UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 12 | Issue 10 | October 2025

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 11 Issue 6
June-2024
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIRGL06083


Registration ID:
544928

Page Number

502-506

Share This Article


Jetir RMS

Title

AI FOR CYBERSECURITY: FROM ADVERSARIAL ANOMALY DETECTION TO INTELLIGENT NETWORK SECURITY SYSTEMS

Abstract

Isolation Forest (or iForest) is a well-known technique for anomaly detection. It is, however, a bulky approach that assumes the luxury of large storage space and is also ineffective with dynamic streaming data so common nowadays in varied application domains. In this work, we present the Pre-processed Isolation Forest (PiForest) approach for anomaly detection that works well in resource constrained environments and is also effective on streaming data. PiForest is largely based on the iForest algorithm and to effectively handle the streaming data includes a pre-processing stage. In the pre- processing stage, Principal Component Analysis (PCA) is first harnessed to significantly reduce the dimension and bulk of the data. Subsequently, the streaming characteristic of the data is handled through a sliding window mechanism that creates sequential blocks of data for systematic processing.PiForest is able to identify anomalies as effectively asiForest and other state-of-the art anomaly detection techniques but has substantially low storage and prediction complexity. We conduct empirical evaluation of the proposed approach is to implement Decision Tree Classifier Algorithm with standard data sets and show that it performs comparably with standard techniques in terms of Area Under the Receiver Operating Characteristic Curve (AUC-ROC) and is able to work with high-dimensional, streaming data. Subsequently, we do implementation of PiForest and Decision Tree Classifier demonstrate that the approach is realistic and practicable in resource-constrained environments

Key Words

AI FOR CYBERSECURITY: FROM ADVERSARIAL ANOMALY DETECTION TO INTELLIGENT NETWORK SECURITY SYSTEMS

Cite This Article

"AI FOR CYBERSECURITY: FROM ADVERSARIAL ANOMALY DETECTION TO INTELLIGENT NETWORK SECURITY SYSTEMS", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.11, Issue 6, page no.502-506, June-2024, Available :http://www.jetir.org/papers/JETIRGL06083.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"AI FOR CYBERSECURITY: FROM ADVERSARIAL ANOMALY DETECTION TO INTELLIGENT NETWORK SECURITY SYSTEMS", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.11, Issue 6, page no. pp502-506, June-2024, Available at : http://www.jetir.org/papers/JETIRGL06083.pdf

Publication Details

Published Paper ID: JETIRGL06083
Registration ID: 544928
Published In: Volume 11 | Issue 6 | Year June-2024
DOI (Digital Object Identifier):
Page No: 502-506
Country: -, -, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000288

Print This Page

Current Call For Paper

Jetir RMS