Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/481288
Title: | Performance evaluation of Malicious traffic classification Using deep learning technique in Wireless networks |
Researcher: | Naresh Kumar Thapa, K |
Guide(s): | Durai Pandian, N |
Keywords: | Engineering and Technology Computer Science Computer Science Information Systems Malicious Traffic Classification using Deep Learning Technique Wireless Networks |
University: | Anna University |
Completed Date: | 2022 |
Abstract: | Modern day Ransomwares are more sophisticated and the malware writers are evolving with new and advanced tools to evade the present security systems. Recently there was a huge impact in the business and financial loss due to the disruptive malware variant called Ransomware. The existing security mechanism available in the market are not up to the mark to defend against these attacks. Usually Ransomware is a malicious application, which needs a solid key derived from the external malicious server to initiate the encryption process. Restricting the communication to the external malicious server can prevent the hosts without any damage because the ransomware needs the unique key to proceed with the encryption. Traffic analysis plays the most important role in validating the performance and protection of the whole network traffic. Traffic analysis also plays a prime role in malware traffic detection. As the congestion of network traffic is increasing day by day, network traffic analysis need to be practiced periodically for ensuring and enhancing security. newlineMalicious traffic classification is the initial and primary step for any network-based security systems. These traffic classification systems include behavior-based anomaly detection system and Intrusion Detection System. The existing methods rely on the conventional techniques and process the data in the fixed sequence, which may lead to performance issues. Furthermore, conventional techniques require proper annotation to process the volumetric data. Relying on the data annotation for efficient traffic classification may leads to network loops and bandwidth issues within the network. newline newline |
Pagination: | xvi,137p. |
URI: | http://hdl.handle.net/10603/481288 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 25.44 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 3.02 MB | Adobe PDF | View/Open | |
03_content.pdf | 426.67 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 504.81 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 4.38 MB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 5.96 MB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 4.17 MB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 2.78 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 2.54 MB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 743.34 kB | Adobe PDF | View/Open | |
11_annexures.pdf | 9.3 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 850.15 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: