Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/543748
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2024-02-02T12:55:09Z-
dc.date.available2024-02-02T12:55:09Z-
dc.identifier.urihttp://hdl.handle.net/10603/543748-
dc.description.abstractMalicious code development greatly hinders the creation of Intrusion Detection Sys- newlinetems (IDS). Because malware developers utilize various information-concealing eva- newlinesion tactics to resist identification by an intrusion detection system, these attacks be- newlinecome complicated, making it particularly hard to recognize obfuscated and unknown newlinemalware. When it comes to cyber security, an IDS is essential for spotting harmful newlineactions in network traffic. Nonetheless, the disparity in class sizes has led to a diffi- newlinecult problem where there are more students in some classes than others. Traditional newlineclassifiers, therefore, struggle to categorize malicious activity and have little resistance against unidentified bugs. newlineThe first paper suggests using an Imbalanced Generative Adversarial Network(IGAN) newlineto increase the efficiency of class discrimination while addressing the issue of class imbalance. We standardized the raw data and used one-hot encoding during data Pre- newlineprocessing to reduce the impact of extreme values and outliers on the overall results. newlineLong Short-Term Memory(LSTM) and Lenet 5 are utilized as an ensemble to categorize newlineevents that are deemed anomalous into different attack categories. The outcomes of the inquiry demonstrate that the proposed strategy works higher than the other deep learning techniques, reaching better precision, accuracy, recall, F1-score, TPR, and FPR. newlineThe statistics showed that the recommended approach valued performance measures newlinesignificantly more than competing methods. In comparison to existing classifiers, the newlineproposed methodology is found to classify different attacks with an accuracy of above newline98%. newlineOur second approach, the Attention-based Nested U-Net (ANU-Net), utilizes deep newlinelearning techniques to address these issues and enhance the performance of intrusion newlinedetection. The initial data preprocessing for this IDS model is completed in three steps: newlineduplication removal, label transformation, and data normalization. The features are newlinesubsequently retrieved and chosen in accordance with th
dc.format.extentxiii,104
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleAn Efficient and Intelligent Deep Learning Techniques for Detection and Classification of Intrusion Detection System in Class Imbalance Datasets
dc.title.alternative
dc.creator.researcherSuresh Babu, Kunda
dc.subject.keywordattack classification
dc.subject.keyworddeep learning
dc.subject.keywordIntrusion Detection System(IDS
dc.description.note
dc.contributor.guideNarasimha Rao, Y
dc.publisher.placeAmaravati
dc.publisher.universityVellore Institute of Technology (VIT-AP)
dc.publisher.institutionDepartment of Computer Science and Engineering
dc.date.registered2020
dc.date.completed2023
dc.date.awarded2023
dc.format.dimensions29x19
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File148.91 kBAdobe PDFView/Open
02_preliminaries.pdf171.25 kBAdobe PDFView/Open
03_contents.pdf48.49 kBAdobe PDFView/Open
04_abstract.pdf61.14 kBAdobe PDFView/Open
05_chapter-1.pdf483.14 kBAdobe PDFView/Open
06_chapter-2.pdf102.55 kBAdobe PDFView/Open
07_chapter-3.pdf1.09 MBAdobe PDFView/Open
08_chapter-4.pdf862.1 kBAdobe PDFView/Open
09_chapter-5.pdf485.9 kBAdobe PDFView/Open
80_recommendation.pdf45.48 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: