2(1), (2023):82-92. DOI: https://doi.org/10.46632/jdaai/2/1/13
S. Siva Shankar
Vimala Saravanan
M. Ramachandran
R. Sangeetha
An invasion detection system (NIDS) that makes use of networks can spot malicious activities on a network. For NIDS to inspect each and every packet of communication, including unicast traffic, invalid network access is often required. Along with being small structures that don’t block traffic, NIDS are able to keep an eye on usernames and passwords, check for any signs of odd activity in the file integrity logs, port logs, mysql database file storage, etc. and alert the part of implementing as necessary. Since NIDS keeps an eye on live data, it can spot problems as they happen. On the other hand, HIDS uses historical data to identify skilled hackers who employ cutting-edge methods that are difficult to detect in real-time. A monitoring system called an intrusion notification system (IDS) looks for abnormal activity and sends out alarms when it does. A Counter Terrorism Center (SOC) analyst senior incident handler can look into the issue and take the necessary steps to resolve the threat based on these notifications. Every incoming packets are read by an NIDS, which scans them for any anomalous activity. Depending on the gravity of the danger, steps can be taken, such as alerting system administrators or preventing the initial IP address from connecting to the network. In the past decades, due to developments Increased use of networking techniques and internet, digital. Contacts entered into everything that happens on the world market. The hacker penetration attempts are taking place in parallel with these advances. Networks are expanding as well. Without permission, they attempted to modify some network data or increase network traffic in order to launch a denial-of-service attack. Intrusion prevention systems (IDS) are also favoured, especially for detecting malicious within a network system, even though a firewall may appear like an useful solution to avoid this type of attack. Machine learning algorithms have helped IDS become more successful in recent years, depending on the consequences of the training/learning process. Knowing what is important is very difficult and the learning algorithm is fast according to the problem Type. The complexity of the task, the size of the data sets, the number of nodes, the network design, the intended error rate, etc. all affect the choice of algorithm. Examine several network training functions in artificial neural networks with numerous layers created to provide effective intrusion detection systems. test outcomes The study provides evidence of the usefulness of the approach. Considering their speed and true-positive detection rates Death Penalty. SPSS statistics is multivariate analytics, business intelligence, and criminal investigation data management, advanced analytics, developed by IBM for a statistical software package. A long time, spa inc. Was created by, IBM purchased it in 2009. The brand name for the most recent versions is IBM SPSS statistics. Network Security, Intrusion Detection System, Neural Networks and Training Functions. The Cronbach’s Alpha Reliability result. The overall Cronbach’s Alpha value for the model is .860which indicates 86% reliability. From the literature review, the above 50% Cronbach’s Alpha value model can be considered for analysis. Emotional Intelligence the Cronbach’s Alpha Reliability result. The overall Cronbach’s Alpha value for the model is .860which indicates 86% reliability. From the literature review, the above 50% Cronbach’s Alpha value model can be considered for analysis.
Zarpelão, Bruno Bogaz, Rodrigo Sanches Miani, Cláudio Toshio Kawakani, and Sean Carlisto de Alvarenga. “A survey of intrusion detection in Internet of Things.” Journal of Network and Computer Applications84 (2017): 25-37.
Karatas, Gozde, and Ozgur Koray Sahingoz. “Neural network based intrusion detection systems with different training functions.” In 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1-6. IEEE, 2018.
Ring, Markus, Sarah Wunderlich, Deniz Scheuring, Dieter Landes, and Andreas Hotho. “A survey of network-based intrusion detection data sets.” Computers & Security 86 (2019): 147-167.
Prasanalakshmi, B., and A. Farouk. “Classification and prediction of student academic performance in king khalid university-a machine learning approach.” Indian J Sci Technol 12 (2019): 14.
Bumb, Swapnil Sunil, Dara John Bhaskar, Chandan R. Agali, Himanshu Punia, Vipul Gupta, Vikas Singh, Safalya Kadtane, and Sneha Chandra. “Assessment of photodynamic therapy (PDT) in disinfection of deeper dentinal tubules in a root canal system: an in vitro study.” Journal of clinical and diagnostic research: JCDR 8, no. 11 (2014): ZC67.
Patel BJ, Surana P, Patel KJ. Recent Advances in Local Anesthesia: A Review of Literature. Cureus. 2023 Mar 17;15(3):e36291. doi: 10.7759/cureus.36291. PMID: 37065303; PMCID: PMC10103831.
Vigna, Giovanni, and Richard A. Kemmerer. “NetSTAT: A network-based intrusion detection system.” Journal of computer security 7, no. 1 (1999): 37-71.
