Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/535457
Title: Efficient Intrusion Detection System Using Enhanced MLP and Optimized MLP Heuristic Approach
Researcher: SATHYENDRA KUMAR,V
Guide(s): Muthukumaravel,A
Keywords: Computer Science
Computer Science Interdisciplinary Applications
Engineering and Technology
University: Bharath Institute of Higher Education and Research
Completed Date: 2023
Abstract: newline A network contains three main components like system, hardware, and software. As the field of the internet has widened its wings among all the areas of the global market, it is very much significant to ensure the security of the network from being infringed by intruders. The new security difficulties and risks happen daily in the cloud framework. Most of the prevailing IDS and IPS are constructed to look after various types of threats. Though these systems address the problem of network security, there is no single system to authenticate the security of systems from future threats. With the growing demand for anomaly-based IDSs, numerous strategies and programs are deliberated to track the newly rising assaults on network systems. The main goal of IDPs was to recognize any type of incidents that occur in the system. The IPS could change the basic configuration of any other security system to deny an attack. An IDPS system helps in monitoring a single unit or a network for malicious activities or suspicious behaviors and leads to a remedial action against it. Every IDS system can be designed at any place in the network to perform the sole work of identifying anomaly ventures. IDPs methodologies make use of different techniques to detect threats. Anomaly identification approaches are framed concerning the creation of a behavior profile executed in the system for consistent updating. A wireless IDPS observes the traffic in the wireless network and investigates the wireless networking protocols to identify the suspicious activities indulged in the protocols. Now a day, the number of methods has become very popular which leads to confusion in choosing the apt methodology that deploys to secure the system. The stored data are exposed to cyber-attack and security threats and face difficulty in reliability. Due to the nature of the network, security has become a threat to employing a wireless network. There exist different kinds of IDPS techniques, that are segregated initially based on the types of events
Pagination: 
URI: http://hdl.handle.net/10603/535457
Appears in Departments:Department of Computer Application

Files in This Item:
File Description SizeFormat 
01-title.pdfAttached File222.25 kBAdobe PDFView/Open
02-prilim pages.pdf1.71 MBAdobe PDFView/Open
03_content.pdf81.22 kBAdobe PDFView/Open
04-abstract.pdf83.98 kBAdobe PDFView/Open
05-chapter 1.pdf2.08 MBAdobe PDFView/Open
06-chapter 2.pdf2.08 MBAdobe PDFView/Open
07-chapter 3.pdf2.08 MBAdobe PDFView/Open
08-chapter 4.pdf2.08 MBAdobe PDFView/Open
09-chapter 5.pdf2.08 MBAdobe PDFView/Open
10-chapter 6.pdf2.08 MBAdobe PDFView/Open
11_chapter 7.pdf169.97 kBAdobe PDFView/Open
12_annexures.pdf390.99 kBAdobe PDFView/Open
80_recommendation.pdf286.37 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: