Gupta, Neha
Unknown Affiliation

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Indonesian Journal of Electrical Engineering and Computer Science

A novel boundary adaptive oversampling approach for intrusion detection Kaur, Ritinder; Gupta, Neha
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 1: January 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i1.pp518-529

Abstract

Managing unbalanced datasets is a significant challenge in intrusion detection, since uncommon assaults are often obscured by the bulk of regular network traffic. In order to mitigate the effects of class imbalance and improve intrusion detection system (IDS) performance, it is necessary to use a variety of imbalanced learning algorithms. Methods of data augmentation such as adaptive synthetic sampling (ADASYN) and synthetic minority oversampling technique (SMOTE) are useful in addressing class imbalance. This paper introduces a novel technique to data resampling where decision tree-generated decision boundaries are used to conduct ADASYN on complicated and unusual samples. When this method’s efficacy was evaluated using the standard NSL-KDD dataset, the accuracy of the unusual class u2r was increased to 42% and, for r2l it was improved to 83%, respectively. The UNSW-NB 15 dataset has been used for further validation of the method, and its statistical significance has been asserted by comparing the suggested method to other oversampling techniques.
Performance analysis of the proxy-based and collusion-resistant revocable CPABE framework Chawla, Shobha; Gupta, Neha
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp378-387

Abstract

An efficient revocation of access rights in ciphertext policy attribute-based encryption (CPABE) schemes has multiple challenges, particularly for lightweight devices. Thus, extensive research on the existing studies enforcing and governing access control has been conducted. The methodologies used in the existing CPABE (bilinear pairing cryptography based) schemes to revoke users at the system and attribute levels have been focused on in the current study. The existing studies have been examined on the basis of the following parameters for revocation: type of revocation addressed, level of collusion resistance, dynamicity achieved, scalability of revocation, and computational cost incurred. It has been observed in the study that no single scheme achieves all the revocation properties and addresses both types of revocation. The module proposed in proxy-based and collusion-resistant multi-authority revocable CPABE (PCMR-CPABE) efficiently addresses both types of revocation and is fully collusion-resistant, dynamic, and scalable. The present paper extends the study on PCMRCPABE and presents a performance analysis of the module in terms of functional specifications and computational cost. The presented analysis has compared the performance of the existing cutting-edge schemes with the PCMR-CPABE module and has proved that the proposed module is better in terms of functionality and is computationally inexpensive.