Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/553157
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2024-03-20T09:57:17Z-
dc.date.available2024-03-20T09:57:17Z-
dc.identifier.urihttp://hdl.handle.net/10603/553157-
dc.description.abstractEstimating the progress made in the identification of malicious code is a challenging subject in the newlinefield of intrusion detection systems (IDS). Machine learning IDS training depends on the datasets newlineoffered, yet it might be challenging to find a reliable dataset for comparison. It is challenging to newlinecompare datasets since there is no accepted method for doing so, there are no ground-truth labels, and newlinethere is no real-world environment traffic, among other factors. The current status of network traffic, newlinewhich is virtually entirely encrypted for the sake of communication security and privacy, is also only newlinepartially reflected by a few statistics. A dataset that complies with both the content and the process newlinerequirements is used in the proposed system. The proposed study introduced the hybrid system for newlineintrusion detection utilising data technique. A malicious node that can be located using these newlinetechniques commits cybercrime. The objective of this study is to select the most pertinent and newlinebeneficial characteristics for a fresh IDS dataset. In order to achieve the goal, a strategy for newlineconstructing ideal ensemble IDS is developed. We use and compare Information Gain (IG), Gain newlineRatio (GR), Symmetrical Uncertainty (SU), Relief-F (R-F), One-R (OR), and Chi Squared (CS). A newlinelist of the features that have been prioritised is produced by feature selection techniques. We trained newlinethree additional models on three distinct datasets for scanning and DDoS attacks for each of the four newlineclassification approaches, then we compared the results with the performance of the suggested newlinemethod. The results of the studies demonstrate that the proposed approach is more successful at newlinepreventing and identifying botnet assaults when compared to previous trained models. newline
dc.format.extentXV, 131.Pages
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleDevelopment of Framework by Adapting Data Mining Techniques to Identify Intrusion Detection in Network
dc.title.alternative
dc.creator.researcherSingh, Neelu
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Interdisciplinary Applications
dc.subject.keywordEngineering and Technology
dc.subject.keywordFEATURE CLASSIFIER
dc.subject.keywordFEATURE SELECTION
dc.subject.keywordIDS
dc.subject.keywordK-FOLD, F-MEASURE
dc.description.note
dc.contributor.guideJotwani, Varsha
dc.publisher.placeBhopal
dc.publisher.universityRabindranath Tagore University, Bhopal
dc.publisher.institutionDepartment of Computer Science
dc.date.registered2019
dc.date.completed2022
dc.date.awarded2023
dc.format.dimensions
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
01_title page.pdfAttached File433.81 kBAdobe PDFView/Open
02_preliminary pages.pdf775.42 kBAdobe PDFView/Open
03_contents.pdf84.81 kBAdobe PDFView/Open
04_abstract.pdf53.23 kBAdobe PDFView/Open
05_chapter 1.pdf278.28 kBAdobe PDFView/Open
06_chapter 2.pdf211.37 kBAdobe PDFView/Open
07_chapter 3.pdf318.83 kBAdobe PDFView/Open
08_chapter 4.pdf177.78 kBAdobe PDFView/Open
09_chapter 5.pdf340.37 kBAdobe PDFView/Open
10_annexures.pdf1.73 MBAdobe PDFView/Open
80_recommendation.pdf667.61 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: