Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/553157
Title: | Development of Framework by Adapting Data Mining Techniques to Identify Intrusion Detection in Network |
Researcher: | Singh, Neelu |
Guide(s): | Jotwani, Varsha |
Keywords: | Computer Science Computer Science Interdisciplinary Applications Engineering and Technology FEATURE CLASSIFIER FEATURE SELECTION IDS K-FOLD, F-MEASURE |
University: | Rabindranath Tagore University, Bhopal |
Completed Date: | 2022 |
Abstract: | Estimating the progress made in the identification of malicious code is a challenging subject in the newlinefield of intrusion detection systems (IDS). Machine learning IDS training depends on the datasets newlineoffered, yet it might be challenging to find a reliable dataset for comparison. It is challenging to newlinecompare datasets since there is no accepted method for doing so, there are no ground-truth labels, and newlinethere is no real-world environment traffic, among other factors. The current status of network traffic, newlinewhich is virtually entirely encrypted for the sake of communication security and privacy, is also only newlinepartially reflected by a few statistics. A dataset that complies with both the content and the process newlinerequirements is used in the proposed system. The proposed study introduced the hybrid system for newlineintrusion detection utilising data technique. A malicious node that can be located using these newlinetechniques commits cybercrime. The objective of this study is to select the most pertinent and newlinebeneficial characteristics for a fresh IDS dataset. In order to achieve the goal, a strategy for newlineconstructing ideal ensemble IDS is developed. We use and compare Information Gain (IG), Gain newlineRatio (GR), Symmetrical Uncertainty (SU), Relief-F (R-F), One-R (OR), and Chi Squared (CS). A newlinelist of the features that have been prioritised is produced by feature selection techniques. We trained newlinethree additional models on three distinct datasets for scanning and DDoS attacks for each of the four newlineclassification approaches, then we compared the results with the performance of the suggested newlinemethod. The results of the studies demonstrate that the proposed approach is more successful at newlinepreventing and identifying botnet assaults when compared to previous trained models. newline |
Pagination: | XV, 131.Pages |
URI: | http://hdl.handle.net/10603/553157 |
Appears in Departments: | Department of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title page.pdf | Attached File | 433.81 kB | Adobe PDF | View/Open |
02_preliminary pages.pdf | 775.42 kB | Adobe PDF | View/Open | |
03_contents.pdf | 84.81 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 53.23 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 278.28 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 211.37 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 318.83 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 177.78 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 340.37 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 1.73 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 667.61 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: