Refine your search
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Jayaprakash, M.
- Seasonal Variation on Physico-chemical Parameters and Trace Metals in Groundwater of an Industrial Area of North Chennai, India
Abstract Views :431 |
PDF Views:135
Authors
Affiliations
1 Central Groundwater Board, Besant Nagar, Chennai-600 090, IN
2 Department of Applied Geology, University of Madras, Maraimalai Campus, Chennai-600 025, IN
1 Central Groundwater Board, Besant Nagar, Chennai-600 090, IN
2 Department of Applied Geology, University of Madras, Maraimalai Campus, Chennai-600 025, IN
Source
Indian Journal of Science and Technology, Vol 4, No 6 (2011), Pagination: 646-649Abstract
Seasonal variation on physico-chemical parameters and trace metals of groundwater in and around Ambattur industrial area, Chennai were determined. The hydrochemical investigation revealed that the seasonal effect does not change the order of abundance of cations and anions but it does change the concentration of various ions present in the groundwater. Alkali metals (Na+, K+) and strong acids (Cl-, SO4 2-) are dominating over alkaline earth metals (Ca2+, Mg2+) and weak acids (HCO3 -, CO3 2- ) for both seasons. Statistical analysis indicates the highest positive correlation exists between EC and Cl with correlation co-efficient of 0.97 and 0.96 during pre and post-monsoon respectively. Nitrate concentration in the groundwater ranges from 2 to 258 mg/l during pre-monsoon. in the case of post-monsoon, it ranges from 0 to 230 mg/L. During post-monsoon period, nitrate concentration decreased in many wells that are located mostly inside the industrial area. However, it has increased in the residential area, reflecting that the leaching of nitrate from the open sewerage lines. Groundwater in the study area is generally hard, fresh to brackish and low alkaline nature. The unsuitability of groundwater for drinking was identified in few places due to high total hardness and TDS. Fluoride is within the permissible limit for human consumption as per international standards.Keywords
Water Quality, Groundwater, Chennai, Ambattur Industrial Area, IndiaReferences
- APHA (1995) Standard methods for the examination of water and wastewater, 19th ed. Washington, D.C: American Public Association.
- Fetter CW (1990) Applied hydrogeology. New Delhi, India: CBS Publishers & Distributors.
- Kaplay RD and Patode HS (2004) Groundwater pollution due to industrial effluent at Tuppa, New Nanded, Maharashtra. India Environ. Geol. 46, 871– 882.
- Subba Rao N (2006) Seasonal variation of groundwater quality in a part of Guntur District, Andhra Pradesh, India. Environ Geol. 49, 413-429.
- Rima Chatterjee, Gourab Tarafder and Suman Paul (2010) Groundwater quality assessment of Dhanbad district, Jharkhand, India. Bull. Eng. Geol. Environ. 69,137–141.
- Significant Role of E-Resources in Engineering College Libraries–A New Initiatives
Abstract Views :431 |
PDF Views:363
Authors
Affiliations
1 DLIS, Periyar University, Salem – 636011, Tamil Nadu, IN
1 DLIS, Periyar University, Salem – 636011, Tamil Nadu, IN
Source
ScieXplore: International Journal of Research in Science, Vol 3, No 2 (2016), Pagination: 70-72Abstract
With accelerated advance of advice technology the libraries are affective appear e-resources, which are begin to be beneath amount and added accessible for simple access. The frequently accessible cyber banking assets mainly CD-ROMs, OPACs, and Internet etc., which are replacing the present book media in today's accelerated alteration world, advice needs of learners and ability seekers are met through a glut of sources. The e-resources accessible in a library play a above role in facilitating admission to appropriate advice to the users in an simple and active manner. The users accept afflicted their advice gluttonous behavior and demands assets and casework from the libraries electronically. The actualization of agenda technology application agenda media has accelerated the advance and development of advice in bendable from and fabricated the advice action added active and dynamic. The measurements of advice in altered formats creates botheration of access. In case of acceptable library area cardboard based advice and advice arrangement is bedfast to library and advice centers, burning admission appears to be limited. But, in a active arrangement of advice area everybody can admission to advice amid in limited library and advice centers through a arrangement is termed agenda information. The resultant abnormality is the actualization of agenda libraries area burning and simple admission to bookish advice is guaranteed. Since the advertisement action of all types of abstracts is fabricated electronically, the accumulation of agenda library is inevitable.Keywords
Accessing E–Resources, Digital, Electronic Resources.References
- Library of Congress Collections Policy Statements Supplementary Guidelines - Revised . 2008 Oct.
