Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/20040
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTOMAR, VINEET-
dc.date.accessioned2023-07-11T06:07:20Z-
dc.date.available2023-07-11T06:07:20Z-
dc.date.issued2023-05-
dc.identifier.urihttp://dspace.dtu.ac.in:8080/jspui/handle/repository/20040-
dc.description.abstractIn this era of exponential internet boom IoT devices are also increasing with a rapid growth. This rapid growth also increases the risk of intrusion such as phishing at application layer, Dos & spoofing at network layer and node capture, malicious code injection & eavesdropping at physical layer. So, to prevent systems from these attacks it has become the desired need of time to implement an Intrusion Detection system model. In this paper we have briefly compared various global datasets and used most recent CSECICIDS-2018 dataset having 1.04 million of samples. We have implemented a Bi LSTM model having an Input layer, a reshape layer, two Bi-LSTM layers, a dense layer, a dropout layer and lastly an output layer. Proposed model is used for the prediction of a packet whether it is Benign and Not Benign using 11 important features 'Timestamp', 'Fwd Pkt Len Std', 'Fwd Pkt Len Mean', 'Fwd Pkt Len Max', 'Fwd Seg Size Avg', 'Pkt Len Std', 'Flow IAT Std', 'Bwd Pkt Len Std', 'Bwd Seg Size Avg', 'Pkt Size Avg', 'Subflow Fwd Byts' for training the model. This Bi-LSTM model have provided an accuracy of 99.554%, precision of 99.227% and F1 score of 99.612%. Further this model can be tested and improved on real-time intrusion scenario to provide improved results.en_US
dc.language.isoenen_US
dc.relation.ispartofseriesTD-6579;-
dc.subjectDEEP LEARNING ALGORITHMen_US
dc.subjectMACHINE LEARNING ALGORITHMen_US
dc.subjectINTRUSION DETECTIONen_US
dc.subjectINTERNET OF THINGSen_US
dc.subjectBi-LSTMen_US
dc.subjectCSECICIDS-2018en_US
dc.titleSTUDY OF MACHINE AND DEEP LEARNING ALGORITHMS FOR INTRUSION DETECTION IN IoTen_US
dc.typeThesisen_US
Appears in Collections:M.E./M.Tech. Computer Engineering

Files in This Item:
File Description SizeFormat 
VINEET TOMAR M.Twch.pdf1.69 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.