Vimala Saravanan, Babila revathy M, M Ramachandran, Ashwini Murugan, “Understanding Indian Technical Institution using TOPSIS MCDM Method”, REST Journal on Data Analytics and Artificial Intelligence , 1(1), (2022):23-29
Ahuja, Sakshi, Vidya Dodwad, Bhavna Jha Kukreja, Praful Mehra, and Pankaj Kukreja. “A comparative evaluation of efficacy of Punica granatum and chlorhexidine on plaque and gingivitis.” Journal of the International Clinical Dental Research Organization 3, no. 1 (2011): 29-32.
Linda, Ondrej, Todd Vollmer, and Milos Manic. “Neural network based intrusion detection system for critical infrastructures.” In 2009 international joint conference on neural networks, pp. 1827-1834. IEEE, 2009.
Asharf, Javed, Nour Moustafa, Hasnat Khurshid, Essam Debie, Waqas Haider, and Abdul Wahab. “A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions.” Electronics 9, no. 7 (2020): 1177.
Krishna, S. Rama, Ketan Rathor, Jarabala Ranga, Anita Soni, D. Srinivas, and Anil Kumar. “Artificial Intelligence Integrated with Big Data Analytics for Enhanced Marketing.” In 2023 International Conference on Inventive Computation Technologies (ICICT), pp. 1073-1077. IEEE, 2023.
Kadtane, Safalya S., D. J. Bhaskar, Chandan Agali, Himanshu Punia, Vipul Gupta, Manu Batra, Vikas Singh, and Swapnil S. Bumb. “Periodontal health status of different socio-economic groups in out-patient department of TMDC & RC, Moradabad, India.” Journal of clinical and diagnostic research: JCDR 8, no. 7 (2014): ZC61.
Kim, Dong Seong, and Jong Sou Park. “Network-based intrusion detection with support vector machines.” In Information Networking: International Conference, ICOIN 2003, Cheju Island, Korea, February 12-14, 2003. Revised Selected Papers, pp. 747-756. Springer Berlin Heidelberg, 2003.
Jomon Jos, Vidhya Prasanth, Ramachandran, Ashwini Murugan, “Analysis of Blind Spot in Heavy Vehicles Driving Using VIKOR Method”, REST Journal on Data Analytics and Artificial Intelligence , 1(1), (2022):15-22
Prasanalakshmi, B., and A. Kannammal. “Secure credential federation for hybrid cloud environment with SAML enabled multifactor authentication using biometrics.” International Journal of Computer Applications 53, no. 18 (2012).
Kukreja, Bhavna Jha, Kishore Gajanan Bhat, Pankaj Kukreja, Vijay Mahadev Kumber, Rajkumar Balakrishnan, and Vivek Govila. “Isolation and immunohistochemical characterization of periodontal ligament stem cells: A preliminary study.” Journal of Indian Society of Periodontology 25, no. 4 (2021): 295.
Ferrag, Mohamed Amine, Leandros Maglaras, Ahmed Ahmim, Makhlouf Derdour, and Helge Janicke. “Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks.” Future internet 12, no. 3 (2020): 44.
Bagde, Hiroj, Savitha Banakar, Alka Waghmare, Ashwini Bagde, Shailendra Singh Chaturvedi, and Santosh Rayagouda Patil. “Assessment of the Relationship Between Matrix Metalloproteinase-9 Promoter Gene Polymorphism and Chronic Periodontitis.” Pesquisa Brasileira em Odontopediatria e Clínica Integrada 21 (2021).
Kumar, Sanjay, Ari Viinikainen, and Timo Hamalainen. “Machine learning classification model for network based intrusion detection system.” In 2016 11th international conference for internet technology and secured transactions (ICITST), pp. 242-249. IEEE, 2016.
Chinnasami Sivaji, P.K.Chidambaram, M. Ramachandran, Ashwini Murugan, “Performance Analysis of Facade Materials using VIKOR Method”, REST Journal on Advances in Mechanical Engineering, 1(2), (2022):41-49.
Rathor, Ketan, Anshul Mandawat, Kartik A. Pandya, Bhanu Teja, Falak Khan, and Zoheib Tufail Khan. “Management of Shipment Content using Novel Practices of Supply Chain Management and Big Data Analytics.” In 2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), pp. 884-887. IEEE, 2022.
Bhargava, Deepshikha, B. Prasanalakshmi, Thavavel Vaiyapuri, Hemaid Alsulami, Suhail H. Serbaya, and Abdul Wahab Rahmani. “CUCKOO-ANN based novel energy-efficient optimization technique for IoT sensor node modelling.” Wireless Communications and Mobile Computing 2022 (2022): 1-9.
Kim, Soung Min, Suk Keun Lee, Sam Paul, Rupshikha Choudhury, Nandini Kumari, Sanjay Rastogi, Ashish Sharma, Vikas Singh, Shyamalendu Laskar, and Tushar Dubey. “Is treatment with platelet-rich fibrin better than zinc oxide eugenol in cases of established dry socket for controlling pain, reducing inflammation, and improving wound healing?.” Journal of the Korean Association of Oral and Maxillofacial Surgeons 45, no. 2 (2019): 76-82.
Bawa, Surjit Singh. “Implementing Text Analytics with Enterprise Resource Planning.”
Yang, Aimin, Yunxi Zhuansun, Chenshuai Liu, Jie Li, and Chunying Zhang. “Design of intrusion detection system for internet of things based on improved BP neural network.” Ieee Access 7 (2019): 106043-106052.
Kukreja, Bhavna Jha, Udayan Gupta, Vidya Dodwad, and Pankaj Kukreja. “Periosteal fenestration vestibuloplasty procedure for sulcus deepening in a hemimandibulectomy patient following implant therapy.” Journal of Indian Society of Periodontology 18, no. 4 (2014): 508.
Singh, Vikas, D. J. Bhaskar, R. Chandan Agali, Varunjeet Chaudhary, Swapnil S. Bumb, and Chaitanya Dev Jain. “Knowledge and attitude towards droplet and airborne isolation precautions and its correlation among students of TMDC&RC, Moradabad.” Int J Adv Health Sci 1, no. 3 (2014): 8-15.
Manjunath, C. R., Ketan Rathor, Nandini Kulkarni, Prashant Pandurang Patil, Manoj S. Patil, and Jasdeep Singh. “Cloud Based DDOS Attack Detection Using Machine Learning Architectures: Understanding the Potential for Scientific Applications.” International Journal of Intelligent Systems and Applications in Engineering 10, no. 2s (2022): 268-271.
Duraisamy, Sathya, Ganesh Kumar Pugalendhi, and Prasanalakshmi Balaji. “Reducing energy consumption of wireless sensor networks using rules and extreme learning machine algorithm.” The Journal of Engineering 2019, no. 9 (2019): 5443-5448.
Wattanapongsakorn, Naruemon, S. Srakaew, E. Wonghirunsombat, C. Sribavonmongkol, T. Junhom, P. Jongsubsook, and Chalermpol Charnsripinyo. “A practical network-based intrusion detection and prevention system.” In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 209-214. IEEE, 2012.
Oliveira, Nuno, Isabel Praça, Eva Maia, and Orlando Sousa. “Intelligent cyber attack detection and classification for network-based intrusion detection systems.” Applied Sciences 11, no. 4 (2021): 1674.
Bawa, Surjit Singh. “How Business can use ERP and AI to become Intelligent Enterprise.”
Amaral, João P., Luís M. Oliveira, Joel JPC Rodrigues, Guangjie Han, and Lei Shu. “Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks.” In 2014 IEEE international conference on communications (ICC), pp. 1796-1801. IEEE, 2014.
Asmita Mahajan, M. Ramachandran, Sathiyaraj Chinnasamy, Ashwini Murugan, “Evaluating sustainable transportation systems using Weight Product method”, REST Journal on Advances in Mechanical Engineering, 1(2),(2022): 33-40
Prasanalakshmi, B., K. Murugan, Karthik Srinivasan, S. Shridevi, Shermin Shamsudheen, and Yu-Chen Hu. “Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography.” The Journal of Supercomputing 78, no. 1 (2022): 361-378.
Kumar, Mukesh, Manish Goyal, Jha Bhavna, Sumit Tomar, and Ashish Kushwah. “An Innovative Procedure for Lip Lengthening in a Patient with a Short Upper Lip and High-Angle Skeletal Class II Pattern: A Case Report.” Journal of Indian Orthodontic Society 55, no. 3 (2021): 315-322.
Kumar, Ashish, Ketan Rathor, Snehit Vaddi, Devanshi Patel, Preethi Vanjarapu, and Manichandra Maddi. “ECG Based Early Heart Attack Prediction Using Neural Networks.” In 2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC), pp. 1080-1083. IEEE, 2022.
Chopra, Amandeep, Manav Lakhanpal, Vikas Singh, Nidhi Gupta, N. C. Rao, and Varun Suri. “The habit of digit sucking among children and the attitude of mothers towards the habit in India.” TMU J Dent 2, no. 1 (2015): 1-4.
Mazini, Mehrnaz, Babak Shirazi, and Iraj Mahdavi. “Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms.” Journal of King Saud University-Computer and Information Sciences 31, no. 4 (2019): 541-553.
Prasanalakshmi, B., A. Kannammal, and R. Sridevi. “Frequency domain combination for preserving data in space specified token with high security.” In Informatics Engineering and Information Science: International Conference, ICIEIS 2011, Kuala Lumpur, Malaysia, November 12-14, 2011. Proceedings, Part I, pp. 319-330. Springer Berlin Heidelberg, 2011.
