Towards Detection of Network Attacks by Snort Analysis Using Machine Learning Techniques

HV Chaithanya, MS Prerana… - 2023 World Conference …, 2023 - ieeexplore.ieee.org
Network analysis is a crucial process in identifying suspicious entities and the sequence of
actions in an attack scenario. Among the various types of attacks, flooding attacks on web …

Random Forest Algorithm for Mitigating Floods and Ensuring Clean Water: IoT-Based Monitoring, Harvesting and Purification in Flood-Prone India

A Mukhopadhyay, P Aishwarya… - … on Cloud Computing …, 2023 - ieeexplore.ieee.org
The UN SDG 6 strives to provide access to clean drinking water worldwide. India is currently
facing an increasing vulnerability to natural disasters, particularly due to the rising frequency …

[PDF][PDF] NS2–Based Experimental Analysis of Throughput for TCP and UDP Traffic During Link Failure of The Network

A Gupta, K Mamgain, M Singh, A Chhabra - Iraqi Journal of Science, 2024 - iasj.net
Link failure refers to the failure between two connections/nodes in a perfectly working
simulation scenario at a particular instance. Transport layer routing protocols form an …