- Available from: http://guides.nyu.edu/databases.
- Use of ICT in Libraries: An Empirical Study of Selected Libraries in Bangladesh by Md. Shariful Islam.
- AICTE hand book 2016-2017 Page No. 103.
- International Journal of Advanced Research in Computer Science and Software Engineering. 2013 Feb; 3(2).
- Research Trends in LIS 2016 – A Festschrift Volume in Honour of Prof.V.Geetha.
- Available from: http://article.sapub.org/10.5923.j.libr ary.20130203.01.html
- Available from: http://www.webpages.uidaho.edu~mbolin/shariful.htm
- Available from: http://www.emeraldinsight.com/doi/ abs/10.1108/00242531111176790
- Available from: http://www.igi-global.com/chapter/ impact-ict-changing-roles-librarian/72467
- Available from: www.google.com.
- Available from: www.wikipedia.com.
- Innovation Driven Librarianship Creating Future Landscape for the New Generation Libraries and LIS Professionals – SRM University, Kattankulathur
- Mahapatra RK. Harnessing Access to Information and Knowledge in Digital Libraries. Chief Librarian, Orissa University of Agriculture & Technology, Bhubaneswar.
- Thangavel P, Jayaprakash M, Prakash T, Santhi B. Role of Virtual Learning and their Issues. International Journal of Science and Humanities. 2015; 1(1A). ISSN 2394 9236.
- Santhi B. E-Learning in Academic Libraries, ICSSR Sponsored Two Days National conference on Impact of Electronic Resources on Teaching, Leaning And Research: Issues and Opportunities, Department of Library and Information Science Alagappa University, Karaikudi, TN.
- Thangavel P, Jayaprakash M. Modern Trends and Problems in Learning and Accessing E-Journals: A Review. IJSRD-International Journal of Scientific Research and Development. 2015; 3(6). ISSN 23210613.
- Prakash T, Thangavel P, Santhi B, Jayaprakash M. Consequence of E-Learning and E-Teaching. UGC Sponsored National Seminar on User Studies in Academic Libraries in the ICT Era. 26th & 27th Aug 2015. Sri Venkateswara University Library, Tirupati.ISBN: 978-93-83635-91-7
- Geochemical Weathering Indices of Core Sediments from the Off-Cuddalore Region, Tamil Nadu, India
Abstract Views :190 |
PDF Views:127
Authors
Affiliations
1 Department of Geology, College of Engineering, Guindy, Anna University, Chennai-600025, IN
2 Department of Applied Geology, University of Madras, Guindy Campus, Chennai-600025, IN
1 Department of Geology, College of Engineering, Guindy, Anna University, Chennai-600025, IN
2 Department of Applied Geology, University of Madras, Guindy Campus, Chennai-600025, IN
Source
International Journal of Earth Sciences and Engineering, Vol 9, No 1 (2016), Pagination: 43-51Abstract
Geoscientists are using many different approaches to study the deep-sea sediment cores. The various elements in the sediments help to determine how far terrigenous particles might have been transported from where they originated on the continent as a weathering product. Ocean sediments are the final product of weathering and of biogeochemical processes occurring in the ocean. This makes deep-sea sediment composition also a record of climate change on earth. The Weathering Indices are tools to calculate the weathering intensity of the sediments. Within this view, core sediments were collected from Bay of Bengal, off Cuddalore at the depth of 2591 m and the sub-samples with an interval of 5 cm. The textural study clearly indicates that the core sediments dominate with high amount of mud (Silt+Clay). From the correlation analyses, Al2O3 is found to be strongly correlated with Iron, Calcium and Magnesium Oxides. Weathering indices such as Chemical Index of Alteration (CIA), Chemical Index of Weathering (CIW), and Plagioclase Index of Alteration (PIA) were evaluated. CIA values (60.65%) indicate moderate chemical weathering of the source rock under tropical to subtropical climatic conditions. PIA values (62.83%) off Cuddalore indicate the presence of plagioclase feldspars in core sediments.Keywords
Weathering Indices, Major Oxides, CIA, PIA and Off Cuddalore.- Geological challenges in limestone quarrying and strategies to improve fragmentation in blasting
Abstract Views :85 |
PDF Views:0
Authors
Affiliations
