Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
2 results
Search Results
Item Hybrid Genetic Algorithm and Machine Learning Approach for Software Reliability Assessment in Safety-Critical Systems(Institute of Electrical and Electronics Engineers Inc., 2024) Goyal, G.; Sharma, K.; Anshuman; Mittal, V.; Singla, B.; Das, M.; Mohan, B.R.Software reliability is a paramount determinant of software quality. In this research paper, we delve into utilizing Genetic Algorithms (GAs) for feature selection and classification. We undertake a comprehensive evaluation and comparative analysis of Machine Learning models, specifically Random Forest and Logistic Regression, both with and without Genetic Algorithmdriven feature selection. Our findings substantiate the significant impact of Genetic Algorithms in improving the accuracy of software reliability analysis. © 2024 IEEE.Item TCP SYN Flood Attack Detection Using Logistic Regression and Multi-Agent Reinforcement Learning(Institute of Electrical and Electronics Engineers Inc., 2025) Sanjay, M.; Arun Raj Kumar, P.In the realm of cybersecurity, Distributed Denial of Service (DDoS) attacks remain a continuous threat, particularly TCP SYN flood attacks due to their stealthiness and potential for disruption. In this paper, we propose a combination of Multi-Agent Reinforcement Learning (MARL) with logistic regression for enhancing TCP SYN attack detection, leveraging Actor-Critic as the reinforcement learning algorithm. A novel approach is introduced for hyperparameter optimization using MARL, offering an alternative to traditional techniques such as GridSearchCV and RandomSearchCV. We present a comparative analysis between traditional logistic regression and MARL enhanced approaches, evaluating their performance using metrics such as accuracy, false negatives, and false positives. Results demonstrate that our proposed approach significantly improves detection accuracy and reduces false positives, underscoring its potential in bolstering cybersecurity defenses against sophisticated DDoS threats. © 2025 IEEE.
