MAITHILI DESHMUKH | PRMIT&R,Badnera - Academia.edu (original) (raw)

Papers by MAITHILI DESHMUKH

Research paper thumbnail of Detection and Prevention of Malicious Activities in Vulnerable Network Security Using Deep Learning

Research paper thumbnail of NETWORK AND HOST BASED INTRUSION DETECTION MODEL USING VARIOUS MACHINE LEARNING AND DEEP LEARNING ALGORITHMS

A significant field of investigation in network security is intrusion detection. The detection of... more A significant field of investigation in network security is intrusion detection. The detection of abnormalities in network data is a typical method for intrusion detection, but network threats are developing at an extraordinary speed. The system is exposed to attacks due to the discrepancy between both the development of threats and the network's existing detection reaction time. A variety of machine learning methods have been created over time to identify network breaches using packet forecasting. These methods rely on techniques that can learn automatically from data without explicitly programmed. This is especially practical given the diverse nature of the traffic. Nevertheless, despite these benefits, abuse detection still outperforms anomaly detection systems in the actual world. The principal cause of the low adoption of anomaly-based intrusion detection system is the issue of the significant false positive rate. On a network with considerable traffic, even a 1% false positive rate can result in so many false alerts that an administrator is unable to handle them.

Research paper thumbnail of Detection and Prevention of Malicious Activities in Vulnerable Network Security Using Deep Learning

Proceedings of the 2nd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications, 2022

Research paper thumbnail of IP Multicast E-Meetings through Multipurpose Internet Mail Web Gateway

As use of video conferencing and e-meeting systems are often on the Internet and in businesses it... more As use of video conferencing and e-meeting systems are often on the Internet and in businesses it becomes immensely important to be able to play its role from any computer at any location. Often this is impossible, since these systems cannot run without special software that are not readily available everywhere or impossible to install for administrative reasons. Locations also lack the necessary network system configuration such as IP multicast. This paper presents a World Wide Web gateway system that allows users to enable its participation using only a standard web browser tools. The design and architecture of the system are described and performance numbers that show the more flexible approach of the system. ——————————  ——————————

Research paper thumbnail of Review Paper on Network Data Verification Using Machine Learning Classifiers Based On Reduced Feature Dimensions

International Journal for Research in Applied Science and Engineering Technology

With the rapid development of network-based applications, new risks arise and additional security... more With the rapid development of network-based applications, new risks arise and additional security mechanisms require additional attention to improve speed and accuracy. Although many new security tools have been developed, the rapid rise of malicious activity is a serious problem and the ever-evolving attacks pose serious threats to network security. Network administrators rely heavily on intrusion detection systems to detect such network intrusion activity. A major approach is machine learning methods for intrusion detection, where we learn models from data to differentiate between abnormal and normal traffic. Although machine learning methods are often used, there are some shortcomings in the in-depth analysis of machine learning algorithms in terms of intrusion detection. In this work, we present a comprehensive analysis of some existing machine learning classifiers with respect to known intrusions into network traffic. Specifically, we analyze classification with different dimensions, that is, feature selection, sensitivity to hyper-parameter selection, and class imbalance problems that are involved in intrusion detection. We evaluate several classifications using the NSL-KDD dataset and summarize their effectiveness using detailed experimental evaluation.

Research paper thumbnail of Wireless Data Transmission and Acquisition for Alive detection

Wireless sensor network have a broad range of application in the category of detection and monito... more Wireless sensor network have a broad range of application in the category of detection and monitoring. Data acquisition plays an important role in the field of modern industry control .In any cases remote data should be transferred to monitor center which is far away from the manufacturing field .Traditional data acquisition system by means of wires could not satisfy the requirements, as there is rapid development of embedded system, wireless communication technology and depend on 3G as wireless data transmit terminals will be in use widely in industry. This paper presents a new data acquisition and analyzing system based on 3G technology .In this paper the problem of soldiers is alive or not is considered and a comprehensive framework is proposed for the use of wireless sensor network for real-time jawan’s detection and monitoring .This paper presents a development platform of pulse sensor ,capable of transmitting pulse rate via wireless technology to the control room where the set...

Research paper thumbnail of Detection and Prevention of Malicious Activities in Vulnerable Network Security Using Deep Learning

Research paper thumbnail of NETWORK AND HOST BASED INTRUSION DETECTION MODEL USING VARIOUS MACHINE LEARNING AND DEEP LEARNING ALGORITHMS

A significant field of investigation in network security is intrusion detection. The detection of... more A significant field of investigation in network security is intrusion detection. The detection of abnormalities in network data is a typical method for intrusion detection, but network threats are developing at an extraordinary speed. The system is exposed to attacks due to the discrepancy between both the development of threats and the network's existing detection reaction time. A variety of machine learning methods have been created over time to identify network breaches using packet forecasting. These methods rely on techniques that can learn automatically from data without explicitly programmed. This is especially practical given the diverse nature of the traffic. Nevertheless, despite these benefits, abuse detection still outperforms anomaly detection systems in the actual world. The principal cause of the low adoption of anomaly-based intrusion detection system is the issue of the significant false positive rate. On a network with considerable traffic, even a 1% false positive rate can result in so many false alerts that an administrator is unable to handle them.

Research paper thumbnail of Detection and Prevention of Malicious Activities in Vulnerable Network Security Using Deep Learning

Proceedings of the 2nd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications, 2022

Research paper thumbnail of IP Multicast E-Meetings through Multipurpose Internet Mail Web Gateway

As use of video conferencing and e-meeting systems are often on the Internet and in businesses it... more As use of video conferencing and e-meeting systems are often on the Internet and in businesses it becomes immensely important to be able to play its role from any computer at any location. Often this is impossible, since these systems cannot run without special software that are not readily available everywhere or impossible to install for administrative reasons. Locations also lack the necessary network system configuration such as IP multicast. This paper presents a World Wide Web gateway system that allows users to enable its participation using only a standard web browser tools. The design and architecture of the system are described and performance numbers that show the more flexible approach of the system. ——————————  ——————————

Research paper thumbnail of Review Paper on Network Data Verification Using Machine Learning Classifiers Based On Reduced Feature Dimensions

International Journal for Research in Applied Science and Engineering Technology

With the rapid development of network-based applications, new risks arise and additional security... more With the rapid development of network-based applications, new risks arise and additional security mechanisms require additional attention to improve speed and accuracy. Although many new security tools have been developed, the rapid rise of malicious activity is a serious problem and the ever-evolving attacks pose serious threats to network security. Network administrators rely heavily on intrusion detection systems to detect such network intrusion activity. A major approach is machine learning methods for intrusion detection, where we learn models from data to differentiate between abnormal and normal traffic. Although machine learning methods are often used, there are some shortcomings in the in-depth analysis of machine learning algorithms in terms of intrusion detection. In this work, we present a comprehensive analysis of some existing machine learning classifiers with respect to known intrusions into network traffic. Specifically, we analyze classification with different dimensions, that is, feature selection, sensitivity to hyper-parameter selection, and class imbalance problems that are involved in intrusion detection. We evaluate several classifications using the NSL-KDD dataset and summarize their effectiveness using detailed experimental evaluation.

Research paper thumbnail of Wireless Data Transmission and Acquisition for Alive detection

Wireless sensor network have a broad range of application in the category of detection and monito... more Wireless sensor network have a broad range of application in the category of detection and monitoring. Data acquisition plays an important role in the field of modern industry control .In any cases remote data should be transferred to monitor center which is far away from the manufacturing field .Traditional data acquisition system by means of wires could not satisfy the requirements, as there is rapid development of embedded system, wireless communication technology and depend on 3G as wireless data transmit terminals will be in use widely in industry. This paper presents a new data acquisition and analyzing system based on 3G technology .In this paper the problem of soldiers is alive or not is considered and a comprehensive framework is proposed for the use of wireless sensor network for real-time jawan’s detection and monitoring .This paper presents a development platform of pulse sensor ,capable of transmitting pulse rate via wireless technology to the control room where the set...