Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/553157
Title: Development of Framework by Adapting Data Mining Techniques to Identify Intrusion Detection in Network
Researcher: Singh, Neelu
Guide(s): Jotwani, Varsha
Keywords: Computer Science
Computer Science Interdisciplinary Applications
Engineering and Technology
FEATURE CLASSIFIER
FEATURE SELECTION
IDS
K-FOLD, F-MEASURE
University: Rabindranath Tagore University, Bhopal
Completed Date: 2022
Abstract: Estimating the progress made in the identification of malicious code is a challenging subject in the newlinefield of intrusion detection systems (IDS). Machine learning IDS training depends on the datasets newlineoffered, yet it might be challenging to find a reliable dataset for comparison. It is challenging to newlinecompare datasets since there is no accepted method for doing so, there are no ground-truth labels, and newlinethere is no real-world environment traffic, among other factors. The current status of network traffic, newlinewhich is virtually entirely encrypted for the sake of communication security and privacy, is also only newlinepartially reflected by a few statistics. A dataset that complies with both the content and the process newlinerequirements is used in the proposed system. The proposed study introduced the hybrid system for newlineintrusion detection utilising data technique. A malicious node that can be located using these newlinetechniques commits cybercrime. The objective of this study is to select the most pertinent and newlinebeneficial characteristics for a fresh IDS dataset. In order to achieve the goal, a strategy for newlineconstructing ideal ensemble IDS is developed. We use and compare Information Gain (IG), Gain newlineRatio (GR), Symmetrical Uncertainty (SU), Relief-F (R-F), One-R (OR), and Chi Squared (CS). A newlinelist of the features that have been prioritised is produced by feature selection techniques. We trained newlinethree additional models on three distinct datasets for scanning and DDoS attacks for each of the four newlineclassification approaches, then we compared the results with the performance of the suggested newlinemethod. The results of the studies demonstrate that the proposed approach is more successful at newlinepreventing and identifying botnet assaults when compared to previous trained models. newline
Pagination: XV, 131.Pages
URI: http://hdl.handle.net/10603/553157
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
01_title page.pdfAttached File433.81 kBAdobe PDFView/Open
02_preliminary pages.pdf775.42 kBAdobe PDFView/Open
03_contents.pdf84.81 kBAdobe PDFView/Open
04_abstract.pdf53.23 kBAdobe PDFView/Open
05_chapter 1.pdf278.28 kBAdobe PDFView/Open
06_chapter 2.pdf211.37 kBAdobe PDFView/Open
07_chapter 3.pdf318.83 kBAdobe PDFView/Open
08_chapter 4.pdf177.78 kBAdobe PDFView/Open
09_chapter 5.pdf340.37 kBAdobe PDFView/Open
10_annexures.pdf1.73 MBAdobe PDFView/Open
80_recommendation.pdf667.61 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: