H. M. T. Gadiyar, Thyagaraju G S, V. Shibu, Seemitha .
{"title":"Mechanism to Detect the Suspicious Activity in the Network using Random Forest Algorithm","authors":"H. M. T. Gadiyar, Thyagaraju G S, V. Shibu, Seemitha .","doi":"10.48001/jocnv.2023.114-7","DOIUrl":"https://doi.org/10.48001/jocnv.2023.114-7","url":null,"abstract":"Due to new technology, cyberattacks and network-related assaults have dramatically grown. The Distributed Denial of Service (DDoS) attack, in which the hacker uses several dispersed resources against the targeted system, is one of the main risks in these attacks. As DDoS traffic looks just like regular traffic, it is difficult to identify DDoS attacks. We employ the machine learning technology known as the Random Forest Tree to identify the DDoS assault and categorize regular traffic from abnormal traffic. In this work, the dataset including all the properties of the incoming traffic is used to retrieve the incoming traffic. To create an appropriate model, the dataset is trained using the Random Forest technique. Each time the incoming traffic is given into this model as its input, it is then utilized to distinguish between the regular traffic and aberrant traffic.","PeriodicalId":402315,"journal":{"name":"Journal of Computer Networks and Virtualization","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115168823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dev Dutt Gowda M J, P. P. Shenoy, H. M. T. Gadiyar
{"title":"Enhancing Handwritten Digit Recognition Through Convolutional Neural Networks: A Comprehensive Study","authors":"Dev Dutt Gowda M J, P. P. Shenoy, H. M. T. Gadiyar","doi":"10.48001/jocnv.2023.111-3","DOIUrl":"https://doi.org/10.48001/jocnv.2023.111-3","url":null,"abstract":"The development of a handwritten digit recognition system is the main subject of the discussion. In particular, the Convolution Neural Network (CNN) technique is used in the proposed topic. The MNIST dataset is used to create the model. The “Modified National Institute of Standards and Technology dataset” has 60,000 grayscale photographs, which are tiny squares, comprises of hand-written single digits between digit Zero and digit Nine and each measuring 28 by 28. Placing a handwritten digit picture among any one of ten classes corresponding to integer values from digit Zero to digit Nine, inclusively is the assignment here. The system employs a camera to take photos made up of images produced by the MNIST test data set and samples supplied by other authors. It then continually processes the images and updates the output every 0.5 seconds. Accuracy for top-performing models is typically 99.","PeriodicalId":402315,"journal":{"name":"Journal of Computer Networks and Virtualization","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129746285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}