1 Department of Mining Engineering, College of Engineering Guindy, Anna University, Chennai, Tamilnadu 600025, IN
2 Department of Mining Engineering, Indian Institute of Technology (ISM), Dhanbad, Jharkhand 826004, IN
3 Department of Applied Geology, University of Madras, Chennai, Tamilnadu 600025, IN
4 Geo Exploration and Mining Solutions, Salem, Tamilnadu 636 004, IN
1 Department of Mining Engineering, College of Engineering Guindy, Anna University, Chennai, Tamilnadu 600025, IN
2 Department of Mining Engineering, Indian Institute of Technology (ISM), Dhanbad, Jharkhand 826004, IN
3 Department of Applied Geology, University of Madras, Chennai, Tamilnadu 600025, IN
4 Geo Exploration and Mining Solutions, Salem, Tamilnadu 636 004, IN
Source
Journal of Mines, Metals and Fuels, Vol 70, No 1 (2022), Pagination: 18-25Abstract
Globally, the surface mining is considered to be primay mining operation for achieving sustained mineral production, which has shown augmented production with significant deployment of large capacity. These equipment require higher investment, and thus, mining engineers should plan to attain the best performance from these equipment. The capability of the loading and hauling equipment largely entrusted on the outome of the blast, particularly, the fragmentation and spreading of rockpile. Generally, the mine owners ignore geological descriptions and features apart from the nature of rock and began quickly quantifying the rockmass properties only whether it is hard or soft based on its geomechanical properties. From the geological studies, it is understood that the response of deep weathering of any deep-seated massive rock resulting in producing thick boulders. These embedded boulders possess the characteristics completely different that of surrounding rockmass and any other soil present in the vicinity. The blast fragment size generally dictates the output of equipment working in such formation and affects the productivity of the mine. Thus, an effective blasting is need of the hour in such formations that affects the cost of entire mining activities. Therefore, it is important to study the effect of blasting parameters on fragmentation of such embedded boulders through existing field practices and also using the advanced blasting technologies. This paper concerned with the fragmentation of embedded boulders/floaters under difficult geological conditions. Geology plays a critical role in every aspects of a blast’s performance and it is the chief uncontrollable factor to be considered for any blast design. The authors discuss the difficulties in identifying the embedded boulders by understanding the geological features properly and discussed the possible solutions to enhance its breakage during the blasting through conducting few experimental blasts in a limestone quarry.Keywords
Geology, mining, embedded boulder; blast design and fragmentation.References
- Anon, (2018): Metals and Mining Industry in India, India Brand Equity Foundation, NewDelhi, India.
- Vardhan Alok, Kumar Ajit , and Dasgupta, K., (2017): Effect of various parameters on the performance of the blasthole drilling, Journal of Mines, Metals and Fuels, 65(2), pp.49-54.
- Bhandari, S., (1997): Engineering rock blasting operations. A. A. Balkema. 388p.
- Bhatawdekar, R.M., Mohamad, Edy Tonnizam, Singh, T.N. and Armaghani, D.J., (2019): Drilling and blasting improvement in aggregate quarry at Thailand - a case study, Journal of Mines, Metals and Fuels, 67(7), pp. 357-362.
- Balamadeswaran, P., Mishra, A.K., Phalguni, S., Ifthikhar A.M., (2017): Blast performance analysis using digital image processing technique –key to unlock productivity in quarries, Journal of Mines, Metals & Fuels, 65(5), 245- 251.
- Balamadeswaran, P, Mishra, A.K., Phalguni Sen, and Ramesh. S, (2018): Investigations into the influence of decking on rock fragmentation and ground vibrations by blasting in shallow benches of limestone quarries – a case study, Journal of Mines, Metals & Fuels, 66(1), pp.39-48.
- Balamadeswaran, P., and Mishra, A.K., (2020): Controlled blasting practices in quarries for sustainability: a case study, Journal of Mines, Metals & Fuels, 68(8), 251-263.
- Chakraborty, A.K., Raina, A.K., Ramulu, M., Choudhury, P.B., Haldar, A., Sahu, P., Bandopadhyay, C., (2004): Parametric study to develop guidelines for blast fragmentation improvement in jointed and massive formations, Engineering Geology, 73, pp.105–116.
- Felletti, F., and Beretta, G.P., (2009): Expectation of boulder frequency when tunneling in glacial till: A statistical approach based on transition probability. Engineering Geology 108, pp.43–53.
- Fletcher, R.C., Buss, H.L., and Brantley, S.L., (2006): A spheroidal weathering model coupling porewater chemistry to soil thicknesses during steady-state denudation, Earth and Planetary Science Letters, 244 pp.444-457.
- Franklin, J.A., Kemeny J.M., and Girdner, K.K., (1996): Evolution of measuring systems: A review, Measurement of Blast Fragmentation, Ed by J.A. Franklin and T. Katsabanis, Rotterdam: Balkema, pp.47-52.
- Hagan, T.N., and Reid, I.W., (1983): Performance monitoring of production blast hole drilling- A mean of increasing blasting efficiency, Proceedings of 2nd Surface Mining and Quarrying Symposium, Bristol, U.K, pp.20-30.
- Hembram, P., Sawmliana, C., Singh, R.K., Roy, P P., and Thakre, R., (2017): Effect of layer thickness of rocks on blast fragmentation-case study in a limestone mine, Journal of Mines, Metals and Fuels, 65(6), pp. 375-379.
- Hustrulid, W., (1999): Blasting Principles for Open Pit Mining, Volume- 1, General Design Concepts, A.A. Balkema, Rotterdam, 344p.
- IAEG - International Association of Engineering Geology (ed) (1981): Rock and soil description and classification for engineering geological mapping. Report by the IAEG Commission on Engineering Geological Mapping. Bull. Int. Assoc. Engineering Geology, 24, pp. 235-274.
- ISRM - International Society for Rock Mechanics (ed) (1978): Suggested methods for the quantitative description of discontinuities in rock masses. Commission on Standardization of Laboratory and Field Tests, Document No. 4. International Journal of Rock Mechanics and Mining Sciences & Geomechanics Abstracts, 15, pp. 319-368.
- Jamtveit, B., and Hammer, O., (2011): Chapter 7- Hierarchical fracturing during weathering and serpentinisation, Geochemical Perspect, pp. 418–432.
- Jimeno, C.L., Jimeno, E.L., and Carcedo, F.J.A., (1995): Drilling and Blasting of Rocks, A.A. Balkema, Rotterdam. 391p.
- Karthikeyan, E., Sakthivel, P., Sarath Prasana, K.B., Balamadeswaran, P., and Magesh, G.R., (2014): Detection and Mitigation of Boulder Formation in Surface Mine Blasting, Proceeding of Expo and Symposium on Mining, (MineFest India’2014), Neyveli, Mining Engineers Association of India (Tamilnadu Chapter), pp. 185-195.
- Keneti, A., and Sainsbury, B., (2018): Review of published rockburst events and their contributing factors, Engineering Geology, 246, pp. 361–373.
- Mishra, A.K., Balamadeswaran, P., and Sen, Phalguni., (2003): An Approach to Eco-blasting for Environmentally Sensitive Areas – A Review, Mining Engineers’ Journal, 5, pp. 17-23.
- Monjezi, M., Mohamadi, H.A., Barati, B., and Khandelwal, M., (2014): Application of soft computing in predicting rock fragmentation to reduce environmental blasting side effects, Arabian Journal of Geosciences, 7, pp. 505-511.
- Nageswara, R.J., and Srinivasan, R., (1980): Some aspects of geomorphology, structure and sedimentation in Palaghat Gap area, Geological Survey of India, Special Publication, 5, pp. 39-43.
- Raina, A.K., Choudhury, P.B., Ramulu, M., Chakraborty, A.K., and Dudhankar, A.S., (2002): Fragalyst – an indigenous digital image analysis system for grain size measurement in mines, Journal of the Geological Society of India, 59, pp. 561–569.
- Raina, A.K., (2012): A history of digital image analysis technique for blast fragmentation assessment and some Indian contributions, Electrical Measuring Instruments and Measurements, November 5, 3.
- Richard, C. B., and Lynn, B.Y., (2016): Site Characterization in Karst and Pseudokarst Terraines, Practical Strategies and Technology for Practicing Engineers, Hydrologists and Geologists, Springer, Dordrecht, 421p.
- Rishikesh Vajre, Suraj Desmukh and Raina, A.K., (2019): Some insights into fracturing of rock due to blasting in homogeneous material using particle flow code, Journal of Mines, Metals and Fuels, 67(1), pp. 24-30.
- Roy, M.P., and Singh, P.K., (2016): Damage to surface structures due to blasting, Journal of Mines, Metals and Fuels, 64(9), pp.375-385.
- Sasaoka, T., Shimada, H., Hamanaka, A., and Matsui, K., (2011): Study on Blast Vibration and Size of Fragmentation at Limestone Quarry, Proceedings of 20th International Symposium on Mine Planning and Equipment Selection, Almaty. 12-14, pp. 714-730.
- Sastry, V.R. and Chandar, K.R., (2012), Assessment of objective based blast performance: Ranking system, Workshop on Measurement and Analysis of Blast Fragmentation, Sanchidrián & Singh (Eds), Proceedings of 10th International Symposium on Fragmentation by Blasting (FRAGBLAST’2012), New Delhi, pp.100-106.
- Scott, A. and Onederra, I. (2015): Charaterising rock mass properties for fragmentation modelling, Proceedings of 11th International Symposium on Fragmentation by Blasting (FRAGBLAST’2015), Sydney, pp.149-160.
- Singh, C.P., Hemant Agarwal, and Mishra, A.K., (2019): Reducing environmental hazards of blasting using electronic detonators in a large opencast coal project – a case study, Journal of Mines, Metals and Fuels, 67(7), pp. 357-362.
- Twidale, C.R., (1982): Part II: Major forms and assemble, Chapter 4- Boulders. In: Granite Landforms. Amsterdam: Elsevier, pp. 89–123.
- Veneziano, D., and Van Dyck, (2006): Statistics of Boulder Encounters during Shaft Excavation, Rock Mechanics and Rock Engineering, 39, 339–358.
- Yan, P., Zhao, Z., Lu, W., Fan, Y., Chen, X., Shan, Z., (2015): Mitigation of rock burst events by blasting techniques during deep-tunnel excavation, Engineering Geology, 188, pp. 126–136.
- Zheng, H., Li, T., Shen, J., Xu, C., Sun, H., Lüd, Q., (2018): The effects of blast damage zone thickness on rock slope stability, Engineering Geology, 246, pp. 19–27.
- Intrusion Detection System To Avoid Malicious Intruders In Higher Layer Network Security
Abstract Views :84 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Veltech Hightech Dr.Rangarajan Dr.Sakunthala Engineering College, India., IN
2 Department of Computer Science and Engineering, Prathyusha Engineering College, India., IN
3 Department of Computer Science and Engineering, Panimalar Engineering College, India., IN
4 Department of Information Technology, RMK Engineering College, India., IN
1 Department of Computer Science and Engineering, Veltech Hightech Dr.Rangarajan Dr.Sakunthala Engineering College, India., IN
2 Department of Computer Science and Engineering, Prathyusha Engineering College, India., IN
3 Department of Computer Science and Engineering, Panimalar Engineering College, India., IN
4 Department of Information Technology, RMK Engineering College, India., IN
Source
ICTACT Journal on Communication Technology, Vol 9, No 2 (2018), Pagination: 2868-2875Abstract
Online criminals are focusing their attention more and more on ordinary computer users, seeking to take advantage of them through a variety of social and technological exploitation techniques. Some hackers are getting more skilled and determined. The ability to conceal their identities, keep their communications secret, keep their finances separate from their activities, and make use of private infrastructure are all areas in which cybercriminals have shown a high degree of proficiency. It is of the utmost importance to safeguard computers with surveillance systems that are able to identify complex varieties of malware. In this paper, we utilized machine learning algorithm to validate the samples from different datasets. The machine learning classifier is utilized to find the efficacy of the entire model in validating the class samples. The simulation is conducted in python to test the efficacy of the model against various class of datasets. The results show that the proposed method achieves higher degree of accuracy than the other models.Keywords
IDS, Security, Attack, Network Security.References
- Jiankun Hu, Xinghuo Yu, D. Qiu and Hsiao-Hwa Chen, “A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion Detection”, IEEE Network, Vol. 23, No. 1, pp. 42-47, 2009.
