KNN 2
KNN 2
IV. METHODOLOGY
We selected to work with the 10% of the original dataset that
had been skimmed because it was extremely detailed and large. The
Massachusetts Institute of Technology Lincoln Lab created this
dataset. It was first designed to research network intrusion.
Fig. 2. Architecture Diagram
The [10]dataset was divided into training and testing groups in Use Case Diagram: The UML - Use Case Diagram is the
an 80:20 ratio. There were 116469 samples in the training dataset foundation of our entire model, as depicted in the figure 2
and 29117 samples in the testing dataset.
Authorized licensed use limited to: Amrita School of Engineering. Downloaded on November 05,2024 at 11:48:21 UTC from IEEE Xplore. Restrictions apply.
2023 International Conference on Computer Communication and Informatics (ICCCI), Jan, 23-25, 2023, Coimbatore, INDIA
Authorized licensed use limited to: Amrita School of Engineering. Downloaded on November 05,2024 at 11:48:21 UTC from IEEE Xplore. Restrictions apply.
2023 International Conference on Computer Communication and Informatics (ICCCI), Jan, 23-25, 2023, Coimbatore, INDIA
and sharing,” The Fall 2021 Symposium ofStudent Scholars,
2021.
[4] H. Hassani, E. Silva, S. Unger, M. Tajmazinani, and S.
MacFeely, “Artificial intelligence (ai) or intelligence
augmentation (ia): What is the future?” AI, vol. 1, p. 1211, 04
2020.
[5] M. O. F. Rokon, R. Islam, A. Darki, E. Papalexakis, and M.
Faloutsos, “Sourcefinder: Finding malware source-code from
publicly available repositories,” in RAID, 2020.
[6] N. Sharma and B. Arora, “Data mining and machine learning
techniques for malware detection,” in Rising Threats in Expert
Applications and Solutions, V. S. Rathore, N. Dey, V.Piuri, R.
Babo, Z. Polkowski, and J. M.
R. S. Tavares, Eds. Singapore: Springer Singapore, 2021, pp.
557–567.
[7] Dr Ekambaram Kesavulu Reddy, “Neural Networks for
Intrusion Detection and Its Applications,” published, July
2013.
[8] Srinivas Mukkamala, Guadalupe Janoski andAndrew H. Sung,
“Intrusion detection using neural networks and support vector
machines,”published, 2002.
[9] Nahla Ben Amor, Salem Benferhat and Zied Elouedi, “Naive
Bayes vs decision trees in intrusion detection systems”,
published, 2004.
[10] Uddin, M., Rudra, S., & Nazim Uddin, M. (2019).
Forecasting the Long Term Economics Status of Bangladesh
Using Machine Learning Approaches from 2016-2036.
International Journal of Computer Communication and
Informatics, 1(1), 58-64
Authorized licensed use limited to: Amrita School of Engineering. Downloaded on November 05,2024 at 11:48:21 UTC from IEEE Xplore. Restrictions apply.