Gassais, Robin, Naser Ezzati-Jivan, Jose M. Fernandez, Daniel Aloise, and Michel R. Dagenais. “Multi-level host-based intrusion detection system for Internet of things.” Journal of Cloud Computing 9 (2020): 1-16.
Ficke, Eric, Kristin M. Schweitzer, Raymond M. Bateman, and Shouhuai Xu. “Characterizing the effectiveness of network-based intrusion detection systems.” In MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), pp. 76-81. IEEE, 2018.
Dias, Leonardo P., Jés de Jesus Fiais Cerqueira, Karcius DR Assis, and Raul C. Almeida. “Using artificial neural network in intrusion detection systems to computer networks.” In 2017 9th Computer Science and Electronic Engineering (CEEC), pp. 145-150. IEEE, 2017.
Nayeemuddin, M. Ramachandran, Chinnasami Sivaji, Prabakaran Nanjundan, “A Study on Renewable Energy and Wind Power”, REST Journal on Advances in Mechanical Engineering, 1(2), (2022):10-18.
Rathor, Ketan, Keyur Patil, Mandiga Sahasra Sai Tarun, Shashwat Nikam, Devanshi Patel, and Sasanapuri Ranjit. “A Novel and Efficient Method to Detect the Face Coverings to Ensurethe Safety using Comparison Analysis.” In 2022 International Conference on Edge Computing and Applications (ICECAA), pp. 1664-1667. IEEE, 2022.
Chaudhury, Sushovan, Nilesh Shelke, Kartik Sau, B. Prasanalakshmi, and Mohammad Shabaz. “A novel approach to classifying breast cancer histopathology biopsy images using bilateral knowledge distillation and label smoothing regularization.” Computational and Mathematical Methods in Medicine 2021 (2021): 1-11.
Bawa, Surjit Singh. “Implement Gamification to Improve Enterprise Performance.” International Journal of Intelligent Systems and Applications in Engineering 11, no. 2 (2023): 784-788.
Bumb, Swapnil S., D. J. Bhasker, Chandan R. Agali, Himanshu Punia, Vikas Singh, and Safalya Kadtane. “Comparison of oral health knowledge, attitudes, practices and oral hygiene status of Central Reserve Police Force officials in Srinagar, Kashmir.” Elective Medicine Journal 2, no. 1 (2014): 10-14.
Kukreja, Pankaj, Modi Fahd Al Qahtani, Majedah Fahd Al Qahtani, Ahad Fahd Al Qahtani, and Bhavna Jha Kukreja. “Use of stem cells in tissue engineering and reconstruction of the maxillofacial region.” International Journal of Research in Medical Sciences 8, no. 7 (2020): 2740.
Sathiyaraj Chinnasamy, P.K.Chidambaram, M. Ramachandran, Malarvizhi Mani, “Performance Analysis of Sustainable Production Using VIKOR Method”, REST Journal on Advances in Mechanical Engineering, 1(1), (2022):32-39.
Nayyar, Sanchit, Sneha Arora, and Maninder Singh. “Recurrent neural network based intrusion detection system.” In 2020 international conference on communication and signal processing (iccsp), pp. 0136-0140. IEEE, 2020.
Vigna, Giovanni, William Robertson, and Davide Balzarotti. “Testing network-based intrusion detection signatures using mutant exploits.” In Proceedings of the 11th ACM conference on Computer and communications security, pp. 21-30. 2004.
Rathor, Ketan, Sushant Lenka, Kartik A. Pandya, B. S. Gokulakrishna, Susheel Sriram Ananthan, and Zoheib Tufail Khan. “A Detailed View on industrial Safety and Health Analytics using Machine Learning Hybrid Ensemble Techniques.” In 2022 International Conference on Edge Computing and Applications (ICECAA), pp. 1166-1169. IEEE, 2022.
Sujith, A. V. L. N., Guna Sekhar Sajja, V. Mahalakshmi, Shibili Nuhmani, and B. Prasanalakshmi. “Systematic review of smart health monitoring using deep learning and Artificial intelligence.” Neuroscience Informatics 2, no. 3 (2022): 100028.
Xing, Tianyi, Zhengyang Xiong, Dijiang Huang, and Deep Medhi. “SDNIPS: Enabling software-defined networking based intrusion prevention system in clouds.” In 10th International Conference on Network and Service Management (CNSM) and Workshop, pp. 308-311. IEEE, 2014.
S. Siva Shankar, Vimala Saravanan, M. Ramachandran, R. Sangeetha, “Network based Intrusion Detection System using the SPSS Method”, REST Journal on Data Analytics and Artificial Intelligence, 2(1), (2023):82-92. DOI: https://doi.org/10.46632/jdaai/2/1/13