Machine learning techniques have been have proven to be more effective than conventional extensively used in the creation of intrusion detection systems (IDS) that can swiftly and automatically identify and classify c...
详细信息
ISBN:
(纸本)9798350348422
Machine learning techniques have been have proven to be more effective than conventional extensively used in the creation of intrusion detection systems (IDS) that can swiftly and automatically identify and classify cyber attacks at the host-and network-levels. A scalable solution is needed since destructive attacks are happening so quickly and are changing all the time. For more investigation, the malware community has access to a number of malware databases. The performance of several machine learning algorithms on a range of datasets that were made available to the general public, however, has not yet been thoroughly evaluated by any study. The publicly available malware datasets should be regularly updated and benchmarked due to the dynamic nature of malware and the continuously evolving attacking techniques. In this study, a deep neural network (DNN), a type of deep learning model, is examined in order to create a flexible and efficient IDS to identify and categorise unexpected and unanticipated cyber threats. In order to analyse a variety of datasets that have been produced throughout time using both static and dynamic methodologies, it is vital to take into account the rapid increase in attacks and the constant evolution of network behaviour. It is simpler to select the most effective algorithm for accurately predicting forthcoming cyber attacks with the help of this type of research. Many publicly available benchmark malware datasets are used to offer a thorough review of DNN and other conventional machine learning classifier studies. The KDDCup 99 dataset and the accompanying hyper parameter selection techniques are used to choose the ideal network parameters and topologies for DNNs. A learning rate of [0.01-0.5] is applied to every 1,000-epoch DNN experiment. A variety of datasets, including NSL-KDD, UNSW-NB15, Kyoto, WSN-DS, and CICIDS 2017, as well as the DNN model that performed well on KDDCup 99 are used to conduct the benchmark. Our DNN model trains a
Change detection (CD) is a critical task that involves assessing alterations between bi-temporal images. Hyperspectral images (HSIs), renowned for their extensive spectral information, excel in capturing subtle change...
详细信息
The Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling them to participate in a connected network. In IoD infrastructure, drones communicate not only among themselves but also with...
详细信息
Developing effective strategies to address significant variations in segmented iris image quality is crucial for accurate iris recognition from remotely acquired facial or eye images. These variations are closely link...
详细信息
Sentiment analysis is one of the important aspects of discovering user opinions and enhancing the quality of products like mobile applications. This study assesses the effectiveness of six prominent Natural Language P...
详细信息
Youth unemployment represents an urgent global socioeconomic challenge. This study combines machine learning and exploratory data analysis to understand and solve this problem comprehensively. Traditional approaches o...
详细信息
Pneumonia is a significant global health concern, especially for vulnerable populations such as children under five. Timely and accurate diagnosis is critical for effective treatment and improved patient outcomes. Thi...
详细信息
Multiscript handwriting recognition is used to recognize handwritten text from multiple scripts. It is a challenging task because each script has its own unique characteristics like writing direction, their character ...
详细信息
Rice is cultivated almost allover the world. In spite of the usage of several pesticides, a variety of diseases and pests reduce rice yield. Pesticide use reduces crop quality while increasing crop production. Thus, o...
详细信息
This study introduces an improved hash method aimed at enhancing data integrity and security in applications requiring a 256-bit hash code. The suggested hash algorithm is build based on the MD5 and SHA-256, the sugge...
详细信息
暂无评论