Recognize corrupted data packeted while transferring data through ensemble machine learning techniques

被引:1
作者
Sharma, Satyajeet [1 ]
Sharma, Bhavna [1 ]
机构
[1] JECRC Univ, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
关键词
Corrupt file detection; File transfer protocols; Ensemble machine learning; Data integrity; Error detection; Machine learning; AdaBoost Classifiers;
D O I
10.47974/JIOS-1420
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
In today's world, every technology is moving towards cloud storage which makes file transfer protocols a cornerstone for any platform to run smoothly. Therefore, identifying damaged files is a crucial responsibility in the area of data management and integrity. In this study, we suggest an AdaBoost-based machine learning technique for identifying damaged files. AdaBoost is an ensemble method that combines many weak classifiers into one powerful classifier. In our method, we train weak classifiers called decision stumps using a dataset that includes both damaged and healthy files. The final prediction was decided by a weighted majority vote of all the weak classifiers. We evaluated our method on a dataset generated by collecting metadata information of files and passed it to the algorithms. We used the AdaBoost approach as a base algorithm for comparison along with more established techniques like Naive Bayes, Logistic Regression, and Linear Discriminant Analysis. The results show that the AdaBoost algorithm is effective in detecting corrupted files, and it performs better than other traditional methods. Additionally, our method is computationally efficient and can be easily integrated into existing data management systems. It is expected to have a positive impact on data integrity and management in various fields such as digital forensics, cloud computing, and storage systems.
引用
收藏
页码:1459 / 1469
页数:11
相关论文
共 14 条
[11]   Data management framework for IoT edge-cloud architecture for resource-constrained IoT application [J].
Sharma, Gajanand ;
Hemrajani, Naveen ;
Sharma, Satyajeet ;
Upadhyay, Aditya ;
Bhardwaj, Yogesh ;
Kumar, Ashutosh .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (04) :1093-1103
[12]   Self-healing topology for DDoS attack identification & discovery protocol in software-defined networks [J].
Sharma, Gajanand ;
Sharma, Himanshu ;
Pareek, Rajneesh ;
Gour, Nidhi ;
Sharma, Ravi Shanker ;
Kumar, Ashutosh .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (08) :2221-2232
[13]   Video tempering detection assessment in full reference mode using difference matrices [J].
Sharma, Gajanand ;
Goyal, Dinesh .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04) :645-659
[14]  
Sharma Gajanand, 2018, International Journal of Information and communication Technology Research, V3