Amit Kumar, Vivek Kumar, Ashish Saini, Amrita Kumari, Vipin Kumar
{"title":"Classification of Minority Attacks using Machine Learning","authors":"Amit Kumar, Vivek Kumar, Ashish Saini, Amrita Kumari, Vipin Kumar","doi":"10.1109/ICFIRTP56122.2022.10059437","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059437","url":null,"abstract":"In the digital age, the mass adoption of edge devices or Internet of Things (IoT) devices pose serious challenges to cybersecurity. Today, various new types of attacks including minority attacks are increasing due to the presence of intruders in the network. Furthermore, due to the complex behavior in network or IoT networks, these attacks cannot be detected by traditional algorithms. Therefore, this paper proposes an effective intrusion detection system to detect these attacks in network or IoT networks. Machine learning algorithms Decision Trees, Extra Trees, Gradient Boosted Trees, k-Nearest Neighbors and Random Forest classifiers are used to estimate the benchmark dataset CICIDS2017. Furthermore, the RFE (recursive feature elimination technique) is utilized to select the most suitable or optimal set of features for detecting minority attack.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117075856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashish P. Joshi, Aditya Raturi, Santosh Kumar, A. Dumka, D. P. Singh
{"title":"Improved Security and Privacy in Cloud Data Security and Privacy: Measures and Attacks","authors":"Ashish P. Joshi, Aditya Raturi, Santosh Kumar, A. Dumka, D. P. Singh","doi":"10.1109/ICFIRTP56122.2022.10063186","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10063186","url":null,"abstract":"The advantages of the cloud environment for data processing and sharing are utilized by millions of people worldwide. A cloud system must inevitably provide data security and privacy. Users' widespread use and sharing of information creates security gaps. This study aims to discuss the cloud environment, its benefits, difficulties, and upcoming research trends pertaining to safe data processing and exchange. The widespread issue is caused by the increased adoption of cloud computing by several enterprises. As a result, utilizing any device to load and receive data from the cloud providers' facilities raises various security and privacy risks, such as data modification, data loss, and theft. Unauthorized access by insiders is one of the significant problems that might develop. Although there are various ways to prevent cloud administrators from gaining illegal access, such methods haven't been successful in keeping them from gaining access to client data in the cloud.The degree of protection a system may offer to the CIA triad—a paradigm that includes the information security qualities confidentiality, integrity, and availability—is how information security is assessed. In this paper, we have analyzed such scenarios. This study analysis provided dangers to cloud data security, cloud assaults, and found vulnerabilities for several factors affecting cloud computing.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132048262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Kannan, Mukesh Kumar, Surinder Saini, Vivek Sharma
{"title":"AHP-WASPAS Approach for Choice of Non-Conventional Manufacturing Process","authors":"M. Kannan, Mukesh Kumar, Surinder Saini, Vivek Sharma","doi":"10.1109/ICFIRTP56122.2022.10059423","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059423","url":null,"abstract":"Titanium, ceramics, composite materials, and stainless steel are just a few examples of the high-strength, high-hardness materials that are increasingly being used in industries like aerospace, nuclear power, and steam turbines, and these materials are typically processed using a wide range of NTM techniques. However, these NTM methods require a single ideal NTM procedure for a specific material for cost-effective machining because to their excessive power requirements and high costs. Choosing the best method, however, may be a time-consuming ordeal. There are several different components that go into deciding which machining technique to use. To choose the best non-traditional approach, it is recommended to use a combination of \"the Weighted aggregated sum product assessment\" (WASPAS) and an \"Analytical Hierarchy Process\" (AHP). Using a combined approach, we determined that PAM is the best possible NTM process out of the following options: AJM, CM, EDM, EBM, USM, ECM, LBM, WJM, PAM, WEDM and AFM.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132358473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Naresh Alapati, B. Prasad, Aditi Sharma, G. Kumari, S.V. Veeneetha, N. Srivalli, T. Udaya Lakshmi, D. Sahitya
