Recognize corrupted data packeted while transferring data through ensemble machine learning techniques

被引:1
作者
Sharma, Satyajeet [1 ]
Sharma, Bhavna [1 ]
机构
[1] JECRC Univ, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
关键词
Corrupt file detection; File transfer protocols; Ensemble machine learning; Data integrity; Error detection; Machine learning; AdaBoost Classifiers;
D O I
10.47974/JIOS-1420
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
In today's world, every technology is moving towards cloud storage which makes file transfer protocols a cornerstone for any platform to run smoothly. Therefore, identifying damaged files is a crucial responsibility in the area of data management and integrity. In this study, we suggest an AdaBoost-based machine learning technique for identifying damaged files. AdaBoost is an ensemble method that combines many weak classifiers into one powerful classifier. In our method, we train weak classifiers called decision stumps using a dataset that includes both damaged and healthy files. The final prediction was decided by a weighted majority vote of all the weak classifiers. We evaluated our method on a dataset generated by collecting metadata information of files and passed it to the algorithms. We used the AdaBoost approach as a base algorithm for comparison along with more established techniques like Naive Bayes, Logistic Regression, and Linear Discriminant Analysis. The results show that the AdaBoost algorithm is effective in detecting corrupted files, and it performs better than other traditional methods. Additionally, our method is computationally efficient and can be easily integrated into existing data management systems. It is expected to have a positive impact on data integrity and management in various fields such as digital forensics, cloud computing, and storage systems.
引用
收藏
页码:1459 / 1469
页数:11
相关论文
共 14 条
[1]  
Ann Romalt A., 2020, Journal of Critical
[2]  
Bhattacharya Sweta, 2020, International Journal of Scientific and Technology Research, V9
[3]  
Bindhia K., 2019, Journal ofMedical Systems
[4]   Accuracy analyses and model comparison of machine learning adopted in building energy consumption prediction [J].
Liu, Zhijian ;
Wu, Di ;
Liu, Yuanwei ;
Han, Zhonghe ;
Lun, Liyong ;
Gao, Jun ;
Jin, Guangya ;
Cao, Guoqing .
ENERGY EXPLORATION & EXPLOITATION, 2019, 37 (04) :1426-1451
[5]   Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods [J].
Mazhar, Tehseen ;
Irfan, Hafiz Muhammad ;
Khan, Sunawar ;
Haq, Inayatul ;
Ullah, Inam ;
Iqbal, Muhammad ;
Hamam, Habib .
FUTURE INTERNET, 2023, 15 (02)
[6]   AI-Enabled Smart Wristband Providing Real-Time Vital Signs and Stress Monitoring [J].
Mitro, Nikos ;
Argyri, Katerina ;
Pavlopoulos, Lampros ;
Kosyvas, Dimitrios ;
Karagiannidis, Lazaros ;
Kostovasili, Margarita ;
Misichroni, Fay ;
Ouzounoglou, Eleftherios ;
Amditis, Angelos .
SENSORS, 2023, 23 (05)
[7]  
Naveen Kishore G V., 2020, International Journal of Scientific and Technology Research, V9
[8]   Machine learning based framework for network intrusion detection system using stacking ensemble technique [J].
Parashar, Anshu ;
Saggu, Kuljot Singh ;
Garg, Anupam .
INDIAN JOURNAL OF ENGINEERING AND MATERIALS SCIENCES, 2022, 29 (04) :509-518
[9]  
Sharma Amit, 2019, Journal of The Gujarat Research Society, V21
[10]  
Sharma Amit, Journal of The Gujarat Research Society, V21