Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/543748
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | ||
dc.date.accessioned | 2024-02-02T12:55:09Z | - |
dc.date.available | 2024-02-02T12:55:09Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/543748 | - |
dc.description.abstract | Malicious code development greatly hinders the creation of Intrusion Detection Sys- newlinetems (IDS). Because malware developers utilize various information-concealing eva- newlinesion tactics to resist identification by an intrusion detection system, these attacks be- newlinecome complicated, making it particularly hard to recognize obfuscated and unknown newlinemalware. When it comes to cyber security, an IDS is essential for spotting harmful newlineactions in network traffic. Nonetheless, the disparity in class sizes has led to a diffi- newlinecult problem where there are more students in some classes than others. Traditional newlineclassifiers, therefore, struggle to categorize malicious activity and have little resistance against unidentified bugs. newlineThe first paper suggests using an Imbalanced Generative Adversarial Network(IGAN) newlineto increase the efficiency of class discrimination while addressing the issue of class imbalance. We standardized the raw data and used one-hot encoding during data Pre- newlineprocessing to reduce the impact of extreme values and outliers on the overall results. newlineLong Short-Term Memory(LSTM) and Lenet 5 are utilized as an ensemble to categorize newlineevents that are deemed anomalous into different attack categories. The outcomes of the inquiry demonstrate that the proposed strategy works higher than the other deep learning techniques, reaching better precision, accuracy, recall, F1-score, TPR, and FPR. newlineThe statistics showed that the recommended approach valued performance measures newlinesignificantly more than competing methods. In comparison to existing classifiers, the newlineproposed methodology is found to classify different attacks with an accuracy of above newline98%. newlineOur second approach, the Attention-based Nested U-Net (ANU-Net), utilizes deep newlinelearning techniques to address these issues and enhance the performance of intrusion newlinedetection. The initial data preprocessing for this IDS model is completed in three steps: newlineduplication removal, label transformation, and data normalization. The features are newlinesubsequently retrieved and chosen in accordance with th | |
dc.format.extent | xiii,104 | |
dc.language | English | |
dc.relation | ||
dc.rights | university | |
dc.title | An Efficient and Intelligent Deep Learning Techniques for Detection and Classification of Intrusion Detection System in Class Imbalance Datasets | |
dc.title.alternative | ||
dc.creator.researcher | Suresh Babu, Kunda | |
dc.subject.keyword | attack classification | |
dc.subject.keyword | deep learning | |
dc.subject.keyword | Intrusion Detection System(IDS | |
dc.description.note | ||
dc.contributor.guide | Narasimha Rao, Y | |
dc.publisher.place | Amaravati | |
dc.publisher.university | Vellore Institute of Technology (VIT-AP) | |
dc.publisher.institution | Department of Computer Science and Engineering | |
dc.date.registered | 2020 | |
dc.date.completed | 2023 | |
dc.date.awarded | 2023 | |
dc.format.dimensions | 29x19 | |
dc.format.accompanyingmaterial | DVD | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 148.91 kB | Adobe PDF | View/Open |
02_preliminaries.pdf | 171.25 kB | Adobe PDF | View/Open | |
03_contents.pdf | 48.49 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 61.14 kB | Adobe PDF | View/Open | |
05_chapter-1.pdf | 483.14 kB | Adobe PDF | View/Open | |
06_chapter-2.pdf | 102.55 kB | Adobe PDF | View/Open | |
07_chapter-3.pdf | 1.09 MB | Adobe PDF | View/Open | |
08_chapter-4.pdf | 862.1 kB | Adobe PDF | View/Open | |
09_chapter-5.pdf | 485.9 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 45.48 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: