Seth Forrest

Learn More
Firewalls are network devices which enforce an organization’s security policy. Since their development, various methods have been used to implement firewalls. These methods filter network traffic at one or more of the seven layers of the ISO network model, most commonly at the application, transport, and network, and data-link levels. In addition,(More)
  • Hemlata Sukhwani, Shwaita Kodesia, +11 authors quotTraceback
  • 2014
Intrusion detection system is a technique of identifying unwanted packets that creates harm in the network; hence various IDS are implemented for the security of network traffic flow. Here in this paper an efficient technique of identifying intrusions is implemented using hidden markov model and then classification of these intrusions is done. The(More)
In learning from demonstration (LfD) a human trainer demonstrates desired behaviors to a robotic agent, creating a training set that the agent can learn from. LfD allows non-programmers to easily and naturally train robotic agents to perform specific tasks. However, to date most LfD has focused on single robot, single trainer paradigms leading to(More)
How to effectively generate detectors is one of the important problems of negative selection algorithm and its practicability. In this paper, a new algorithm which adaptively generates detectors is proposed. This algorithm can regulate current detector set according to actual circumstances, and quickly detect abnormal changes in a very large non-self space(More)
Artificial Immune System (AIS) is a convoluted and complex arrangement derived from biological immune system (BIS). It possesses the abilities of self-adapting, self-learning and self-configuration. It has the basic function to distinguish self and non-self. Negative Selection Algorithm (NSA) over the years has shown to be competent for anomaly detection(More)
  • 1