Security

Unleashing Power of Artificial Intelligence for Network Intrusion Detection Problem

Free registration required

Executive Summary

The paper proposes a scheme/technique to shun corrupted data packet as they journey towards it destination by appropriately identifying the corrupted data packets or sets and filtering them before they reach or make an entry to the last lap/phase of their destination. As most bit and bytes (data packets) journey the express way (internet) towards destination travelling through various networks & networking devises, components etc., get infected. Infections of various types, for example in the form of virus and worms attach during journey and piggy-back the data packets to destination; at the end causing chaos and corruption into the destination systems.

  • Format: PDF
  • Size: 398.74 KB