{"title":"Towards an Effective Intrusion Detection System using Machine Learning techniques: Comprehensive Analysis and Review","authors":"S. Gupta, Meenakshi Tripathi, J. Grover","doi":"10.1109/icrito51393.2021.9596369","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596369","url":null,"abstract":"With the fast growth of network technologies, Experts in many disciplines have shown great interest in network security. Many new assaults occur and it's a challenge for network security mechanisms to detect these sophisticated incursions. Intruders get intelligent each day, consistent with the progress of safety devices. The IDS is a weapon which can prevent the network from several types of interference. IDS evaluate the status of hardware and software operations on a network for threatening players in defense of data confidentiality, integrity and availability. The usage of machine learning algorithms simplified this job for IDS. In this work, the merits and demerits of the current publications from ML-based IDS offered solutions are discussed. This study also points to several research gaps that may be utilized in order to improve and create efficientIDSs.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122403979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Antenna Array System with Enhanced Gain Using Cross Dipole for the LTE","authors":"Mohd Wasim, Shelej Khera","doi":"10.1109/icrito51393.2021.9596151","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596151","url":null,"abstract":"The Proposed MIMO array design is presented for the LTE application. An antenna in the orthogonal formation with the conventional and modified features of STDA has been investigated for the performance identification for the S-parameters, mutual coupling, gain and directivity, and radiation pattern. Conventional STDA's has been taken into account of reference for the design methodology. Cross geometry of orthogonal structure has been introduced with the conventional STDA concept, for the achieving of stable gain in broaden bandwidth.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131395986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anupam Baliyan, V. Kukreja, Vikas Salonki, K. Kaswan
{"title":"Detection of Corn Gray Leaf Spot Severity Levels using Deep Learning Approach","authors":"Anupam Baliyan, V. Kukreja, Vikas Salonki, K. Kaswan","doi":"10.1109/icrito51393.2021.9596540","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596540","url":null,"abstract":"A simple Convolutional neural network (CNN) based deep learning (DL) model has been proposed for multi-classification of corn gray leaf spot (CGLS) disease based on five different severity levels of CGLS disease on the corn plant. Certain corn leaf diseases like CGLS, common rust, and leaf blight are quite common and dangerous in corn harvest. Hence, the current work presents a solution for CGLS disease detection on corn plants using a multi-classification DL model which gives the best detection accuracy of 95.33% in high-risk severity level image. Along with this comparison of five different severity levels has also been conducted based on resulted performance measures (PM).","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131413361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Qualitative and Quantitative Parametric Estimation of the Ethereum and TRON Blockchain Networks","authors":"J. Yadav, N. Yadav, A. Sharma","doi":"10.1109/icrito51393.2021.9596420","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596420","url":null,"abstract":"The introduction of smart contracts and support for Dapps in blockchain networks has opened a new era of decentralized application development for different domains. This paper provides insight into the blockchain technology's core components and highlights the differences in the underlying techniques used in the Ethereum and TRON networks. Additionally, it presents a quantitative analysis of both platforms. Therefore, it will help the readers to balance off their choice between these two blockchain networks.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131759818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Development of Ultra-Violet Light Disinfectant Robot","authors":"A. Rai, Shylaja C, Tanya Singh, Shrey M. Trivedi","doi":"10.1109/icrito51393.2021.9596288","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596288","url":null,"abstract":"The flare-up of COVID-19 has now gotten a pandemic. The new Covid 19 has influenced almost landmasses; at the hour of composing, South Korea, Iran, USA, Italy, Britain, India and other European nations have encountered sharp expansions in analyzed cases. Worldwide exertion is thusly needed to break the chains of infection transmission. For infection avoidance, robot-controlled noncontact bright (UV) surface disinfection is being utilized in light of the fact that COVID-19 spreads not just from one individual to another through close contact respiratory drop move yet in addition by means of defiled surfaces. The point of the current work is to contribute in the battle against the spread of Covid 19. In this examination, we have embraced the actual disinfection strategy by utilizing UVC light as specialist. The UVC gadgets are examined and characterized concurring their sanitizer units, reciprocal gadgets, consolidated disinfection specialists, portability, and request types. Our discovering shows that a versatile robot is the most productive gadget to inactivate microorganisms, so we have built up a robot called UVC Robot. The robot is furnished with an UVC light. This light is fixed on a moving robot that is constrained by an android portable application through a Bluetooth gadget. UVC robot cleans rooms and gear with bright light. The robot can kill approx. 99.99% microbes and infection through UVC lights drove.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127750540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Workflow Automation of Routing Rules in the Accounting Process for Online Travel Agency","authors":"Mamta Nanda, Ashok Kumar","doi":"10.1109/icrito51393.2021.9596274","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596274","url":null,"abstract":"Robotic process automation (RPA) provides many benefits in business process management. Handling a large number of customer's requests for booking or refunding is difficult for Online Travel Agency (OTA) through the manual business process. To overcome these issues, RPA provides many benefits for OTA. It is helpful in managing tasks of businesses and increasing the efficiency. The manual work of accounting and refunds in online travel agency can be done by automation which leads business to get the efficient results. In the proposed study, it has been taken into consideration how RPA can be used in refunding process and how it is beneficial for the business. Automating the business processes by using Microsoft Power Platform leads to enhancement in productivity, cost optimization, error reduction and provide business growth for the organizations.