This paper is published in Volume-9, Issue-2, 2023
Area
Cyber Security
Author
Mounika Maity, B. Pramod, N. Masthan Valli, Y. Pranathi, M. Mallikarjuna, V. Sathyendra Kumar
Org/Univ
Annamacharya Institute of Technology and Sciences, Rajampet, Andhra Pradesh, India
Pub. Date
03 April, 2023
Paper ID
V9I2-1172
Publisher
Keywords
Supervised Learning, Anomaly Detection, Intrusion Detection, Random Forest, Neural Network, Decision Tree, Support Vector Machine, ML techniques, e-learning, and Principal Component Analysis.

Citationsacebook

IEEE
Mounika Maity, B. Pramod, N. Masthan Valli, Y. Pranathi, M. Mallikarjuna, V. Sathyendra Kumar. Machine Learning Based Network Intrusion Detection For Cyber Security, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Mounika Maity, B. Pramod, N. Masthan Valli, Y. Pranathi, M. Mallikarjuna, V. Sathyendra Kumar (2023). Machine Learning Based Network Intrusion Detection For Cyber Security. International Journal of Advance Research, Ideas and Innovations in Technology, 9(2) www.IJARIIT.com.

MLA
Mounika Maity, B. Pramod, N. Masthan Valli, Y. Pranathi, M. Mallikarjuna, V. Sathyendra Kumar. "Machine Learning Based Network Intrusion Detection For Cyber Security." International Journal of Advance Research, Ideas and Innovations in Technology 9.2 (2023). www.IJARIIT.com.

Abstract

Machine Learning-based systems act on flow features derived through exporting flow procedures. The notable emergence of Machine Learning and Deep Learning (DL) based reports presuppose that the flow of information, such as the average packet capacity, is gleaned from every packet. On common devices, However, when packet sampling is unavoidable, flow exporters are frequently used in practice. Since the flow of information is derived from a sampled group of the packets rather than the entire traffic stream, the usefulness of Machine Learning-based results with the use and existence of such samplings is still up for debate. In this study, we are going to investigate in what ways the effectiveness and performance of these ML-based are affected by packet sampling. Our suggested evaluation method is resistant to various flow export stage settings, in contrast to earlier studies. Hence, it can provide a robust evaluation even in the presence of sampling.