Title : Efficient Intrusion Detection Using Machine Learning Approaches

Type of Material: Thesis
Title: Efficient Intrusion Detection Using Machine Learning Approaches
Researcher: Rajesh, S
Guide: Sangeetha, M
Department: Department of Electronics and Communication Engineering
Publisher: Bharath University, Chennai
Place: Chennai
Year: 2022
Language: English
Subject: Engineering and Technology
Engineering Electrical and Electronic
Engineering
Electronics and Communication Engineering
Engineering and Technology
Dissertation/Thesis Note: PhD; Department of Electronics and Communication Engineering, Bharath University, Chennai, Chennai; 2022; D15EC515
Fulltext: Shodhganga

00000000ntm a2200000ua 4500
001455082
003IN-AhILN
0052024-09-23 12:34:54
008__240923t2022||||ii#||||g|m||||||||||eng||
035__|a(IN-AhILN)th_455082
040__|aBHAU_600073|dIN-AhILN
041__|aeng
100__|aRajesh, S|eResearcher
110__|aDepartment of Electronics and Communication Engineering|bBharath University, Chennai|dChennai|ein|0U-0446
245__|aEfficient Intrusion Detection Using Machine Learning Approaches
260__|aChennai|bBharath University, Chennai|c2022
300__|dDVD
502__|bPhD|cDepartment of Electronics and Communication Engineering, Bharath University, Chennai, Chennai|d2022|oD15EC515
520__|aThe fast propagation of computer networks has changed the viewpoint of network security. An easy accessibility conditions cause computer network as susceptible against several threats from hackers. Threats to networks are numerous and potentially devastating. Up to the moment, researchers have developed Intrusion Detection Systems (IDS) capable of detecting attacks in several available environments. A boundlessness of methods for misuse detection as well as anomaly detection has been applied. Many of the technologies proposed are complementary to each other, since for different kind of environments some approaches perform better than others. This research presents a new intrusion detection system that is then used to survey and classify them. The taxonomy consists of the detection principle, and second of certain operational aspects of the intrusion detection system. In our research we have used algorithms like Random Forest (RF), Support Vector Machine (SVM), Lexicographic Game Method, Artificial Neural Ne
650__|aElectronics and Communication Engineering|2UGC
650__|aEngineering and Technology|2AIU
653__|aEngineering and Technology
653__|aEngineering Electrical and Electronic
653__|aEngineering
700__|aSangeetha, M|eGuide
856__|uhttp://shodhganga.inflibnet.ac.in/handle/10603/386525|yShodhganga
905__|afromsg

User Feedback Comes Under This section.