IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Intrusion Detection System Using Deep Learning

Intrusion Detection System Using Deep Learning
View Sample PDF
Author(s): Meeradevi (M.S. Ramaiah Institute of Technology, India), Pramod Chandrashekhar Sunagar (M.S. Ramaiah Institute of Technology, India) and Anita Kanavalli (M.S. Ramaiah Institute of Technology, India)
Copyright: 2022
Pages: 22
Source title: Deep Learning Applications for Cyber-Physical Systems
Source Author(s)/Editor(s): Monica R. Mundada (M.S. Ramaiah Institute of Technology, India), S. Seema (M.S. Ramaiah Institute of Technology, India), Srinivasa K.G. (National Institute of Technical Teachers Training and Research, Chandigarh, India) and M. Shilpa (M.S. Ramaiah Institute of Technology, India)
DOI: 10.4018/978-1-7998-8161-2.ch009

Purchase

View Intrusion Detection System Using Deep Learning on the publisher's website for pricing and purchasing information.

Abstract

With recent advancements in computer network technologies, there has been a growth in the number of security issues in networks. Intrusions like denial of service, exploitation from inside a network, etc. are the most common threat to a network's credibility. The need of the hour is to detect attacks in real time, reduce the impact of the threat, and secure the network. Recent developments in deep learning approaches can be of great assistance in dealing with network interference problems. Deep learning approaches can automatically differentiate between usual and irregular data with high precision and can alert network managers to problems. Deep neural network (DNN) architectures are used with differing numbers of hidden units to solve the limitations of traditional ML models. They also seek to increase predictive accuracy, reduce the rate of false positives, and allow for dynamic changes to the model as new research data is encountered. A thorough comparison of the proposed solution with current models is conducted using different evaluation metrics.

Related Content

Sangeetha V., Evangeline D., Sinthuja M.. © 2022. 16 pages.
Bhimavarapu Usharani. © 2022. 10 pages.
Rajalaxmi Prabhu B., Seema S.. © 2022. 24 pages.
Meeradevi, Monica R. Mundada, Shilpa M.. © 2022. 27 pages.
Sowmya B. J., Pradeep Kumar D., Hanumantharaju R., Gautam Mundada, Anita Kanavalli, Shreenath K. N.. © 2022. 21 pages.
Seema S., Sowmya B. J., Chandrika P., Kumutha D., Nikitha Krishna. © 2022. 20 pages.
Bhimavarapu Usharani. © 2022. 13 pages.
Body Bottom