Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/355403
Title: | Intrusion Detection System for Self Configurable Networks |
Researcher: | Mohd. Noor |
Guide(s): | Singh. Annapurna |
Keywords: | Computer Science Computer Science Information Systems Engineering and Technology |
University: | Uttarakhand Technical University |
Completed Date: | 2021 |
Abstract: | This thesis makes four contributions which are described following in order. newline Module 1 is designed to obtain the IDS system based on the bioinspired immune system. The aim of this module is to create a framework that can protect PC systems from infections and other forms of digital attack. The proposed frameworks efficiency is measured in terms of protecting computers from unapproved intruders. newlineModule 2 is designed for an efficient IDS using supervised machine learning. The used machine learning approaches: SVM and kNN are responsible for distinguishing normal data packets from attack data packets using the principal component analysis methodology. Thus the proposed approach is termed PCA kNN. newlineModule 3 is designed for an efficient IDS using SVM. The designed machine learning-based model is tested with kernel functions such as Linear Sigmoidal and Redial functions to improve the accuracy in the results. The proposed solution decreases the effect of a Denial of Service attack, which leads to a Denial of Sleep attack, according to observations. Positive predictive value true positive rate and overall classification accuracy are often used to assess the success of the proposed process. newlineModule 4 proposed a system that utilize SVM, probabilistic neural network Decision Tree NFC smooth SVM and kNN classifiers in a hierarchical manner. To create a hybrid hierarchical classifier, the best performing classifiers at each level are ordered in hierarchical order. Thus, the overall detection ratio is high at each level. newline The thesis overall goal is to improve the security of self configurable networks. Any practical difficulties faced by network administrators are taken into consideration when formulating the objectives. Machine learning based intrusion detection systems are designed and implemented in order to meet the thesis objectives newline newline |
Pagination: | 151 pages |
URI: | http://hdl.handle.net/10603/355403 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
10_chapter-2.pdf | Attached File | 393.13 kB | Adobe PDF | View/Open |
11_chapter-3.pdf | 945.71 kB | Adobe PDF | View/Open | |
12_chapter 4.pdf | 576.35 kB | Adobe PDF | View/Open | |
13_chapter 5.pdf | 496.51 kB | Adobe PDF | View/Open | |
14_chapter 6.pdf | 2.13 MB | Adobe PDF | View/Open | |
15_chapter 7.pdf | 745.69 kB | Adobe PDF | View/Open | |
16_chapter 8.pdf | 16.17 kB | Adobe PDF | View/Open | |
17_references.pdf | 146.42 kB | Adobe PDF | View/Open | |
18_publications.pdf | 93.7 kB | Adobe PDF | View/Open | |
1_title page.pdf | 221.66 kB | Adobe PDF | View/Open | |
2_certificate.pdf | 2.19 MB | Adobe PDF | View/Open | |
3_content.pdf | 333.54 kB | Adobe PDF | View/Open | |
4_list of tables.pdf | 189.6 kB | Adobe PDF | View/Open | |
5_list of figure.pdf | 195.63 kB | Adobe PDF | View/Open | |
6_list of algorithms.pdf | 177.53 kB | Adobe PDF | View/Open | |
7_list of abbreviations.pdf | 263.32 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 348.18 kB | Adobe PDF | View/Open | |
8_acknowledgment.pdf | 180.96 kB | Adobe PDF | View/Open | |
9_chapter-1.pdf | 134.11 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: