A Comparative Approach for Host Based Intrusion Detection Using Naiyve Bayes and KNN Algorithm
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2024, Vol 12, Issue 2
Abstract
Despite the existence of various types of network intrusion detection system, growth of attacks at host level has increased in the present time. Therefore, there is a huge potential of research in this field and which motivates this research work. This paper analyses the pattern of four classes of attacks used to deploy host-based intrusion. KNN and Naïve-Bayes algorithms are employed and compared in this research work to determine the presence of intrusion using standard measures of performance.
Authors and Affiliations
Pushpendra Chaturvedi
Depression Identification Using Machine Learning Classifiers
Depression is a mental condition that indicates emotional issues, including anger issues, unhappiness, boredom, appetite loss, lack of concentration, anxiety, etc. The quality of life of an individual may be negatively i...
Embedded System for Biometric Online Signature Verification Using ARM Processor
This paper describes the implementation biometric of an embedded system for online signature verification using ARM processor. Online signature verification is one of the biometric features which can be used as a common...
Real Time Prevention of Driver Fatigue Using Deep Learning and MediaPipe
This paper describes the development of a system for detecting driver drowsiness whose goal is to alert drivers of their sleepy state to prevent traffic accidents. It is essential that drowsiness detection in a driving e...
An Analysis of Production, Properties & Advantages of Biodiesel
Incessant usage of fossil fuel (non-renewable natural resources) is rapidly diminishing, & ir combustion is causing intensification in carbon dioxide in atmosphere. For ecological & economical sustainability, renewable c...
A Review of Research Opportunities in Fog and IoT
Within the cloud-to-things gamut, Fog is an embryonic design for storing data, performing computations, controlling applications that allocate many of such facilities to the end users. It is applicable to both wireline a...