Pinned Repositories
C-plus-plus-programming
Programming Questions for beginners
cme
Detecting-IP-Spoofing-Attacks-using-Deep-Learning--ML
Intrusion detection system is one of the most important parts of network security in competing against illegitimate network access. Intruder uses hijacking technique like host file hijack or IP spoofing, which is IP address forgery. There are different ways by which intrusion can take place, such as fake emailing and denial of service attack. In such kind of intrusion it is difficult to find the identity of the sender. Because of this, the system or the main server can crash from the overloading requests coming from an unauthorized source. Therefore, the system becomes unresponsive to the authorized requests. In the IP address spoofing, the attacker’s mimics as the legitimate user and access the network authorization. Further, it modifies the packet headers of the authorized users IP address. To mitigate this issue, in this thesis work, a new intrusion detection method has been introduced for preventing IP spoofing attack. The properties of nodes are optimized by using artificial bee colony optimization (ABC). Furthermore, the neural network model is trained using the optimized properties to predict the output in terms Packet delivery ratio (PDR), throughput and energy consumption.
DLT-Kannel-SMS-Gateway
DLT-ksmppd
ExchangeRate
ExchangeRates
gqlgen-auth
greenhouse-ui
KannelRetry
shubhagrwl's Repositories
shubhagrwl/DLT-Kannel-SMS-Gateway
shubhagrwl/Detecting-IP-Spoofing-Attacks-using-Deep-Learning--ML
Intrusion detection system is one of the most important parts of network security in competing against illegitimate network access. Intruder uses hijacking technique like host file hijack or IP spoofing, which is IP address forgery. There are different ways by which intrusion can take place, such as fake emailing and denial of service attack. In such kind of intrusion it is difficult to find the identity of the sender. Because of this, the system or the main server can crash from the overloading requests coming from an unauthorized source. Therefore, the system becomes unresponsive to the authorized requests. In the IP address spoofing, the attacker’s mimics as the legitimate user and access the network authorization. Further, it modifies the packet headers of the authorized users IP address. To mitigate this issue, in this thesis work, a new intrusion detection method has been introduced for preventing IP spoofing attack. The properties of nodes are optimized by using artificial bee colony optimization (ABC). Furthermore, the neural network model is trained using the optimized properties to predict the output in terms Packet delivery ratio (PDR), throughput and energy consumption.
shubhagrwl/DLT-ksmppd
shubhagrwl/C-plus-plus-programming
Programming Questions for beginners
shubhagrwl/cme
shubhagrwl/ExchangeRate
shubhagrwl/ExchangeRates
shubhagrwl/gqlgen-auth
shubhagrwl/greenhouse-ui
shubhagrwl/KannelRetry
shubhagrwl/Machine-Learning-and-Artificial-Intelligence-Practice-Project
This repository will help you to do practice on Machine Learning and Artificial Intelligence.
shubhagrwl/Python
This repository will help you to do practice on various python problems.
shubhagrwl/sbom
sbom checksum checker
shubhagrwl/uniswap_v3_pool
shubhagrwl/whatsmeow
Go library for the WhatsApp web multidevice API