A User-Centric Machine Learning
A User-Centric Machine Learning
. Reg no - YMC1820026
Project--title
ABSTRACT
ARCHITECTURE:
EXISTING SYSTEM:
Most approaches to security in the enterprise have focused on protecting the
network infrastructure with no or little attention to end users. As a result,
traditional security functions and associated devices, such as firewalls and
intrusion detection and prevention devices, deal mainly with network level
protection. Although still part of the overall security story, such an approach has
limitations in light of the new security challenges described in the previous section.
DISADVANTAGE:
ADVANTAGES:
CYBER ANALYSIS
DATASET MODIFICATION
DATA REDUCTION
ALGORITHM:
SUPPORT VECTOR MACHINE (SVM)
“Support Vector Machine” (SVM) is a supervised machine learning
algorithm which can be used for both classification or regression challenges.
However, it is mostly used in classification problems. In this algorithm, we plot
each data item as a point in n-dimensional space (where n is number of features
you have) with the value of each feature being the value of a particular coordinate.
Then, we perform classification by finding the hyper-plane that differentiate the
two classes very well (look at the below snapshot). The SVM algorithm is
implemented in practice using a kernel. The learning of the hyperplane in linear
SVM is done by transforming the problem using some linear algebra, which is out
of the scope of this introduction to SVM. A powerful insight is that the linear SVM
can be rephrased using the inner product of any two given observations, rather than
the observations themselves. The inner product between two vectors is the sum of
the multiplication of each pair of input values. For example, the inner product of
the vectors [2, 3] and [5, 6] is 2*5 + 3*6 or 28. The equation for making a
prediction for a new input using the dot product between the input (x) and each
support vector (xi) is calculated as follows:
REQUIREMENT ANALYSIS
The project involved analyzing the design of few applications so as to make
the application more users friendly. To do so, it was really important to keep the
navigations from one screen to the other well ordered and at the same time
reducing the amount of typing the user needs to do. In order to make the
application more accessible, the browser version had to be chosen so that it is
compatible with most of the Browsers.
REQUIREMENT SPECIFICATION
Functional Requirements
Software Requirements
For developing the application the following are the Software Requirements:
1. Python
2. Django
3. MySql
4. MySqlclient
5. WampServer 2.4
1. Windows 7
2. Windows XP
3. Windows 8
1. Python
Hardware Requirements
For developing the application the following are the Hardware Requirements:
CONCLUSION
We provide a user-centered computer learning system that affects large data
from various security logs, awareness information, and inspector intelligence. This
method provides complete configuration and solution for dangerous user detection
for the Enterprise System Operating Center. Select machine learning methods in
the SOC product environment, evaluate efficiency, IO, host and users to create
user-centric features. . Even with simple mechanical learning algorithms, we prove
that the learning system can understand more insights from the rankings with the
most unbalanced and limited labels. More than 20% of the neurological model of
modeling is 5 times that of the current rule-based system. To improve the detection
precision situation, we will examine other learning methods to improve the data
acquisition, daily model renewal, real time estimate, fully enhance and
organizational risk detection and management. As for future work, let's examine
other learning methods to improve detection accuracy