Machine Learning Techniques for Detecting Network Anomalies
Author(s):
M. Ravi, V. Raja Shekhar, K. Ruthvik, T. Abhigna
Keywords:
Intrusion Detection System, Machine Learning, security, Anomaly detection, Misuse detection, Classifiers, EDA.
Abstract
As technology progresses, the number of internet users grows every day. Mobile technology has made communication more convenient, yet it is still insecure. Similarly, a number of internet-connected and data-sharing devices have been developed. These are Internet of Things (IoT) devices. The Internet of Things (IoT) is a rapidly growing industry with numerous uses. The number of people using IoT devices is expanding, as is the number of new goods. Users appreciate the functionality of IoT devices, but many are utterly oblivious of the security concerns that lurk beneath. As a result, improving data transfer and user privacy security is critical. Machine learning techniques are becoming more essential in identifying network breaches (or assaults), allowing network administrators to take preventative steps. To improve the performance of an Intrusion Detection System, we recommend using machine learning techniques.
Article Details
Unique Paper ID: 154937

Publication Volume & Issue: Volume 8, Issue 12

Page(s): 1235 - 1238
Article Preview & Download


Share This Article

Conference Alert

NCSST-2021

AICTE Sponsored National Conference on Smart Systems and Technologies

Last Date: 25th November 2021

SWEC- Management

LATEST INNOVATION’S AND FUTURE TRENDS IN MANAGEMENT

Last Date: 7th November 2021

Go To Issue



Call For Paper

Volume 10 Issue 1

Last Date for paper submitting for March Issue is 25 June 2023

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews

Contact Details

Telephone:6351679790
Email: editor@ijirt.org
Website: ijirt.org

Policies