IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Machine Automation Making Cyber-Policy Violator More Resilient: A Proportionate Study

Machine Automation Making Cyber-Policy Violator More Resilient: A Proportionate Study
View Sample PDF
Author(s): Gyana Ranjana Panigrahi (Sambalpur University, India), Nalini Kanta Barpanda (Sambalpur University, India)and Madhumita Panda (Gangadhar Meher University, India)
Copyright: 2021
Pages: 17
Source title: Handbook of Research on Automated Feature Engineering and Advanced Applications in Data Science
Source Author(s)/Editor(s): Mrutyunjaya Panda (Utkal University, India)and Harekrishna Misra (Institute of Rural Management, Anand, India)
DOI: 10.4018/978-1-7998-6659-6.ch018

Purchase

View Machine Automation Making Cyber-Policy Violator More Resilient: A Proportionate Study on the publisher's website for pricing and purchasing information.

Abstract

Cybersecurity is of global importance. Nearly all association suffer from an active cyber-attack. However, there is a lack of making cyber policy violator more resilient for analysts in proportionately analyzing security incidents. Now the question: Is there any proper technique of implementations for assisting automated decision to the analyst using a comparison study feature selection method? The authors take multi-criteria decision-making methods for comparison. Here the authors use CICDDoS2019 datasets consisting of Windows benign and the most vanguard for shared bouts. Hill-climbing algorithm may be incorporated to select best features. The time-based pragmatic data can be extracted from the mainsheet for classification as distributed cyber-policy violator or legitimate benign using decision tree (DT) with analytical hierarchy process (AHP) (DT-AHP), support vector machine (SVM) with technique for order of preference by similarity to ideal solution (SVM-TOPSIS) and mixed model of k-nearest neighbor (KNN AHP-TOPSIS) algorithms.

Related Content

Princy Pappachan, Sreerakuvandana, Mosiur Rahaman. © 2024. 26 pages.
Winfred Yaokumah, Charity Y. M. Baidoo, Ebenezer Owusu. © 2024. 23 pages.
Mario Casillo, Francesco Colace, Brij B. Gupta, Francesco Marongiu, Domenico Santaniello. © 2024. 25 pages.
Suchismita Satapathy. © 2024. 19 pages.
Xinyi Gao, Minh Nguyen, Wei Qi Yan. © 2024. 13 pages.
Mario Casillo, Francesco Colace, Brij B. Gupta, Angelo Lorusso, Domenico Santaniello, Carmine Valentino. © 2024. 30 pages.
Pratyay Das, Amit Kumar Shankar, Ahona Ghosh, Sriparna Saha. © 2024. 32 pages.
Body Bottom