Machine Learning Based Intrusion Detection System for Cyberattacks on Corporate Networks
Guardado en:
| Publicado en: | ProQuest Dissertations and Theses (2025) |
|---|---|
| Autor principal: | |
| Publicado: |
ProQuest Dissertations & Theses
|
| Materias: | |
| Acceso en línea: | Citation/Abstract Full Text - PDF |
| Etiquetas: |
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3143462315 | ||
| 003 | UK-CbPIL | ||
| 020 | |a 9798346849698 | ||
| 035 | |a 3143462315 | ||
| 045 | 2 | |b d20250101 |b d20251231 | |
| 084 | |a 66569 |2 nlm | ||
| 100 | 1 | |a Ambatipudi, Srikanth | |
| 245 | 1 | |a Machine Learning Based Intrusion Detection System for Cyberattacks on Corporate Networks | |
| 260 | |b ProQuest Dissertations & Theses |c 2025 | ||
| 513 | |a Dissertation/Thesis | ||
| 520 | 3 | |a Business organizations have benefited significantly from technology explosion that resulted in a rapid expansion of their computer network infrastructure. This led to the introduction of new vulnerabilities that could be exploited by cyber attackers to gain unauthorized entry into corporate networks resulting in data theft and other related threats. These threats include, but are not limited to, ransomware, credential misuse, and data breaches. All these attacks are significant in terms of the resources required for rectification efforts, and the resulting reputational damage caused to organizations. Cyberattacks target corporate networks, which maintain their customers’ personally identifiable information (PII) for day-to-day operations, thus causing data theft, reputation, and financial losses. This praxis research provided a machine learning (ML)-based intrusion detection system (IDS) to detect and classify a potential cyberattack, based on network traffic analysis. The IDS can be implemented on a server that monitors the network traffic. This praxis research used a portion from the network traffic data set that is over 16.5 GB in size with over nine (9) million records of simulated network traffic that includes Packet size, Source and Destination IP (Internet Protocol) Addresses. Random Forest, eXtreme Gradient Boosting, k-Nearest Neighbor were the primary ML models studied. | |
| 653 | |a Computer engineering | ||
| 653 | |a Computer science | ||
| 653 | |a Information technology | ||
| 773 | 0 | |t ProQuest Dissertations and Theses |g (2025) | |
| 786 | 0 | |d ProQuest |t ProQuest Dissertations & Theses Global | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3143462315/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3143462315/fulltextPDF/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |