Application Specific NIDS (using unsupervised techniques)
dc.contributor.author | Ratti, Ritesh | |
dc.date.accessioned | 2025-01-10T11:54:35Z | |
dc.date.available | 2025-01-10T11:54:35Z | |
dc.date.issued | 2024 | |
dc.description | Supervisors: Nandi, Sukumar and Singh, Sanasam Ranbir | |
dc.description.abstract | In recent years, the use of unsupervised learning-based methods for network intrusion detection has attracted much attention. Multiple methods using unsupervised mechanisms have been proposed that utilize the information in various formats like network packets, flow information, etc., and use various methods for attack identification. Most of these methods have the limitations on not considering the time factor inherently but explicitly using the time-dependent features for various time windows and considering equal importance for all previous contexts. Also ignoring the fact that each protocol-specific attack is unique and ignoring the protocol awareness to determine attacks. Moreover, considering a single type of view or set of features (network header or flow) to build a machine learning model and ignoring the importance of different views in attack determination. This thesis presents four unsupervised learning-based methods in this direction. | |
dc.identifier.other | ROLL NO.156101013 | |
dc.identifier.uri | https://gyan.iitg.ac.in/handle/123456789/2787 | |
dc.language.iso | en | |
dc.relation.ispartofseries | TH-3418 | |
dc.title | Application Specific NIDS (using unsupervised techniques) | |
dc.type | Thesis |
Files
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed to upon submission
- Description: