Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/354889
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2022-01-10T05:26:46Z-
dc.date.available2022-01-10T05:26:46Z-
dc.identifier.urihttp://hdl.handle.net/10603/354889-
dc.description.abstractNetwork Intrusion Detection is an important tool to detect and analyze security threats to a communication network. It complements other network security techniques, such as firewalls, by providing information about the frequency and nature of attacks. A network intrusion detection system (NIDS) often consists of a sensor that analyzes every packet on the network under observation, and forwards the packets which are deemed interesting, together with an alert message to a backend system, that stores them for further analysis and correlation with other events. newlineThis research work has been designed and executed in three phases, namely, protocol structure standardization, generation of cross over and mutation values for device identification using the genetic approach and the modified J48 decision tree algorithm for search process. The performance of the developed algorithms/methods is compared with the existing methods, and found to be good. newlineIn the first phase, the 64 byte structured protocol standardization technique is developed to identify the intruder. The communication process network is monitored using the wire shark tool, with all possible transactions. The packets are captured and converted as an array. The array consists of the frame information, the source IP, destination IP, source MAC address, destination MAC address, protocol type, hardware device type and data. These details are converted by the 64byte protocol structured standardization. This common protocol structure process is identified the required attributes from the same location; so it is required to minimize the search time of the identification of the MAC and IP address from the packets. newlineIn the second phase, the least and most significant 16 bits of MAC address provide the information about the device manufacture and the product. In the genetic iv approach, the cross over and mutation functions are used to detect the intruder device in comparison with the Current Active Directory List (CADL). newlineIn the third phase, the fitness evaluation proc
dc.format.extent
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleAI Techniques Applied To Intrusion Detection System
dc.title.alternative
dc.creator.researcherParameswar, D
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Artificial Intelligence
dc.subject.keywordEngineering and Technology
dc.description.note
dc.contributor.guideKhanaa, V
dc.publisher.placeChennai
dc.publisher.universityBharath University
dc.publisher.institutionDepartment of Engineering and Technology(Computer Science and Engineering)
dc.date.registered
dc.date.completed2021
dc.date.awarded
dc.format.dimensions
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File217.72 kBAdobe PDFView/Open
cert.pdf418.45 kBAdobe PDFView/Open
chapter 1.pdf579.29 kBAdobe PDFView/Open
chapter 2.pdf168.11 kBAdobe PDFView/Open
chapter 3.pdf405.5 kBAdobe PDFView/Open
chapter 4.pdf986.43 kBAdobe PDFView/Open
chapter 5.pdf892.46 kBAdobe PDFView/Open
chapter 6.pdf16.26 kBAdobe PDFView/Open
preliminary pages.pdf318.46 kBAdobe PDFView/Open
title.pdf201.88 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: