Intrusion Detection System Using Machine Learning Models

Поделиться
HTML-код
  • Опубликовано: 3 фев 2025

Комментарии • 44

  • @anithau1864
    @anithau1864 6 лет назад +9

    Nice work..Can you please provide pdf or any document having details related to implementation.

  • @peilunwu7857
    @peilunwu7857 6 лет назад

    Supervised learning, such as DT, SVM,RF, is mainly used for misuse detection rather than anomaly detection.
    Statistical Learning and unsupervised learning, such as GAA, Clustering are used for ADS.

  • @saidouiazzane2297
    @saidouiazzane2297 5 лет назад

    Thank you very much for sharing this good video

  • @akashantony2540
    @akashantony2540 6 лет назад +1

    Hi Sumit. I am trying to replicate or create a new dataset as per my network details. So how can we retrieve all the mentioned features. Will a TCPdump, data cleaning/ preprocessing and fetching for the important features be a good approach?

  • @shivakumarbadiger4520
    @shivakumarbadiger4520 3 года назад +1

    Sir, How can we implement this project in real time traffic.?

  • @manishapatro6402
    @manishapatro6402 5 лет назад +1

    Can I get the link for the dataset ?

  • @anshularora59
    @anshularora59 3 года назад +1

    can you provide jupyter notebook of the code??

  • @saichandana9145
    @saichandana9145 4 года назад

    What is the security policy in this

  • @oscarbecerril8343
    @oscarbecerril8343 7 лет назад

    Thank you for this!

  • @ibrahimabdullah9289
    @ibrahimabdullah9289 4 года назад

    Can you please provide any document having details related to implementation.?

  • @artcraftwithprerna6436
    @artcraftwithprerna6436 6 лет назад +1

    may i get the pdf to which u reffered.. plz

  • @alialjanabi9157
    @alialjanabi9157 4 года назад

    thank you.

  • @ushakumari9500
    @ushakumari9500 6 лет назад

    can you please share how to validate the result using snort. thanking you

  • @gtuber7093
    @gtuber7093 7 лет назад

    which tool is used in this paper

  • @Pravin1986PJ
    @Pravin1986PJ 5 лет назад

    It is never possible to detect any real time attack using all network dataset like KDDCUP, NSLKDD, ISCX, BOTNET etc.? How many peoples says it's IDS don't no?

    • @nyaladzo
      @nyaladzo 3 года назад

      How do i access network data set

    • @Pravin1986PJ
      @Pravin1986PJ 3 года назад

      @@nyaladzo you need to setup winpcap first then packetx library is used for collect incoming packets

  • @abhijeet6989
    @abhijeet6989 6 лет назад

    Sir, I have still confusion cay you tell me how to understand sample contain malware

  • @artcraftwithprerna6436
    @artcraftwithprerna6436 6 лет назад

    may i get the pdf to which u referred.... plz

  • @sandipdas6048
    @sandipdas6048 4 года назад

    sir can I get the implementation of this project?

  • @computerengineer8412
    @computerengineer8412 4 года назад

    Sir I need the project may I contact you

  • @gonzagaaimable2099
    @gonzagaaimable2099 6 лет назад

    how can anyone contact you please

  • @mridulchopra5447
    @mridulchopra5447 6 лет назад +1

    Could you provide source code for this ??

  • @kush6259
    @kush6259 4 года назад

    Please share the implementation details of the project

  • @AshishKumar-xs9wt
    @AshishKumar-xs9wt 7 лет назад

    Sir,
    Can you please share the implementation of the project?

  • @niharikasharma9363
    @niharikasharma9363 4 года назад +2

    Hello sir, I am working on network anomaly detection using a machine learning research topic. Can I get some assistance for the implementation part? kindly provide your email ID to seek guidance related to my research work. Thanks in advance.

    • @pereraperera9872
      @pereraperera9872 3 года назад

      Hey did finish your project?
      I also working related to this topic I want to know about implementation part can you help me?

    • @7405330930
      @7405330930 3 года назад

      @@pereraperera9872Im also working on similar topic for my semester project, can you help me with this?

    • @purellajajisaipavankumar651
      @purellajajisaipavankumar651 3 года назад

      @@7405330930 I am also working on my sem project please help

    • @temporary_account2697
      @temporary_account2697 3 года назад

      Please some body help me
      😭😭😭😭😭

    • @dilshan5475
      @dilshan5475 2 года назад

      I'm going to select this project but I haven't any implementation or other ideas. Guys can you please give your mail id to get some ideas only.

  • @debojitmandal8670
    @debojitmandal8670 Год назад

    Not a very good explanation
    Plus can you also use some dl techniques to solve this

  • @sawsanhadi1701
    @sawsanhadi1701 7 лет назад

    can i contact you i need help i'm working on research in this area

    • @sumitgangwal6354
      @sumitgangwal6354  7 лет назад +2

      sawsan hadi, sorry for replying so late, but if u need any help u can msg me on this page.

    • @nyaladzo
      @nyaladzo 3 года назад

      @@sumitgangwal6354 hello Summit please i need help
      With implementing an intrusion detection system in cluster based routing protocols

  • @rajarao8800
    @rajarao8800 6 лет назад

    sir can i contact you i need help i'm working on research in this area. " Anomaly detection for Intrusion Detection in Cloud Computing Environment" plz can u send ur mail id sir.

  • @artcraftwithprerna6436
    @artcraftwithprerna6436 6 лет назад

    may i get the pdf to which u referred.... plz

  • @artcraftwithprerna6436
    @artcraftwithprerna6436 6 лет назад

    may i get the pdf to which u referred.... plz