful activity of malicious user, aimed at compromising the confidentiality, availability and integrity of the system. Over the decades intrusion d...
Article
Full-text available
As usage of computer grows hastily, masses of data have been generated in almost all the fields and security also becomes the most important need to protect the data and network. The generated data is extremely large and it is very difficult to extract knowledge from it. Feature Selection (FS) is a perpetual method used to select the efficient and...
Article
Full-text available
As Internet access widens, IDS (Intrusion Detection System) is becoming a very important component of network security to prevent unauthorized use and misuse of data. An IDS routinely handles massive amounts of data traffic that contain redundant and irrelevant features, which impact the performance of the IDS negatively. Feature selection methods...
Question
Intrusion Detection
Network Security
Pattern Recognition
Machine Learning
Article
Full-text available
Network Intrusion Detection is a complex classification problem aimed at discriminating the legitimate from illegitimate and potentially harmful network connections over the communication network. What adds to the complexity of the problem is the near real-time response to a threat, imbalanced datasets to deal with and finally the data being mixed...
Article
Full-text available
Recognizing intrusions quickly and precisely is vital to the proficient operation of computer networks. Precisely describing critical classes of intrusions extraordinarily encourages their recognizable proof; be that as it may, the nuances and complexities of anomalous activities can without much of a stretch complicate the procedure. Due to the in...
Conference Paper
Full-text available
Network intrusion detection (NID) is a complex classification problem. In this paper, we combine classification with recent and scalable nonlinear dimensionality reduction (NLDR) methods. Classification and DR are not necessarily adversarial, provided adequate cluster magnification occurring in NLDR methods like t-SNE: DR mitigates the curse of dim...
Research
Data envelopment analysis (DEA) is non-parametric linear programming (LP) based technique for estimating the relative efficiency of different decision making units (DMUs) assessing the homogeneous type of multiple-inputs and multiple-outputs. The procedure does not require a priori knowledge of weights, while the main concern of this non-parametric...
Article
Full-text available
Data envelopment analysis (DEA) is non-parametric linear programming (LP) based technique for estimating the relative efficiency of different decision making units (DMUs) assessing the homogeneous type of multiple-inputs and multiple-outputs. The procedure does not require a priori knowledge of weights, while the main concern of this non-parametric...
Article
Full-text available
Data envelopment analysis (DEA) is non-parametric linear programming (LP) based technique for estimating the relative efficiency of different decision making units (DMUs) assessing the homogeneous type of multiple-inputs and multiple-outputs. The procedure does not require a priori knowledge of weights, while the main concern of this non-parametric...
Question
Map Reduce
Hadoop and Big Data
Article
Full-text available
With varied and widespread attacks on information systems, intrusion detection systems (IDS) have become an indispensable part of security policy for protecting data. IDS monitor event logs and network traffic to uncover suspicious connections that deviate from the regular profile and identify them as threats or attacks. Like most of the cases the...
Article
Full-text available
With varied and widespread attacks on information systems, intrusion detection systems (IDS) have become an indispensable part of security policy for protecting data. IDS monitor event logs and network traffic to uncover suspicious connections that deviate from the regular profile and identify them as threats or attacks. Like most of the cases the...
Conference Paper
Full-text available
With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance...
Question
Real-time Internet Traffic Classification
Answer
I have used ANN, If you have any query ASK here, maybe I could help
Yasir
Article
Full-text available
The prosperity of technology worldwide has made the concerns of security tend to increase rapidly. The enormous usage of Internetworking has raised the need of protecting systems as well as networks from the unauthorized access or intrusion. An intrusion is an activity of breaking into the system by compromising the security policies, and the proce...
Answer
@Andreas Theissler  Sir, Thanks for your reply. I will try considering your suggestions, one problem with my dataset is that it consists of some 23 classes and I want to consider them all.Thanks for the links you shared I will get through these papers.
@Gino Tesei  Sir, Thanks for your reply,  well the weighed approaches seems to be better, do you have any idea about which classifier takes into consideration the weights of classes.
@Ahmed Aljaaf Sir, Thanks for your reply. Can you suggest me some tools for oversampling or undersampling of data, or I need to do it manually?? 
Data
In this version of the dataset, I have converted nominal features of KDD'99 Dataset for intrusion detection into numerical values.
Answer
Thank You Magdalena Tkacz  Mam for your reply,
No Actually I didn't try that........
Answer
By lazy classifiers I mean instance based classifiers like k-nn
Answer
That's wonderful Sir, but what confuses is that for evaluating lazy classifiers should we go for K-fold or Percentage split
Question
Machine Learning, Weka, Soft Computing
Answer
Ludovic Journaux ... Thank You Sir
The links you had shared were really helpful... yes my dataset has some 100 dimensions
Jabar H. Yousif : Thank You Sir for your time,I am actually using 10 fold cross validation .
Nils Goerke: Thank You Sir for commenting....Actually I am using weka tool and I have not tuned any parameter. My dataset has some 4 lakh records, each record of about 100 dimensions. here I am attaching the screen shot so that you can better find out if there is some problem with setting the parameters...
Question
Trying to train Neural Network on a mighty dataset, already taken 48 hours but yet to settle down...any idea about what could be the possible reason?
Machine Learning
Neural Networks
Weka
Answer
@Fabrice Clerot.... Thanks for your valuable comments...well you are right, I am actually trying to implement some or all the machine learning algorithms on the benchmark dataset, yes I am trying to do a comparative analysis on the machine learning techniques on my dataset I believe that this would give me some insight about which to choose and stick to for my problem..
@Alberto Muñoz.....Thanks surely I will give it a read....I also have some problem in mind for which I want to transform n-dimensional data into some distance measure and use it for classification
@Ritesh Kasat......Thanks for your suggestions, surely I will give it a try..
Answer
That's fine Sir, but this turns the dataset into a sparse matrix...is there no better approach Sir??
Answer
About the problem its a classifiaction one and I am planning to do a comparative anysis of most of the algorthims available over some dataset...
Answer
Thank you Sir :)
First option I already tried but it is increases the dataset as my nominal attributes have lots of categories about the second I am not sure, I will go through it and get back to you asap
Answer
Thanks Mukesh M Goswami, your idea is good enough, but I guess I am looking for something else