Semisupervised Machine Learning Approach for Ddos Detection

Sanjeevi. J, Dr. Krithika. D. R.
{"title":"Semisupervised Machine Learning Approach for Ddos Detection","authors":"Sanjeevi. J, Dr. Krithika. D. R.","doi":"10.48175/ijarsct-18409","DOIUrl":null,"url":null,"abstract":"Analyzing cyber incident data sets is an important method for deepening our understanding of the evolution of the threat situation. In present generation we come to know about many cyber breaches and hacking taking place. In this project work, we research about the various cyber- attacks and breaches and study the way these attacks are done and find an alternative for the same. We show that rather than by distributing these attacks as because they exhibit autocorrelations, we should model by stochastic process both the hacking breach incident inter- arrival times and breach sizes. We draw a set of cyber securities insights, including that the threat of cyber hacks is indeed getting worse in terms of their frequency. In our project we will be using the algorithms such as Convolution Neural Network (CNN) as existing and Recurrent Neural Network (RNN) as proposed for analyzing our results. From the results obtained its proved that proposed RNN works better than existing CNN.","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"6 11","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Advanced Research in Science, Communication and Technology","FirstCategoryId":"0","ListUrlMain":"https://doi.org/10.48175/ijarsct-18409","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Analyzing cyber incident data sets is an important method for deepening our understanding of the evolution of the threat situation. In present generation we come to know about many cyber breaches and hacking taking place. In this project work, we research about the various cyber- attacks and breaches and study the way these attacks are done and find an alternative for the same. We show that rather than by distributing these attacks as because they exhibit autocorrelations, we should model by stochastic process both the hacking breach incident inter- arrival times and breach sizes. We draw a set of cyber securities insights, including that the threat of cyber hacks is indeed getting worse in terms of their frequency. In our project we will be using the algorithms such as Convolution Neural Network (CNN) as existing and Recurrent Neural Network (RNN) as proposed for analyzing our results. From the results obtained its proved that proposed RNN works better than existing CNN.
用于 Ddos 检测的半监督机器学习方法
分析网络事件数据集是加深我们对威胁形势演变的理解的重要方法。在当代,我们了解到许多网络攻击和黑客行为。在这个项目中,我们研究了各种网络攻击和漏洞,研究了这些攻击的方式,并找到了替代方法。我们的研究表明,与其因为这些攻击表现出自相关性而对其进行分布,不如通过随机过程对黑客入侵事件的到达时间和入侵规模进行建模。我们得出了一系列网络安全方面的见解,包括网络黑客的威胁在频率上确实越来越严重。在我们的项目中,我们将使用现有的卷积神经网络(CNN)和建议的循环神经网络(RNN)等算法来分析我们的结果。结果证明,建议的 RNN 比现有的 CNN 效果更好。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信