Machine Learning Based Intrusion Detection System for Cyberattacks on Corporate Networks

Guardado en:
Detalles Bibliográficos
Publicado en:ProQuest Dissertations and Theses (2025)
Autor principal: Ambatipudi, Srikanth
Publicado:
ProQuest Dissertations & Theses
Materias:
Acceso en línea:Citation/Abstract
Full Text - PDF
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!

MARC

LEADER 00000nab a2200000uu 4500
001 3143462315
003 UK-CbPIL
020 |a 9798346849698 
035 |a 3143462315 
045 2 |b d20250101  |b d20251231 
084 |a 66569  |2 nlm 
100 1 |a Ambatipudi, Srikanth 
245 1 |a Machine Learning Based Intrusion Detection System for Cyberattacks on Corporate Networks 
260 |b ProQuest Dissertations & Theses  |c 2025 
513 |a Dissertation/Thesis 
520 3 |a Business organizations have benefited significantly from technology explosion that resulted in a rapid expansion of their computer network infrastructure. This led to the introduction of new vulnerabilities that could be exploited by cyber attackers to gain unauthorized entry into corporate networks resulting in data theft and other related threats. These threats include, but are not limited to, ransomware, credential misuse, and data breaches. All these attacks are significant in terms of the resources required for rectification efforts, and the resulting reputational damage caused to organizations. Cyberattacks target corporate networks, which maintain their customers’ personally identifiable information (PII) for day-to-day operations, thus causing data theft, reputation, and financial losses. This praxis research provided a machine learning (ML)-based intrusion detection system (IDS) to detect and classify a potential cyberattack, based on network traffic analysis. The IDS can be implemented on a server that monitors the network traffic. This praxis research used a portion from the network traffic data set that is over 16.5 GB in size with over nine (9) million records of simulated network traffic that includes Packet size, Source and Destination IP (Internet Protocol) Addresses. Random Forest, eXtreme Gradient Boosting, k-Nearest Neighbor were the primary ML models studied. 
653 |a Computer engineering 
653 |a Computer science 
653 |a Information technology 
773 0 |t ProQuest Dissertations and Theses  |g (2025) 
786 0 |d ProQuest  |t ProQuest Dissertations & Theses Global 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3143462315/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3143462315/fulltextPDF/embedded/L8HZQI7Z43R0LA5T?source=fedsrch