image
image
user-login
Patent search/

METHOD FOR DETECTING NETWORK INTRUSIONS

search

Patent Search in India

  • tick

    Extensive patent search conducted by a registered patent agent

  • tick

    Patent search done by experts in under 48hrs

₹999

₹399

Talk to expert

METHOD FOR DETECTING NETWORK INTRUSIONS

ORDINARY APPLICATION

Published

date

Filed on 6 November 2024

Abstract

ABSTRACT A method (100) for detecting network intrusions, the method (100) comprising the steps of capturing a network traffic data from a monitored network, pre-processing the captured data by scaling numerical features and encoding categorical features to prepare for analysis, selecting relevant features from the pre-processed data based on correlation of the numerical features and the categorical features with known intrusion patterns, applying a machine learning model to classify the network traffic data as normal or anomalous and generating an alert if the network traffic is classified as anomalous. <>

Patent Information

Application ID202411084823
Invention FieldCOMPUTER SCIENCE
Date of Application06/11/2024
Publication Number46/2024

Inventors

NameAddressCountryNationality
KALIKIREDDY THAPASWIN REDDYLOVELY PROFESSIONAL UNIVERSITY, JALANDHAR-DELHI, G.T. ROAD, PHAGWARA, PUNJAB (INDIA) -144411IndiaIndia
DURGA SANDEEP PAVANLOVELY PROFESSIONAL UNIVERSITY, JALANDHAR-DELHI, G.T. ROAD, PHAGWARA, PUNJAB (INDIA) -144411IndiaIndia
Mr. ARSALAN AHMED ALYASLOVELY PROFESSIONAL UNIVERSITY, JALANDHAR-DELHI, G.T. ROAD, PHAGWARA, PUNJAB (INDIA) -144411IndiaIndia

Applicants

NameAddressCountryNationality
LOVELY PROFESSIONAL UNIVERSITYJALANDHAR-DELHI, G.T. ROAD, PHAGWARA, PUNJAB (INDIA) -144411IndiaIndia

Specification

Description:FIELD OF THE DISCLOSURE
[0001] This invention generally relates to a field of network intrusions and in particular relates to a method for detecting network intrusions.
BACKGROUND
[0002] The subject matter discussed in the background section should not be assumed to be prior art merely as a result of its mention in the background section. Similarly, a problem mentioned in the background section or associated with the subject matter of the background section should not be assumed to have been previously recognized in the prior art. The subject matter in the background section merely represents different approaches, which in and of themselves may also correspond to implementations of the claimed technology.
[0003] In modern networked environments, the increase in connectivity has led to a significant rise in cyber threats. Networks are frequently targeted by intruders seeking unauthorized access to sensitive data, often exploiting network vulnerabilities to perform malicious activities. Effective network sec , Claims:1. A method (100) for detecting network intrusions, the method (100) comprising the steps of:
capturing a network traffic data from a monitored network;
pre-processing the captured data by scaling numerical features and encoding categorical features to prepare for analysis;
selecting relevant features from the pre-processed data based on correlation of the numerical features and the categorical features with known intrusion patterns;
applying a machine learning model to classify the network traffic data as normal or anomalous; and
generating an alert if the network traffic is classified as anomalous.

2. The method (100) as claimed in claim 1, the machine learning model comprises a Decision Tree Classifier, Naive Bayes, and K-Nearest Neighbours classifiers.

3. The method (100) as claimed in claim 2, further comprising reducing false positives and improving detection accuracy by selecting the relevant features and applying the machine learning model.

Documents

NameDate
202411084823-COMPLETE SPECIFICATION [06-11-2024(online)].pdf06/11/2024
202411084823-DECLARATION OF INVENTORSHIP (FORM 5) [06-11-2024(online)].pdf06/11/2024
202411084823-DRAWINGS [06-11-2024(online)].pdf06/11/2024
202411084823-FIGURE OF ABSTRACT [06-11-2024(online)].pdf06/11/2024
202411084823-FORM 1 [06-11-2024(online)].pdf06/11/2024
202411084823-FORM-9 [06-11-2024(online)].pdf06/11/2024
202411084823-POWER OF AUTHORITY [06-11-2024(online)].pdf06/11/2024
202411084823-PROOF OF RIGHT [06-11-2024(online)].pdf06/11/2024
202411084823-REQUEST FOR EARLY PUBLICATION(FORM-9) [06-11-2024(online)].pdf06/11/2024

footer-service

By continuing past this page, you agree to our Terms of Service,Cookie PolicyPrivacy Policy  and  Refund Policy  © - Uber9 Business Process Services Private Limited. All rights reserved.

Uber9 Business Process Services Private Limited, CIN - U74900TN2014PTC098414, GSTIN - 33AABCU7650C1ZM, Registered Office Address - F-97, Newry Shreya Apartments Anna Nagar East, Chennai, Tamil Nadu 600102, India.

Please note that we are a facilitating platform enabling access to reliable professionals. We are not a law firm and do not provide legal services ourselves. The information on this website is for the purpose of knowledge only and should not be relied upon as legal advice or opinion.