Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019


Phddissertation

Uploaded on Sep 23, 2019

Category Education

1.AI is promising in the of detecting intrusions are cross-site scripting attacks, SQL injections, Denial of Service (DoS), Ransomware, etc. 2.Deep learning models able to accurately predict and recognize “normal activity” or malicious activity faster and generate a much lower percentage of false positives 3.Real-time IDS systems must not have a single fixed algorithm instead the algorithms must be updated regularly

Category Education

Comments

                     

Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019

SEP 23, 2019 MACHINE LEARNING MODELS FOR INTRUSION DETECTION SYSTEMS(IDS) Tips for developing academically sound IDS models and algorithms for Your IEEE Publication 2019 Copyright © 2019 PhD Assistance. All rights reserved TOPICS TO BE DISCUSSED About Us Intrusion Detection System Types Of IDS Techniques Pre-Processing IDS Data IDS classification Summary Copyright © 2019 PhD Assistance. All rights reserved PhD Lab @ PhD Assistance Engineering and Technology: E&T Lab at PhD Assistance is involved in exploring novel research areas by conducting dynamic research. It promotes innovation in all fields of engineering by advancing the technology with structured and continuous research. The problems and challenges faced by the existing technologies and trends are explored by our researchers exists in scholarly literature, in theory, or in practices that needs deliberate investigation. These problems are identified and fixed by our researchers by suggesting better novel alternatives with appropriate tools, technologies and approaches, thereby proving their effectiveness in real time applications. Copyright © 2019 PhD Assistance. All rights reserved INTRUSION Unauthorised activities on the organisation's local computer network Copyright © 2019 PhD Assistance. All rights reserved Ransomware Denial of Service (DoS) MOST COMMON SQL INTRUSIONS injections Cross-site scripting attacks Copyright © 2019 PhD Assistance. All rights reserved Monitors network traffic for suspicious activity and issues alerts. Scans a network or INTRUSION It varies from a system for a single harmful DETECTION computer to activity. large SYSTEM network. Copyright © 2019 PhD Assistance. All rights reserved Creates a log IPS detect the INTRUSION Blocks IP intrusion & PREVENTION address source prevent them SYSTEM Restrict the access of Copyright © 2019 PhD Assistance. All rights reserved intrusions TYPES OF IDS TECHNIQUES Network based (NIDS) Host based intrusion (HIDS) Vulnerability assessment- based Copyright © 2019 PhD Assistance. All rights reserved (VIDS) PRE-PROCESSING IDS DATA Performed through data set(KDD’99, DARPA dataset) Dataset size should be huge & balanced Prevent intrusions in real-time traffic Easier to categorize, reduce operation time and improves classification performance and accuracy. Copyright © 2019 PhD Assistance. All rights reserved Statistical anomaly detection algorithms Machine learning (ML) algorithm [Artificial Neural Networks] Knowledge-based detection Data mining Algorithms Copyright © 2019 PhD Assistance. All rights reserved IDS CLASSIFICATION SUMMARY Building an IDS is extremely challenging A constant update will improve the accuracy and reduce the error rates. Copyright © 2019 PhD Assistance. All rights reserved PhD Lab @ PhD Assistance WWW.RESEARCH.PHDASSISTANCE.COM Copyright © 2019 PhD Assistance. All rights reserved PHONE NUMBER ANY UK: +44-1143520021 QUERIES INDIA: +91-4448137070 APPROACH US EMAIL ADDRESS [email protected] om Get in Copyright © 2019 PhD Assistance. All rights reserved touch with us