{"title":"Prediction of Flight-fare using machine learning","authors":"Naresh Alapati, B. Prasad, Aditi Sharma, G. Kumari, S.V. Veeneetha, N. Srivalli, T. Udaya Lakshmi, D. Sahitya","doi":"10.1109/ICFIRTP56122.2022.10059429","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059429","url":null,"abstract":"Passengers are attempting to grasp how these airline businesses make judgments regarding flight ticket costs over time, since demand for air travel in India is growing more popular with multiple flight tickets purchasing on the internet. There are a variety of strategies that allow you to perform things at the right moment. Customers want the cheapest ticket possible, but airlines want to maximize their profit by keeping their entire income as high as feasible. To increase revenue, airlines use a number of computational tactics, including as demand forecasting and pricing discrimination. This is for the consumer who buys a flight ticket by estimating the amount of the flight fare. The major difficulty from the customer’s perspective, finding the perfect value or the ideal time to purchase tickets is the most difficult component. The bulk of the techniques rely on advanced computational intelligence, prediction models, and a branch of science called Machine Learning (ML). This research emphasizes the factors and provides instructions for developing a machine learning-based aircraft fare prediction model.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124954245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolution and comparative analysis of different Cloud Access Security Brokers in current era","authors":"Arjun Choudhary, Ashish Tripathi, Aditi Sharma, Rajnesh Singh","doi":"10.1109/ICFIRTP56122.2022.10059416","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059416","url":null,"abstract":"Almost every organization in the world is using cloud, its services and hosting their application on cloud. With time Cloud computing will play a more important role in our life. For enhancing user experience on an application maximum organization uses cloud services. Organization also chooses to deploy their own Cloud services and whether the service is for their internal cloud or for their user the most important things are services to user and security. In this paper we will discuss Cloud Access Security Broker (CASB), how this technology evolves and how it works. Beside that the other focus will be on Data Leakage and how Machine Learning and Deep Learning can help in data leakage issue. Also, how CASB can be used in Data Leakage issues.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127416740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Parminder Singh, Chandani Sharma, Shilpy Sharma, A. K. Khare
{"title":"Intelligent CO-PO Attainment model for misalignment in assessing BL & instruction BL","authors":"Parminder Singh, Chandani Sharma, Shilpy Sharma, A. K. Khare","doi":"10.1109/ICFIRTP56122.2022.10059453","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059453","url":null,"abstract":"The National Education Policy-2020 [NEP] focuses on Clear shift from education as transmission of expert knowledge to Education as building learning competencies including learning to learn and life- long learning. The outcome of delivery of education is measured by the CO-PO attainment level and forms a very important component in the process of accreditation of education system and the Universities. NEP requires that Objectives of every course should be decided in advance in line with the POs, PSOs of the program, and its attainment should be calculated to obtain COURSE OUTCOME, which needs to be improved regularly to ensure Good Quality of Education in learning centric mode. Through this paper, a method is proposed for determining Intelligent CO-PO Attainment model for misalignment in assessing BL & instruction BL. This paper establishes a link between CO’s and PO’s while assessing the course contents and delivery among the most challenging issues in Higher Education. The matrix and relation between the Course outcomes (COs) and Program outcomes (POs) is analyzed in paper using revised technique.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129441982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strained Junctionless MOSFETs: A Brief Review","authors":"Amrita Kumari, A. Saini, Aditya Lama, Ajay Kumar","doi":"10.1109/ICFIRTP56122.2022.10059425","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059425","url":null,"abstract":"Junctionless (JL) devices are new generation technology advancement. Numerous research works have been done with focus on several different architectures of strained and unstrained JL devices. In this paper, an effort has been made to give a brief review of strained-JL (S-JL) devices. A review of modeling techniques in such S-JL devices has also been outlined. Unstrained devices have also been reviewed highlighting the need for JL architecture. Simulations have been performed to analyze the enhancement in device performance. The review indicates that this technology is very much required in ultra-short channel devices, where further scaling to improve the transistor density and device functionality have been stretched to their maximum limit. JL devices help to eliminate the need for constructing ultra-abrupt junctions. Advantages of strain in JL MOSFETs are also reviewed. Enhancements of up to 30-40% in ON current has been characterized in such devices. Strained devices also showed improvement in threshold voltage and leakage currents.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115106655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}