P. S. Kumar, A. Barkathulla, A. Venkatesh, G. Nirmala
{"title":"基于深度学习技术的无线局域网数据挖掘入侵检测优化框架","authors":"P. S. Kumar, A. Barkathulla, A. Venkatesh, G. Nirmala","doi":"10.37896/pd91.4/9145","DOIUrl":null,"url":null,"abstract":"The developments of technology and computer digital systems are now pervasive across the globe and the world has rendered an invisible and unviable from day to day existence. The detailed assessment details of Mobile and Pervasive Computing applied to electrical and electronic devices, which are intangible and considering the context of evolutionary theory that refers to them as pervasive environments. The urban development concept, the future will be a connected web of networked computers and models of integrated networks system. Due to their broad usage in metropolitan environments, the significant mobile devices have been enriched the urban planning strategy of ubiquitous computing, which is designed for the urban growth. According to the action plan, the data mining tools will be employed to assist the IDS building efforts in order to help alleviate these issues. This has found that the Intrusion Detection technologies have been used in conjunction with data mining strategies to spot attacks in the system. An Intrusion Detection System is used to control the network operations, used to track and filter out the unwanted data with decision tree. The mobile crowd sourcing technologies were applied to smart environments; the world by integrating and coordinating all of the technology resources. These algorithms are evaluated for their use in discovering the unknown attacks in the mobile communication systems.","PeriodicalId":20006,"journal":{"name":"Periodico Di Mineralogia","volume":"40 1","pages":""},"PeriodicalIF":1.2000,"publicationDate":"2022-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Optimized Framework for Intrusion Detection Using Data Mining Techniques in Wireless Lan With Deep Learning Techniques\",\"authors\":\"P. S. Kumar, A. Barkathulla, A. Venkatesh, G. Nirmala\",\"doi\":\"10.37896/pd91.4/9145\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The developments of technology and computer digital systems are now pervasive across the globe and the world has rendered an invisible and unviable from day to day existence. The detailed assessment details of Mobile and Pervasive Computing applied to electrical and electronic devices, which are intangible and considering the context of evolutionary theory that refers to them as pervasive environments. The urban development concept, the future will be a connected web of networked computers and models of integrated networks system. Due to their broad usage in metropolitan environments, the significant mobile devices have been enriched the urban planning strategy of ubiquitous computing, which is designed for the urban growth. According to the action plan, the data mining tools will be employed to assist the IDS building efforts in order to help alleviate these issues. This has found that the Intrusion Detection technologies have been used in conjunction with data mining strategies to spot attacks in the system. An Intrusion Detection System is used to control the network operations, used to track and filter out the unwanted data with decision tree. The mobile crowd sourcing technologies were applied to smart environments; the world by integrating and coordinating all of the technology resources. These algorithms are evaluated for their use in discovering the unknown attacks in the mobile communication systems.\",\"PeriodicalId\":20006,\"journal\":{\"name\":\"Periodico Di Mineralogia\",\"volume\":\"40 1\",\"pages\":\"\"},\"PeriodicalIF\":1.2000,\"publicationDate\":\"2022-04-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Periodico Di Mineralogia\",\"FirstCategoryId\":\"89\",\"ListUrlMain\":\"https://doi.org/10.37896/pd91.4/9145\",\"RegionNum\":4,\"RegionCategory\":\"地球科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"GEOCHEMISTRY & GEOPHYSICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Periodico Di Mineralogia","FirstCategoryId":"89","ListUrlMain":"https://doi.org/10.37896/pd91.4/9145","RegionNum":4,"RegionCategory":"地球科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"GEOCHEMISTRY & GEOPHYSICS","Score":null,"Total":0}
Optimized Framework for Intrusion Detection Using Data Mining Techniques in Wireless Lan With Deep Learning Techniques
The developments of technology and computer digital systems are now pervasive across the globe and the world has rendered an invisible and unviable from day to day existence. The detailed assessment details of Mobile and Pervasive Computing applied to electrical and electronic devices, which are intangible and considering the context of evolutionary theory that refers to them as pervasive environments. The urban development concept, the future will be a connected web of networked computers and models of integrated networks system. Due to their broad usage in metropolitan environments, the significant mobile devices have been enriched the urban planning strategy of ubiquitous computing, which is designed for the urban growth. According to the action plan, the data mining tools will be employed to assist the IDS building efforts in order to help alleviate these issues. This has found that the Intrusion Detection technologies have been used in conjunction with data mining strategies to spot attacks in the system. An Intrusion Detection System is used to control the network operations, used to track and filter out the unwanted data with decision tree. The mobile crowd sourcing technologies were applied to smart environments; the world by integrating and coordinating all of the technology resources. These algorithms are evaluated for their use in discovering the unknown attacks in the mobile communication systems.
期刊介绍:
Periodico di Mineralogia is an international peer-reviewed Open Access journal publishing Research Articles, Letters and Reviews in Mineralogy, Crystallography, Geochemistry, Ore Deposits, Petrology, Volcanology and applied topics on Environment, Archaeometry and Cultural Heritage. The journal aims at encouraging scientists to publish their experimental and theoretical results in as much detail as possible. Accordingly, there is no restriction on article length. Additional data may be hosted on the web sites as Supplementary Information. The journal does not have article submission and processing charges. Colour is free of charges both on line and printed and no Open Access fees are requested. Short publication time is assured.
Periodico di Mineralogia is property of Sapienza Università di Roma and is published, both online and printed, three times a year.