Work place: Techno International New Town, Kolkata, West Bengal, India
E-mail: rtgoswami@tict.edu.in
Website:
Research Interests:
Biography
Dr. Radha Tamal Goswami Director Techno India College of Technology (Techno International New Town), Professor in the Department of Computer Science and Engineering, Newtown, Kolkata India. Dr. Radha Tamal Goswami has received his Ph.D. in Technology from Birla Institute of Technology Mesra Ranchi India. He is having 23 years of experience in the field of academics and research. He was the professor in Computer Science and Engineering and also the Director of BIT Mesra Kolkata Campus since 1995. He joined Techno India College of Technology Kolkata as a Director in September 1, 2016 on 2 years’ lien from BIT Mesra. His-research interest in the field of Network Security and BigData. He has conducted almost 30 MDP and FDP program. He has guided more than 100 students in UG and PG projects. He is the visiting faculty of ten Institutions and member of ACM, IEEE, CSI and NIPM. Published almost 30 research papers. He chaired many National and International conferences.
By Avijit Mondal Radha Tamal Goswami Soumita Sen
DOI: https://doi.org/10.5815/ijwmt.2023.06.03, Pub. Date: 8 Dec. 2023
The expansion of the Internet and shared networks aids to the growth of records generated by nodes connected to the Internet. With the development of network attack technology, all Internet hosts have become targets of attack. When dealing with new attacks (such as smart ongoing threats) in a complex network environment, existing security strategies are powerless. Compared to existing security detection techniques, honeypot systems (IoT research) can analyze network packets or log files being attacked, and automatically monitor potential attack. Researchers can use this data to accurately capture the tactics, strategies, and techniques of threat actors to create defense strategies. However, for general security researchers, the immediate topic is how to improve the honeypot mechanism that attackers do not recognize and quietly capture their actions. Honeypot technology can be used not only as a passive information system, but also to combat zero-day and future attacks. In response to the rapid development of honeypot recognition with machine-learning technology, this paper proposes a new model of machine learning based on a linear regression algorithm with application and network layer characteristics. As a result of the experiment, we found that the proposed model was 97% more accurate than other machine learning algorithms.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals