The recent proliferation of cloud computing services brings forth the focal issues of energy consumption in data centers from an environmental and financial standpoint. This paper describes a monitoring system focused...
详细信息
In the dynamic realm of global IT supply chains, businesses confront formidable challenges, particularly during critical junctures like product launches. Traditional Enterprise Resource Planning (ERP) systems, while e...
详细信息
During any significant event, particularly during natural catastrophes, social media is an essential information source. It is claimed that data generated by social networking sites would enable regular people to beco...
详细信息
The topic of cybersecurity remains a significant concern for industries involved in digital operations, as seen by the recurring increase in security incidents. The increasing use of Internet of Things (IoT) devices i...
详细信息
All functionalities required in the process of fake news detection, from data preparation to model building, have been done within the project, smoothly integrated into Flask for user interaction. The first step of da...
详细信息
Phishing is the act of attackers sending malicious emails to receivers in an effort to trick them into falling for a con. Normally, the intention is to persuade users to provide private information, such as system log...
详细信息
ISBN:
(纸本)9783031689048
Phishing is the act of attackers sending malicious emails to receivers in an effort to trick them into falling for a con. Normally, the intention is to persuade users to provide private information, such as system logins or financial data. Our project investigates such email phishing attacks using AI and ML to get a reasonable conclusion about which algorithm can spot these attacks the most successfully. In terms of cybersecurity, a phishing attack is a cybercrime that aims to obtain a user’s personal information in order to carry out some destructive actions. This attack’s effects could lead to account takeover, privilege escalation, and other issues. And in order to lessen it, this study provides information on how to spot phishing emails so that businesses can correctly deal with them. Natural Language Processing (NLP) [26], logistic regression, and fundamental AI ideas like CNN [27] are used, along with machine learning algorithms like KNN, Naive Bayers, and these. This study aims to identify the optimal machine learning algorithm that would provide the highest level of accuracy when it comes to phishing email detection. "To improve the accuracy of detecting phishing emails we have implemented CNN which is an effective approach to fulfill the target. CNN [27] can learn to recognize tiny patterns and traits that may be challenging for humans to notice, they can be a great tool for detecting phishing emails. Handling this technique is very important, hence LSTM is introduced". The CNN model’s LSTM [27] can be thought of as its brain. LSTM (Long Short-Term Memory) [27] is a form of recurrent neural network (RNN) that is frequently employed in tasks involving sequence prediction and natural language processing (NLP) [26]. It is intended to solve the vanishing gradients issue, which can arise in conventional RNNs when the gradients are extremely small and make the network struggle to learn long-term dependencies. By understanding and executing everything we have obse
In the framework of sales forecasting, the project investigates the field of time series forecasting, with a particular emphasis on analyzing and comparing the forecasting precision of ARIMA, SARIMA, and LSTM models. ...
详细信息
This research paper presents an innovative approach to enhancing Intrusion Detection Systems (IDS) using a Long Short-Term Memory (LSTM) model and transfer learning. The study begins with the loading of a pretrained L...
详细信息
With advancements in information and virtualization technologies, the volume and growth of security threats from cyber attacks targeting networked systems are increasing. Protecting these networked systems is crucial ...
详细信息
ISBN:
(纸本)9798350365269
With advancements in information and virtualization technologies, the volume and growth of security threats from cyber attacks targeting networked systems are increasing. Protecting these networked systems is crucial in today's interconnected digital world. Detecting anomalies in network behavior is crucial to preventing fraud or unauthorized access and ensuring the integrity of data transmission over the internet. This highlights the crucial role of intrusion detection systems (IDS) in network security by identifying malicious attacks in network traffic. However, relying solely on data encryption, authentication, and firewalls isn't always sufficient, especially when dealing with fragmented packets that evade traditional security measures. Moreover, attackers are adept at adapting their tactics, making it increasingly challenging to stay ahead of potential threats. This study examines Anomaly-Based Intrusion Detection in Network Traffic utilizing machine learning methods such as Decision Trees and Random Forests leveraging the MachineLearningCSV data of the CICIDS-2017 dataset from ISCX Consortium to test and compare how well these two multiclass classifier algorithms work. Out of 79 features, including one feature as a label, 50 were obtained from the feature engineering step. The detection accuracy and F1 score of more than 99% were achieved using both Decision Tree and Random forest algorithms at a split ratio of 80:20. The results of two algorithms are compared, and it is observed from the ROC that the Random Forest algorithm is more effective than the Decision Tree for the multiclass classification. Additionally, the Decision Tree classifier achieved an accuracy score of 0.99867 with an execution time of 44.3 seconds, while the Random Forest classifier achieved an accuracy score of 0.99888 with an execution time of 8 minutes and 35 seconds. These results demonstrate the effectiveness of both algorithms in achieving high accuracy in intrusion detection tasks, w
The explosion of the novel phenomenon of the combination of computer vision and Natural language processing is playing a vital role in converting the ordinary world into a more technological pool. Natural language pro...
详细信息
暂无评论