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114606652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consumer Characteristics and Consumption Patterns of Soft Drinks","authors":"S. Sinha, Deepti Sinha, Neetu Mittal","doi":"10.1109/icrito51393.2021.9596207","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596207","url":null,"abstract":"A soft drink is generally treated as very common product aimed at a very casual consumption. Normally, not much of attention is paid to this product, which has almost become ‘commoditized’. But, a deeper and more careful observation would reveal that soft drinks are strong demographic descriptors of their consumers. Key insights into the characteristics and consumption patterns of consumers can be obtained through an incisive study of the soft drinks market. This research paper makes a concerted effort at unearthing the demographic details and consumption contours of the soft drink users in Kanpur, Agra, Varanasi, Allahabad, and Lucknow - the five representative cities of Uttar Pradesh, the most populous state of India. It has been conclusively established through this research that the residents of these five cities - which are demographically similar in nature - exhibit varying consumption patterns when it comes to soft drinks. It was also found that demographic variables like age, gender, educational qualification, income, and marital status do not significantly impact the consumption of soft drinks, whereas employment status is a key influencer of the same.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116587637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fake News Detection Using Intelligent Techniques","authors":"A. Vora, N. Shekokar","doi":"10.1109/icrito51393.2021.9596438","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596438","url":null,"abstract":"Nowadays fake news spreads very easily through internet and social media. People tend to easily believe in that fake information and start discussing about it. The more we hear about fake news, the more it becomes easier to believe on it. The main aim of fake news is to earn money through advertising revenue by web trafficking or discrediting a public figure, company,etc. Fake news is one of the biggest issues of this modern era especially in the world of social media. Lot of authors have contributed in detection of fake news using various machine learning algorithms but some gaps were found during analysis which are improved in our proposed model. Our approach detects fake news using intelligent techniques such as SVM, Naive Bayes and Logistic Regression. Their performance is analysed using parameters such as F1 score, recall, precision.support, accuracy.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123193660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Technique to Detect the Hotspots in Swine Flu Effected Regions","authors":"P. Nagaraj, A. K. Prasad","doi":"10.1109/icrito51393.2021.9596422","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596422","url":null,"abstract":"In present days, healthcare is very essential in human life. The flu (Influenza) tends to spread very rapidly. Influenza is an infectious disease caused by an influenza virus. This is a worldwide infection and causes local or widespread epidemics and pandemics. The most global all over the world spreading virus, known as Swine flu. The Influenza A (H1N1) flu is triggered by means if anyone of several types of swine influenza viruses. So, firstly we have planned to identify who are vulnerable to be effected by the virus and how many patients have died due to swine flu. Since there is a great need to find the hotspots in swine flu affected regions, I was motivated to do research for the identification of hotspots effected more by swine flu. Our exploration centers around this apart of Medical conclusion through studying design through the accumulated records for Swine Flu. Machine learning place key role to identify influenza effected zones, detecting Hotspots and Prioritization Hotspots.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122674871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AI & ML Based Anamoly Detection and Response Using Ember Dataset","authors":"Viraj Rathod, C. Parekh, Dharati Dholariya","doi":"10.1109/icrito51393.2021.9596451","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596451","url":null,"abstract":"In the era of rapid technological growth, malicious traffic has drawn increased attention. Most well-known offensive security assessment todays are heavily focused on pre-compromise. The amount of anomalous data in today's context is massive. Analyzing the data using primitive methods would be highly challenging. Solution to it is: If we can detect adversary behaviors in the early stage of compromise, one can prevent and safeguard themselves from various attacks including ransomwares and Zero-day attacks. Integration of new technologies Artificial Intelligence & Machine Learning with manual Anomaly Detection can provide automated machine-based detection which in return can provide the fast, error free, simplify & scalable Threat Detection & Response System. Endpoint Detection & Response (EDR) tools provide a unified view of complex intrusions using known adversarial behaviors to identify intrusion events. We have used the EMBER dataset, which is a labelled benchmark dataset. It is used to train machine learning models to detect malicious portable executable files. This dataset consists of features derived from 1.1 million binary files: 900,000 training samples among which 300,000 were malicious, 300,000 were benevolent, 300,000 un-labelled, and 200,000 evaluation samples among which 100K were malicious, 100K were benign. We have also included open-source code for extracting features from additional binaries, enabling the addition of additional sample features to the dataset.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}