15,99 €
inkl. MwSt.
Sofort per Download lieferbar
  • Format: PDF

Research Paper (undergraduate) from the year 2019 in the subject Computer Science - Applied, VIT University, language: English, abstract: In these days of rising internet usage, almost everyone has access to the internet. It is available easily and readily. So along with increase in popularity and importance it also leads to an increase in risks and susceptibility to unwanted attacks. Networks and servers and more prone to malicious attacks than ever. Cyber security is vital in this age. Lots of organizations now interact and communicate with people via the internet. They store huge amounts of…mehr

Produktbeschreibung
Research Paper (undergraduate) from the year 2019 in the subject Computer Science - Applied, VIT University, language: English, abstract: In these days of rising internet usage, almost everyone has access to the internet. It is available easily and readily. So along with increase in popularity and importance it also leads to an increase in risks and susceptibility to unwanted attacks. Networks and servers and more prone to malicious attacks than ever. Cyber security is vital in this age. Lots of organizations now interact and communicate with people via the internet. They store huge amounts of data in their computers or devices connected to the network. This data should only be accessed by authorized members of the organization. It is possible for hackers to gain unauthorized access to this data. A lot of sensitive information is present in the data which might lead to harm in the hands of hackers. It is important to protect the network from being attacked in such a way. Network security is an element of cyber security which aims to provide services so that the organizations are safe from such attacks. Intrusion detection systems are present in the network which work along with the firewalls to detect and prevent such attacks. For this project, we aim to identify the suitable machine learning technique to detect such attacks and which can be used in state of the art system.
Autorenporträt
Balamurugan Rengeswaran received the B.E. degree in Computer Science and Engineering in 2010 from the Government College of Engineering, Salem and the M.E. degree in Computer Science and Engineering in 2012 from the Bannari Amman Institute of Technology, Sathyamangalam. He is completed his Ph.D in Information and Communication Engineering in 2016 from Anna University, Chennai. Currently he is working as an Associate Professor in Department of Computer Science and Engineering in Vellore Institute of Technology, Vellore. He has published more than 20 papers in various international journals and conferences. His areas of interest include data mining and meta-heuristic optimization techniques.