<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="17935" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/17935?output=omeka-xml" accessDate="2026-04-25T07:25:01+00:00">
  <collection collectionId="15">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="44496">
                <text>Book Chapter</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="27">
    <name>Book Chapter</name>
    <description>Faculty Publications- Book Chapter</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="147189">
              <text>A Brief Review onDifferent Machine Learning-Based Intrusion Detection Systems</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="147190">
              <text>Decision tree algorithm; Intrusion detection; kNN algorithm; Random Forest algorithm; Support vector Machine algorithm</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="147191">
              <text>In the contemporary cybersecurity landscape, the proliferation of complex and sophisticated cyber threats necessitates the development of robust Intrusion Detection Systems (IDS) for safeguarding network infrastructures. These threats make it more challenging to maintain the communitys availability, integrity, and confidentiality. To ensure a secure network, community administrators should implement multiple intrusion detection systems (IDS) to monitor and detect unauthorized and malicious activities. An intrusion detection system examines the networks traffic by analyzing data flowing through computers to identify potential security threats or malicious activities. It alerts administrators when suspicious activities are detected. IDS generally performs two types of malicious activity detection: misuse or signature-based detection, which entails collecting and comparing information to a database of known attack signatures, and anomaly detection, which detects any behavior that differs from the standard activity and assumes it to be malicious. The proposed paper offers an overview of how different Machine Learning Algorithms like Random forest, k - Nearest Neighbor, Decision tree, Support Vector Machine, Naive Bayes, and K- means are used for IDS and how these algorithms perform on different well-known datasets, and Their accuracy and performance are evaluated and compared, providing valuable insights for future work. kNN shows an accuracy of 90.925% for Denial of Service Attacks and 98.244% for User To Root attacks. The SVM algorithm shows an accuracy of 93.051% for Probe attacks and 80.385% accuracy for remote-to-local attacks. According to our implementation, these two algorithms work better than the others.  The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="147192">
              <text>Samanta S.; Sen A.P.; Mukhopadhyay D.; De S.; Bhattacharyya S.; Platos J.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="147193">
              <text>Lecture Notes on Data Engineering and Communications Technologies, Vol-220, pp. 98-108.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="147194">
              <text>Springer Science and Business Media Deutschland GmbH</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="147195">
              <text>2024-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="147196">
              <text>&lt;a href="https://doi.org/10.1007/978-3-031-71619-5_10" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1007/978-3-031-71619-5_10&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85207871773&amp;amp;doi=10.1007%2F978-3-031-71619-5_10&amp;amp;partnerID=40&amp;amp;md5=dd173c2d39c093bc97bbf56781c64b64" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85207871773&amp;amp;doi=10.1007%2f978-3-031-71619-5_10&amp;amp;partnerID=40&amp;amp;md5=dd173c2d39c093bc97bbf56781c64b64&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="147197">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="147198">
              <text>ISSN: 23674512</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="147199">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="147200">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="147201">
              <text>Book chapter</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="147202">
              <text>Samanta S., Department of Computer Science and Engineering, Cooch Behar Government Engineering College, West Bengal, Cooch Behar, India; Sen A.P., Department of Computer Science and Engineering, Cooch Behar Government Engineering College, West Bengal, Cooch Behar, India; Mukhopadhyay D., Department of Computer Science and Engineering, School of Engineering and Technology, Christ University, Bangalore, India; De S., Department of Computer Science and Engineering, Cooch Behar Government Engineering College, West Bengal, Cooch Behar, India; Bhattacharyya S., VSB Technical University of Ostrava, Ostrava, Czech Republic, Algebra University, Zagreb, Croatia; Platos J., VSB Technical University of Ostrava, Ostrava, Czech Republic</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