- K.K. Gupta, and R. Kotagiri, “Layered Approach Using Conditional Random Fields for Intrusion Detection”, IEEE Transactions on Dependable and Secure Computing, Vol. 7, No. 1, pp. 35-49, 2010.
- S. Devaraju and S. Ramakrishnan, “Performance Analysis of Intrusion Detection System using Various Neural Network Classifiers”, Proceedings of International Conference on International Conference on Recent Trends in Information Technology, pp. 1033-1038, 2011.
- Mendonça, R. V., Teodoro, A. A., Rosa, R. L., Saadi, M., Melgarejo, D. C., Nardelli, P. H., & Rodríguez, D. Z. (2021). IDS based on fast hierarchical deep convolutional neural network. IEEE Access, 9, 61024-61034.
- Neveen I. Ghali, “Feature Selection for Effective AnomalyBased Intrusion Detection”, International Journal of Computer Science and Network Security, Vol. 9, No. 3, pp. 285-289, 2009.
- R. Plutchik, “Emotion: Theory, Research, and Experience”, Academic Press, 1980.
- P.R. Kanna and P. Santhi, “Unified Deep Learning Approach for Efficient IDS using Integrated SpatialTemporal Features”, Knowledge-Based Systems, Vol. 226, pp. 107132-107143, 2021.
- H. Hindy, E. Bayne and M. Bures, “Machine Learning Based IoT Intrusion Detection System: An MQTT Case Study”, Proceedings of International Conference on Network, pp.1-14, 2020.
- M. Zhou, L. Han, H. Lu and C. Fu, “Intrusion Detection System for IoT Heterogeneous Perceptual Network”, Mobile Networks and Applications, Vol. 33, No. 1, pp. 1-14, 2020.
- L. Xiao, X. Wan, X. Lu and Y. Zhang, “IoT Security Techniques based on Machine Learning: How do IoT Devices use AI to Enhance Security?”, IEEE Signal Processing Magazine, Vol. 35, No. 5, pp. 41-49, 2018.
- B. Gobinathan and V.P. Sundramurthy, “A Novel Method to Solve Real Time Security Issues in Software Industry using Advanced Cryptographic Techniques”, Scientific Programming, Vol. 2021, pp. 1-9, 2021.
- Z.K. Maseer, “Benchmarking of Machine Learning for Anomaly Based IDSs in the CICIDS2017 Dataset”, IEEE Access, Vol. 9, pp. 22351-22370, 2021.
- X. Li and L. Wu, “Building Auto-Encoder IDS based on Random Forest Feature Selection”, Computers and Security, Vol. 95, pp. 101851-101865, 2020.
- T. Saba and S.A. Bahaj, “Anomaly-based IDS for IoT Networks through Deep Learning Model”, Computers and Electrical Engineering, Vol. 99, pp. 107810-107818, 2022.
- R. Ferdiana, “A Systematic Literature Review of IDS for Network Security: Research Trends, Datasets and Methods”, Proceedings of International Conference on Informatics and Computational Sciences, pp. 1-6, 2020.
