DISSERTATION MACHINE LEARNING ALGORITHM DEVELOPMENT - PowerPoint PPT Presentation

About This Presentation
Title:

DISSERTATION MACHINE LEARNING ALGORITHM DEVELOPMENT

Description:

The present article helps the USA, the UK, Europe and the Australian students pursuing their computer Science postgraduate degree to identify right topic in the area of computer science specifically on machine learning and intrusion detection system. These topics are researched in-depth at the University of Spain, Cornell University, University of Modena and Reggio Emilia, Modena, Italy, and many more. For Any Queries : Website: www.phdassistance.com Phd Research Lab : www.research.phdassistance.com Email: info@phdassistance.com Phone : +91-4448137070 Contact Name Ganesh / Vinoth Kumar – PowerPoint PPT presentation

Number of Views:52

less

Transcript and Presenter's Notes

Title: DISSERTATION MACHINE LEARNING ALGORITHM DEVELOPMENT


1
SEP 23, 2019
MACHINE LEARNING MODELS FOR INTRUSION DETECTION
SYSTEMS(IDS)
Tips for developing academically sound IDS models
and algorithms for Your IEEE Publication 2019
Copyright 2019 PhD Assistance. All rights
reserved
2
TOPICS TO BE DISCUSSED
About Us
Intrusion Detection System
Types Of IDS Techniques
Pre-Processing IDS Data
IDS classification
Summary
Copyright 2019 PhD Assistance. All rights
reserved
3
PhD Lab _at_
PhD Assistance
Engineering and Technology
ET Lab at PhD Assistance is involved in
exploring novel research areas by conducting
dynamic research. It promotes innovation in all
fields of engineering by advancing the technology
with structured and continuous research. The
problems and challenges faced by the existing
technologies and trends are explored by our
researchers exists in scholarly literature, in
theory, or in practices that needs deliberate
investigation. These problems are identified and
fixed by our researchers by suggesting better
novel alternatives with appropriate tools,
technologies and approaches, thereby proving
their effectiveness in real time applications.
Copyright 2019 PhD Assistance. All rights
reserved
4
INTRUSION
Unauthorised activities on the organisation's
local computer network
Copyright 2019 PhD Assistance. All rights
reserved
5
Ransomware
Denial of Service (DoS)
MOST COMMON INTRUSIONS
SQL injections
Cross-site scripting attacks
Copyright 2019 PhD Assistance. All rights
reserved
6
Monitors network traffic for suspicious activity
and issues alerts.
Scans a network or a system for harmful activity.
It varies from a single computer to large
network.
INTRUSION DETECTION SYSTEM
Copyright 2019 PhD Assistance. All rights
reserved
7
Creates a log
INTRUSION PREVENTION SYSTEM
IPS detect the intrusion prevent them
Blocks IP address source
Restrict the access of intrusions
Copyright 2019 PhD Assistance. All rights
reserved
8
TYPES OF IDS TECHNIQUES
Network based (NIDS)
Host based intrusion (HIDS)
Vulnerability assessment-based (VIDS)
Copyright 2019 PhD Assistance. All rights
reserved
9
PRE-PROCESSING IDS DATA
Performed through data set(KDD99, DARPA dataset)
Dataset size should be huge balanced
Prevent intrusions in real-time traffic
Easier to categorize, reduce operation time and
improves classification performance and accuracy.
Copyright 2019 PhD Assistance. All rights
reserved
10
Statistical anomaly detection algorithms
Machine learning (ML) algorithm Artificial
Neural Networks
IDS CLASSIFICATION
Knowledge-based detection
Data mining Algorithms
Copyright 2019 PhD Assistance. All rights
reserved
11
SUMMARY
Building an IDS is extremely challenging
A constant update will improve the accuracy and
reduce the error rates.
Copyright 2019 PhD Assistance. All rights
reserved
12
WWW.RESEARCH.PHDASSISTANCE.COM
Copyright 2019 PhD Assistance. All rights
reserved
13
PHONE NUMBER
ANY QUERIES APPROACH US
UK 44-1143520021
INDIA 91-4448137070
EMAIL ADDRESS
info_at_phdassistance.com
Get in touch with us
Copyright 2019 PhD Assistance. All rights
reserved
Write a Comment
User Comments (0)
About PowerShow.com