Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/16462
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rathor, Ketan | - |
dc.contributor.author | Keerthika, V | - |
dc.contributor.author | Sunanda, Karkala | - |
dc.contributor.author | Renuga, K | - |
dc.contributor.author | Shobana, A | - |
dc.contributor.author | Anusuya, M | - |
dc.date.accessioned | 2024-08-29T05:41:11Z | - |
dc.date.available | 2024-08-29T05:41:11Z | - |
dc.date.issued | 2024 | - |
dc.identifier.citation | pp. 1-6 | en_US |
dc.identifier.isbn | 9798350365337 | - |
dc.identifier.uri | https://doi.org/10.1109/ICCDS60734.2024.10560434 | - |
dc.identifier.uri | https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/16462 | - |
dc.description.abstract | Novel approaches to strengthen network security are required in the dynamic field of cybersecurity due to the increasing prevalence of Advanced Persistent Threats (APTs). To combat APTs, this study builds and tests a high-tech network traffic monitoring system that uses a Kernel Function to train a Nonlinear Support Vector Machine (SVM). In terms of offering thorough and precise threat detection, current models frequently fail. The impressive accuracy of 92%, precision of 88%, recall of 94%, and F1-Score of 0.95 demonstrate the better performance of our suggested system. An essential component of real-time threat detection, the connection with Apache Spark MLlib guarantees rapid processing of large-scale datasets and scalability. In a groundbreaking move, this study integrates distributed computing with nonlinear support vector machines (SVMs), creating an adaptive and resilient approach that surpasses previous models in APT detection in terms of accuracy and dependability. Our proposed model stands out from the competition thanks to the metrics that have been given and shown in a detailed bar chart. In addition to developing a new method for APT detection, this study establishes a new standard for the effectiveness of network security, which will allow for more robust cybersecurity frameworks to withstand changing threats. © 2024 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | ICCDS 2024 - International Conference on Computing and Data Science | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.subject | Accuracy | en_US |
dc.subject | Advanced Persistent Threats (Apts) | en_US |
dc.subject | Apache Spark Machine Learning Library(Mllib) | en_US |
dc.subject | Cybersecurity | en_US |
dc.subject | Distributed Computing | en_US |
dc.subject | F1-Score | en_US |
dc.subject | Innovative Cybersecurity Solutions | en_US |
dc.subject | Intrusion Detection | en_US |
dc.subject | Kernel Function | en_US |
dc.subject | Large-Scale Datasets | en_US |
dc.subject | Machine Learning | en_US |
dc.subject | Network Security | en_US |
dc.subject | Network Traffic Analysis | en_US |
dc.subject | Nonlinear Support Vector Machine (Svm) | en_US |
dc.subject | Precision | en_US |
dc.subject | Real-Time Threat Detection | en_US |
dc.subject | Recall | en_US |
dc.subject | Scalability | en_US |
dc.subject | Security Infrastructure Integration | en_US |
dc.subject | Threat Detection | en_US |
dc.title | Enhancing Network Security Against Apts Through Svm-Based Network Traffic Analysis: Identifying Anomalies In Communication Flows | en_US |
dc.type | Article | en_US |
Appears in Collections: | Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.