- Intrusion Detection System To Avoid Malicious Intruders In Higher Layer Network Security
Abstract Views :148 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Veltech Hightech Dr.Rangarajan Dr.Sakunthala Engineering College, India., IN
2 Department of Computer Science and Engineering, Prathyusha Engineering College, India., IN
3 Department of Computer Science and Engineering, Panimalar Engineering College, India., IN
4 Department of Information Technology, RMK Engineering College, India., IN
1 Department of Computer Science and Engineering, Veltech Hightech Dr.Rangarajan Dr.Sakunthala Engineering College, India., IN
2 Department of Computer Science and Engineering, Prathyusha Engineering College, India., IN
3 Department of Computer Science and Engineering, Panimalar Engineering College, India., IN
4 Department of Information Technology, RMK Engineering College, India., IN
Source
ICTACT Journal on Communication Technology, Vol 14, No 1 (2023), Pagination: 2868-2875Abstract
Online criminals are focusing their attention more and more on ordinary computer users, seeking to take advantage of them through a variety of social and technological exploitation techniques. Some hackers are getting more skilled and determined. The ability to conceal their identities, keep their communications secret, keep their finances separate from their activities, and make use of private infrastructure are all areas in which cybercriminals have shown a high degree of proficiency. It is of the utmost importance to safeguard computers with surveillance systems that are able to identify complex varieties of malware. In this paper, we utilized machine learning algorithm to validate the samples from different datasets. The machine learning classifier is utilized to find the efficacy of the entire model in validating the class samples. The simulation is conducted in python to test the efficacy of the model against various class of datasets. The results show that the proposed method achieves higher degree of accuracy than the other models.Keywords
IDS, Security, Attack, Network Security.References
- Jiankun Hu, Xinghuo Yu, D. Qiu and Hsiao-Hwa Chen, “A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion Detection”, IEEE Network, Vol. 23, No. 1, pp. 42-47, 2009.
- K.K. Gupta, and R. Kotagiri, “Layered Approach Using Conditional Random Fields for Intrusion Detection”, IEEE Transactions on Dependable and Secure Computing, Vol. 7, No. 1, pp. 35-49, 2010.
- S. Devaraju and S. Ramakrishnan, “Performance Analysis of Intrusion Detection System using Various Neural Network Classifiers”, Proceedings of International Conference on International Conference on Recent Trends in Information Technology, pp. 1033-1038, 2011.
- Mendonça, R. V., Teodoro, A. A., Rosa, R. L., Saadi, M., Melgarejo, D. C., Nardelli, P. H., & Rodríguez, D. Z. (2021). IDS based on fast hierarchical deep convolutional neural network. IEEE Access, 9, 61024-61034.
- Neveen I. Ghali, “Feature Selection for Effective AnomalyBased Intrusion Detection”, International Journal of Computer Science and Network Security, Vol. 9, No. 3, pp. 285-289, 2009.
- R. Plutchik, “Emotion: Theory, Research, and Experience”, Academic Press, 1980.
- P.R. Kanna and P. Santhi, “Unified Deep Learning Approach for Efficient IDS using Integrated SpatialTemporal Features”, Knowledge-Based Systems, Vol. 226, pp. 107132-107143, 2021.
- H. Hindy, E. Bayne and M. Bures, “Machine Learning Based IoT Intrusion Detection System: An MQTT Case Study”, Proceedings of International Conference on Network, pp.1-14, 2020.
- M. Zhou, L. Han, H. Lu and C. Fu, “Intrusion Detection System for IoT Heterogeneous Perceptual Network”, Mobile Networks and Applications, Vol. 33, No. 1, pp. 1-14, 2020.
- L. Xiao, X. Wan, X. Lu and Y. Zhang, “IoT Security Techniques based on Machine Learning: How do IoT Devices use AI to Enhance Security?”, IEEE Signal Processing Magazine, Vol. 35, No. 5, pp. 41-49, 2018.
- B. Gobinathan and V.P. Sundramurthy, “A Novel Method to Solve Real Time Security Issues in Software Industry using Advanced Cryptographic Techniques”, Scientific Programming, Vol. 2021, pp. 1-9, 2021.
- Z.K. Maseer, “Benchmarking of Machine Learning for Anomaly Based IDSs in the CICIDS2017 Dataset”, IEEE Access, Vol. 9, pp. 22351-22370, 2021.
- X. Li and L. Wu, “Building Auto-Encoder IDS based on Random Forest Feature Selection”, Computers and Security, Vol. 95, pp. 101851-101865, 2020.
- T. Saba and S.A. Bahaj, “Anomaly-based IDS for IoT Networks through Deep Learning Model”, Computers and Electrical Engineering, Vol. 99, pp. 107810-107818, 2022.
- R. Ferdiana, “A Systematic Literature Review of IDS for Network Security: Research Trends, Datasets and Methods”, Proceedings of International Conference on Informatics and Computational Sciences, pp. 1-6, 2020.