2022 International Conference on Decision Aid Sciences and Applications (DASA), Journal Year: 2024, Volume and Issue: unknown, P. 1 - 6
Published: Dec. 11, 2024
Language: Английский
2022 International Conference on Decision Aid Sciences and Applications (DASA), Journal Year: 2024, Volume and Issue: unknown, P. 1 - 6
Published: Dec. 11, 2024
Language: Английский
Deleted Journal, Journal Year: 2025, Volume and Issue: 7(5)
Published: April 24, 2025
Language: Английский
Citations
0Digital Communications and Networks, Journal Year: 2025, Volume and Issue: unknown
Published: May 1, 2025
Language: Английский
Citations
0Journal of Network and Computer Applications, Journal Year: 2024, Volume and Issue: 235, P. 104085 - 104085
Published: Dec. 11, 2024
Language: Английский
Citations
2IEEE Transactions on Consumer Electronics, Journal Year: 2024, Volume and Issue: 70(3), P. 5804 - 5813
Published: Aug. 1, 2024
Language: Английский
Citations
0Journal of Electronics Computer Networking and Applied Mathematics, Journal Year: 2024, Volume and Issue: 45, P. 16 - 26
Published: Sept. 27, 2024
This research focuses on establishing a competent and sustainable cybersecurity structure stimulated by Support Vector Machine (SVM) algorithms based detection of intrusions. The paper first provides clear concise method that builds the benchmark dataset known as KDD Cup 1999 dataset. In particular, with help data collection, preprocessing, feature selection, SVM model gives opportunity to classify different types network attack, such DoS attack or user-to-root attack. systematic approach ensures only favorable is considered in making note difference between normal traffic traffic. From this study, developed was accurate efficient, classification accuracy being 98.7% F1-score 96.7% respectively which demonstrated efficiency real world applications.Besides, development model, also includes components like real-time control automatic response. integration enables system scrutinize time take an appropriate action case threat. Through automated alerts mitigation actions must be taken once intrusion detected architecture not identifies infringements but corrects violations taking place network. proactive rather helpful nowadays, threats are already very high come frequently digital level. Hazard response capability further strengthens system, thus crucial reducing vulnerability outages.
Language: Английский
Citations
02022 International Conference on Decision Aid Sciences and Applications (DASA), Journal Year: 2024, Volume and Issue: unknown, P. 1 - 6
Published: Dec. 11, 2024
Language: Английский
Citations
0