Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/512737
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | ||
dc.date.accessioned | 2023-09-19T12:16:57Z | - |
dc.date.available | 2023-09-19T12:16:57Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/512737 | - |
dc.description.abstract | Internet has become more powerful and easy tool to accesses the newlinetechnical resource in today s world market. Internet has become newlineindispensable in many fields, including commerce, education, and newlinebiology. Nearly all aspects of people s everyday lives have been newlinepositively impacted by the internet throughout the past three decades. newlineMost number of applications from all the field is depends on internet. newlineAs far as the application grows and usage of the internet has also rapidly newlineincreased. At the same time the challenges faced from the usage of newlineinternet has also become an issue in terms of its usage. The main two newlinechallenging factors of internet are security and privacy. The multiple newlinesecurity characteristics of secrecy, authenticity, as well as reliability newlinemust be protected at all times while operating computer and network newlinesystems. Many hackers and third parties are involved in stealing the data newlineand to hack the information carried through various networks. This has newlinebecome major focusing area for the researchers to sort these issues for newlinethe users depending on network. To predict the third parties or the newlineunauthorized users on the networks an approach has been introduced newlinewhich is named as and#8213;Intruder Detection Systemand#8214; (IDS). IDS are newlinefundamentally worked for dynamic assaults. The three primary security newlinesystems embraced to manage such goes after are counteraction, newlinediscovery, and relief. In the first place, the anticipation procedure newlinepermits no gate crasher to illicitly enter the framework and access it. newlineBotnet is another type of malicious code which operates or controls the newlinenetwork without the knowledge of the users. newlinevi newlineThe security is the major and important concern in cloud newlinenetworking environment. Most of the security threats in cloud are based newlineon the bots in cloud networking. Hence, detection and mitigation of bots newlinein cloud is vital in cloud networking in-order to improve the newlineperformance of the networking. The current research will provide new newlineapps which will help in the detection of the presence of the botnets and newlinewill help | |
dc.format.extent | iv, 174 | |
dc.language | English | |
dc.relation | ||
dc.rights | university | |
dc.title | Development of an effective and Scalable machine learning based Botnet prediction and detection Mechanism in network traffic | |
dc.title.alternative | ||
dc.creator.researcher | PADMAVATHI B | |
dc.subject.keyword | Computer Science Artificial Intelligence | |
dc.subject.keyword | Engineering and Technology | |
dc.description.note | ||
dc.contributor.guide | Muthukumar, B | |
dc.publisher.place | Chennai | |
dc.publisher.university | Sathyabama Institute of Science and Technology | |
dc.publisher.institution | COMPUTER SCIENCE DEPARTMENT | |
dc.date.registered | 2016 | |
dc.date.completed | 2022 | |
dc.date.awarded | 2023 | |
dc.format.dimensions | A5 | |
dc.format.accompanyingmaterial | DVD | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | COMPUTER SCIENCE DEPARTMENT |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
10.chapter 6.pdf | Attached File | 198.2 kB | Adobe PDF | View/Open |
11.annexure.pdf | 4.27 MB | Adobe PDF | View/Open | |
1.title.pdf | 131.82 kB | Adobe PDF | View/Open | |
2.prelim pages.pdf | 650.66 kB | Adobe PDF | View/Open | |
3.abstract.pdf | 132.11 kB | Adobe PDF | View/Open | |
4.contents.pdf | 325.37 kB | Adobe PDF | View/Open | |
5.chapter 1.pdf | 746.06 kB | Adobe PDF | View/Open | |
6.chapter 2.pdf | 354.56 kB | Adobe PDF | View/Open | |
7.chapter 3.pdf | 612.69 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 131.82 kB | Adobe PDF | View/Open | |
8.chapter 4.pdf | 604.33 kB | Adobe PDF | View/Open | |
9.chapter 5.pdf | 566.91 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: