2021
DOI: 10.1186/s40537-021-00521-y
|View full text |Cite
|
Sign up to set email alerts
|

Highly accurate and efficient two phase-intrusion detection system (TP-IDS) using distributed processing of HADOOP and machine learning techniques

Abstract: Network security and data security are the biggest concerns now a days. Every organization decides their future business process based on the past and day to day transactional data. This data may consist of consumer’s confidential data, which needs to be kept secure. Also, the network connections when established with the external communication devices or entities, a care should be taken to authenticate these and block the unwanted access. This consists of identification of the malicious connection nodes and i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 45 publications
0
9
0
Order By: Relevance
“…Posttraining, the model employs an auto-encoder for prediction, significantly reducing detection time and enhancing accuracy. Experimental findings suggest that AE-IDS outperform conventional ML-based IDS, offering more accessible training, better adaptability, and higher detection accuracy in [46][47][48][49][50]. The research in [51][52][53][54][55] employs an RF algorithm for county-scale cotton mapping, using spectral, vegetation, and www.ijacsa.thesai.org texture features.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Posttraining, the model employs an auto-encoder for prediction, significantly reducing detection time and enhancing accuracy. Experimental findings suggest that AE-IDS outperform conventional ML-based IDS, offering more accessible training, better adaptability, and higher detection accuracy in [46][47][48][49][50]. The research in [51][52][53][54][55] employs an RF algorithm for county-scale cotton mapping, using spectral, vegetation, and www.ijacsa.thesai.org texture features.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Decision tree are constructed with decision nodes as internal nodes and the class labels as the leaf nodes of the tree. Each internal node is defined for the decision for classification path, based on the values of different features used for classification as input variables [19]. There are number of algorithms used for construction of the decision tree such as ID3, C4.5, VFDT, etc.…”
Section: Decision Treementioning
confidence: 99%
“…Previous methods such as data encryption, firewalls, and user authentication are insufficient to prevent Internet attacks, so cyber solutions that work to avoid anomalies and attacks [2] came to protect data from attack. Intrusion detection systems monitor network traffic and prevent intrusion.…”
Section: Introductionmentioning
confidence: 99%