Network intrusion detection using deep learning techniques

Поделиться
HTML-код
  • Опубликовано: 3 фев 2025

Комментарии • 41

  • @jawaherabdulwahabfadhil2329
    @jawaherabdulwahabfadhil2329 9 месяцев назад

    Thank u for clear explanation, can u plz explain the implementation of ur work with implementing code? which program u used??

  • @goldenpoint7096
    @goldenpoint7096 Год назад

    Sir,can you suggest if we have to do research in this area in 2023-24 what new we can do, means using ml,and DL what new we can do in intrusion detection,is working in hybrid model(for something new) is still a research gap or not.
    pls suggest.

  • @younesgasmi8518
    @younesgasmi8518 11 месяцев назад

    Thanks so much bro.. my question is if Can I use undersampling techniques before Splitting the dataset into training and testing..because i'm working on the same research paper 📜

  • @leamon9024
    @leamon9024 4 года назад +1

    Nice explanation. Thanks for your hard work and effort.
    Could you please do more videos about these topic. Thanks

  • @shivakumarbadiger4520
    @shivakumarbadiger4520 3 года назад +3

    How can we implement & detect in real time network traffic...?

  • @mdrasidali7907
    @mdrasidali7907 3 года назад +1

    can you please elaborate the dataset that you have used? Like, which packet you call a anomaly or intrusion packet, and which are clean one!?

  • @alialjanabi9157
    @alialjanabi9157 4 года назад +1

    very good and thank you.

  • @sameeryendarkar2396
    @sameeryendarkar2396 3 года назад

    I am working on this topic as well. Can you please share the steps of implementation and the documentation.

  • @ebrimajaw7106
    @ebrimajaw7106 4 года назад +2

    Great work, explanation and findings as well. Is it possible to have the source code of the project? I am actually working on a similar topic and I believe sharing the codes with me will be very helpful. Thank you and once again, congratulations for the great work.

    • @rajuintrepid
      @rajuintrepid  4 года назад +5

      Please find below, link to my repository with source code
      github.com/LearnDeepLearningOrg/NetworkIntrusionDetection

    • @ebrimajaw7106
      @ebrimajaw7106 4 года назад +1

      @@rajuintrepid Thank you so much and well appreciated. Is it okay if I can have your email? Once again, thanks a lot and this is well appreciated.

    • @theniyota
      @theniyota 4 года назад

      Can this be used in Iot intrusion detection?

    • @rishikeshmasurkar6773
      @rishikeshmasurkar6773 3 года назад

      Hey Did You Implement This Project ? If yes can you Guide me through the steps. It will be very Helpful For Me.

  • @hudaadamsirag4320
    @hudaadamsirag4320 3 года назад +2

    very good explanation thanks you,, Is it possible to have the code of this project. I need it to make this clear for me i am working on a similar topic.... can you help me please!!!

    • @narottamdaspatel
      @narottamdaspatel 3 года назад +1

      I also want, if possible please send me on patel.nri1@gmail.com

  • @Xinzin-gh3rc
    @Xinzin-gh3rc Год назад

    Sir I want to access you Paper that you have published for my research work. I was tried many to access through Kindly

    • @rajuintrepid
      @rajuintrepid  Год назад

      Please access the published paper here: sersc.org/journals/index.php/IJAST/article/view/25273. Thank you.

    • @safwanishrak7393
      @safwanishrak7393 6 месяцев назад

      bro did you get the paper pdf if you can you give me i am having trouble registaring

    • @Xinzin-gh3rc
      @Xinzin-gh3rc 6 месяцев назад

      @@rajuintrepid Still I am not be able to access.....
      Kindly do help. If it is possible Kindly share your mail ID so that I can contact you.🙏

  • @heisenberg1844
    @heisenberg1844 3 года назад

    Hi. How do I deploy this IDS on a real network?

  • @kumarsaipradeepakkina
    @kumarsaipradeepakkina Год назад

    Please give the copy libk of your published paper.so that i an take reference

  • @shubhamthorve3372
    @shubhamthorve3372 3 года назад

    where to get this presentation slides....

  • @rinisharma2906
    @rinisharma2906 Год назад

    How to implement the code for different dataset

    • @rajuintrepid
      @rajuintrepid  Год назад

      Please review the source code from this location github.com/LearnDeepLearningOrg/NetworkIntrusionDetection. Thank you.

  • @madhuril1397
    @madhuril1397 3 года назад

    Hi.. great explanation. Can you please help me with the source code, iam working on a similar topic

  • @sakshideshmukh9513
    @sakshideshmukh9513 2 года назад

    Thank you :)

  • @spandananaik970
    @spandananaik970 3 года назад

    Hii sir can u pls explain phishing detection using URLs in deep learning by using CNN and LSTM

  • @hamzamohamed4801
    @hamzamohamed4801 2 года назад

    Can you please share the publication ?

    • @rajuintrepid
      @rajuintrepid  Год назад

      Please access the published paper here: sersc.org/journals/index.php/IJAST/article/view/25273. Thank you.

    • @safwanishrak7393
      @safwanishrak7393 6 месяцев назад

      bro did you get the paper pdf if you can you give me i am having trouble registaring

  • @AlanFullerton-m5l
    @AlanFullerton-m5l Год назад

    if it is research article can someone please share this..

    • @rajuintrepid
      @rajuintrepid  Год назад

      Please access the published paper here: sersc.org/journals/index.php/IJAST/article/view/25273. Thank you.

    • @safwanishrak7393
      @safwanishrak7393 6 месяцев назад

      bro did you get the paper pdf if you can you give me i am having trouble registaring

  • @davideguaoje4438
    @davideguaoje4438 3 года назад

    please i need project ideas please

  • @ansiljalal9969
    @ansiljalal9969 3 года назад

    Bro ..can you share this ppt??😊

  • @NavyageethalakshmiBandaru
    @NavyageethalakshmiBandaru Месяц назад

    share the pdf sir

  • @tekken1935
    @tekken1935 3 года назад

    give code