MAITHILI DESHMUKH | PRMIT&R,Badnera - Academia.edu (original) (raw)
Papers by MAITHILI DESHMUKH
A significant field of investigation in network security is intrusion detection. The detection of... more A significant field of investigation in network security is intrusion detection. The detection of abnormalities in network data is a typical method for intrusion detection, but network threats are developing at an extraordinary speed. The system is exposed to attacks due to the discrepancy between both the development of threats and the network's existing detection reaction time. A variety of machine learning methods have been created over time to identify network breaches using packet forecasting. These methods rely on techniques that can learn automatically from data without explicitly programmed. This is especially practical given the diverse nature of the traffic. Nevertheless, despite these benefits, abuse detection still outperforms anomaly detection systems in the actual world. The principal cause of the low adoption of anomaly-based intrusion detection system is the issue of the significant false positive rate. On a network with considerable traffic, even a 1% false positive rate can result in so many false alerts that an administrator is unable to handle them.
Proceedings of the 2nd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications, 2022
As use of video conferencing and e-meeting systems are often on the Internet and in businesses it... more As use of video conferencing and e-meeting systems are often on the Internet and in businesses it becomes immensely important to be able to play its role from any computer at any location. Often this is impossible, since these systems cannot run without special software that are not readily available everywhere or impossible to install for administrative reasons. Locations also lack the necessary network system configuration such as IP multicast. This paper presents a World Wide Web gateway system that allows users to enable its participation using only a standard web browser tools. The design and architecture of the system are described and performance numbers that show the more flexible approach of the system. —————————— ——————————
International Journal for Research in Applied Science and Engineering Technology
With the rapid development of network-based applications, new risks arise and additional security... more With the rapid development of network-based applications, new risks arise and additional security mechanisms require additional attention to improve speed and accuracy. Although many new security tools have been developed, the rapid rise of malicious activity is a serious problem and the ever-evolving attacks pose serious threats to network security. Network administrators rely heavily on intrusion detection systems to detect such network intrusion activity. A major approach is machine learning methods for intrusion detection, where we learn models from data to differentiate between abnormal and normal traffic. Although machine learning methods are often used, there are some shortcomings in the in-depth analysis of machine learning algorithms in terms of intrusion detection. In this work, we present a comprehensive analysis of some existing machine learning classifiers with respect to known intrusions into network traffic. Specifically, we analyze classification with different dimensions, that is, feature selection, sensitivity to hyper-parameter selection, and class imbalance problems that are involved in intrusion detection. We evaluate several classifications using the NSL-KDD dataset and summarize their effectiveness using detailed experimental evaluation.
Wireless sensor network have a broad range of application in the category of detection and monito... more Wireless sensor network have a broad range of application in the category of detection and monitoring. Data acquisition plays an important role in the field of modern industry control .In any cases remote data should be transferred to monitor center which is far away from the manufacturing field .Traditional data acquisition system by means of wires could not satisfy the requirements, as there is rapid development of embedded system, wireless communication technology and depend on 3G as wireless data transmit terminals will be in use widely in industry. This paper presents a new data acquisition and analyzing system based on 3G technology .In this paper the problem of soldiers is alive or not is considered and a comprehensive framework is proposed for the use of wireless sensor network for real-time jawan’s detection and monitoring .This paper presents a development platform of pulse sensor ,capable of transmitting pulse rate via wireless technology to the control room where the set...
A significant field of investigation in network security is intrusion detection. The detection of... more A significant field of investigation in network security is intrusion detection. The detection of abnormalities in network data is a typical method for intrusion detection, but network threats are developing at an extraordinary speed. The system is exposed to attacks due to the discrepancy between both the development of threats and the network's existing detection reaction time. A variety of machine learning methods have been created over time to identify network breaches using packet forecasting. These methods rely on techniques that can learn automatically from data without explicitly programmed. This is especially practical given the diverse nature of the traffic. Nevertheless, despite these benefits, abuse detection still outperforms anomaly detection systems in the actual world. The principal cause of the low adoption of anomaly-based intrusion detection system is the issue of the significant false positive rate. On a network with considerable traffic, even a 1% false positive rate can result in so many false alerts that an administrator is unable to handle them.
Proceedings of the 2nd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications, 2022
As use of video conferencing and e-meeting systems are often on the Internet and in businesses it... more As use of video conferencing and e-meeting systems are often on the Internet and in businesses it becomes immensely important to be able to play its role from any computer at any location. Often this is impossible, since these systems cannot run without special software that are not readily available everywhere or impossible to install for administrative reasons. Locations also lack the necessary network system configuration such as IP multicast. This paper presents a World Wide Web gateway system that allows users to enable its participation using only a standard web browser tools. The design and architecture of the system are described and performance numbers that show the more flexible approach of the system. —————————— ——————————
International Journal for Research in Applied Science and Engineering Technology
With the rapid development of network-based applications, new risks arise and additional security... more With the rapid development of network-based applications, new risks arise and additional security mechanisms require additional attention to improve speed and accuracy. Although many new security tools have been developed, the rapid rise of malicious activity is a serious problem and the ever-evolving attacks pose serious threats to network security. Network administrators rely heavily on intrusion detection systems to detect such network intrusion activity. A major approach is machine learning methods for intrusion detection, where we learn models from data to differentiate between abnormal and normal traffic. Although machine learning methods are often used, there are some shortcomings in the in-depth analysis of machine learning algorithms in terms of intrusion detection. In this work, we present a comprehensive analysis of some existing machine learning classifiers with respect to known intrusions into network traffic. Specifically, we analyze classification with different dimensions, that is, feature selection, sensitivity to hyper-parameter selection, and class imbalance problems that are involved in intrusion detection. We evaluate several classifications using the NSL-KDD dataset and summarize their effectiveness using detailed experimental evaluation.
Wireless sensor network have a broad range of application in the category of detection and monito... more Wireless sensor network have a broad range of application in the category of detection and monitoring. Data acquisition plays an important role in the field of modern industry control .In any cases remote data should be transferred to monitor center which is far away from the manufacturing field .Traditional data acquisition system by means of wires could not satisfy the requirements, as there is rapid development of embedded system, wireless communication technology and depend on 3G as wireless data transmit terminals will be in use widely in industry. This paper presents a new data acquisition and analyzing system based on 3G technology .In this paper the problem of soldiers is alive or not is considered and a comprehensive framework is proposed for the use of wireless sensor network for real-time jawan’s detection and monitoring .This paper presents a development platform of pulse sensor ,capable of transmitting pulse rate via wireless technology to the control room where the set...