Professional Documents
Culture Documents
Faculty Supervisor Enter the name of the faculty supervisor of the project
1. Tasks Outlined in Previous Weekly Progress Report (Provide detailed information on the
tasks to be completed in this week).
This phase revolves around data gathering, exploration and comprehension or more commonly
known as exploratory data analysis (EDA). Data understanding belongs to theses stages
following (data collection, data proprieties, data quality and AWS.
2. Progress Made in Reporting Week (Provide detailed information on the progress that you
made in the reporting week. Limit your write-up to no more than two page)
• Accuracy of model
• Computational cost
CIAF (Cloud Information Accountability Framework). The overall CIA framework, combining
data, users, logger and harmonizer is sketched in Auto-Selection Dataset. Each user creates a pair
of public and private keys based on Identity-Based Encryption based on online ranking level.
The user will create a logger component which is a JAR file, to store its data items. To storage
data from CNS. Major component based on Double Authentication used ML.
The JAR file includes a set of simple access control rules specifying whether and how the cloud
servers and possibly other data stakeholders (users, companies) are authorized to access the
content itself. We use OpenSSLbased certificates, wherein a trusted certificate authority certifies
the CSP. Some of the labels like “NO-ATTACK”, “Fuzzers”, and “Exploits” and “DoS” have
prediction accuracy still below par for most of the models.
In order to improve their accuracies, the unsupervised algorithms are used. These algorithms find
the inherent groupings called clusters of the data samples such that the samples have high intra-
cluster similarity and low inter-cluster similarity.
Worm
Shell-code
Reconnaissance
NOATTACK
Generic Fuzzers
Exploits
DoS
Backdoor
Analysis
We are researching theses measurement for accuracy in ML Model. We analysis these
techniques to get graphs for all level ML Model.
Multi-layer Perceptron Neural Network (MLP) and a Support Vector Machine (SVM) models
have used and compared for the classification of whole-sky, ground-based images of clouds. The
presence of such MLs in the auto-selection setup is shown as a critical path.
Time-out Rule: Each ML model runs inside a docker container which might time out due to
network congestion or to a completion time limit on ML algorithms. An automated tuning of the
parameters of support vector machine (SVM) classifier for pattern recognition has been
presented.
The comparison between accuracies of Naive Bayes, Decision Tree, and Multi-layer Perceptron
classifiers for label ”NOATTACK” and cluster number = {2; 3; 4; 5; 6}.
Prediction Error Rule: Any ML model that makes erroneous predictions for S consecutive
samples is put in the “OFF” state.
The data owner could opt to reuse the same key pair for all JARs or create different key pairs for
separate JARs. We first elaborate on the automated logging mechanism and then present
Regression
Logistic Regression
Classification
Naive Bayes Classifiers
K-NN (k nearest neighbors)
Decision Trees
Support Vector Machine
Un-supervised learning to find out issues during implementing there are no notions of the output
along the learning process. It does not allow estimating or mapping the results of a new sample.
Result very considerable in the presence of outliers. It only performs classification task.
Supervised learning to find out issues during implementing the it requires a labelled datasets. It
requires a training process.
Computation time is vast for supervised learning. Unwanted data downs efficiency. Pre-
processing of data is no less than a big challenge.
Cost and time are involved in selecting training data for supervised training datasets.
It can take time to interpret the spectral classes for un-supervised datasets.
4. Tasks to Be Completed in Next Week (Outline the tasks to be completed in the following
week)
Regression
Logistic Regression
Classification
Naive Bayes Classifiers
K-NN (k nearest neighbors)
Decision Trees
Support Vector Machine
Algorithms with graphics graphs also to different between supervised and unsupervised training
dataset following above those topics.
Individual graphs and overall graphs to generate all type of datasets belong to upload data from
the network cloud security.
Individual Contribution:
Guide’s comment/suggestions: