Detection of Cloned Attacks in Connecting Media using Bernoulli RBM_RF Classifier (BRRC)

Detection of Cloned Attacks in Connecting Media using Bernoulli RBM_RF Classifier (BRRC)

21 February 2024 | Rupa Rani, Kuldeep Kumar Yogi, Satya Prakash Yadav
The paper "Detection of Cloned Attacks in Connecting Media using Bernoulli RBM_RF Classifier (BRRC)" by Rupa Rani, Kuldeep Kumar Yogi, and Satya Prakash Yadav addresses the issue of cloned attacks on social media platforms like Facebook, Twitter, and LinkedIn. The authors propose a novel approach using the Bernoulli RBM_RF Classifier (BRRC), a deep learning model that combines multiple classification algorithms such as Artificial Neural Networks (ANN), Logistic Regression, Decision Trees, K-Nearest Neighbour Classification, Random Forest, and Bernoulli RBM. The model aims to establish a clear neural network connection between target attributes and extract higher-level features from the data, reducing dimensionality and improving accuracy. The study concludes that the Bernoulli Restricted Boltzmann Machine (RBM) is the most suitable model for this task, achieving 93% accuracy. The paper also discusses the challenges of detecting cloned attacks and the importance of using deep learning and big data techniques to enhance security measures.The paper "Detection of Cloned Attacks in Connecting Media using Bernoulli RBM_RF Classifier (BRRC)" by Rupa Rani, Kuldeep Kumar Yogi, and Satya Prakash Yadav addresses the issue of cloned attacks on social media platforms like Facebook, Twitter, and LinkedIn. The authors propose a novel approach using the Bernoulli RBM_RF Classifier (BRRC), a deep learning model that combines multiple classification algorithms such as Artificial Neural Networks (ANN), Logistic Regression, Decision Trees, K-Nearest Neighbour Classification, Random Forest, and Bernoulli RBM. The model aims to establish a clear neural network connection between target attributes and extract higher-level features from the data, reducing dimensionality and improving accuracy. The study concludes that the Bernoulli Restricted Boltzmann Machine (RBM) is the most suitable model for this task, achieving 93% accuracy. The paper also discusses the challenges of detecting cloned attacks and the importance of using deep learning and big data techniques to enhance security measures.
Reach us at info@study.space
[slides] Detection of Cloned Attacks in Connecting Media using Bernoulli RBM RF Classifier (BRRC) | StudySpace