Bus Ticketing Online System

Authors

  • Yeleti Anusha PG scholar, Department of MCA, CDNR collage, Bhimavaram, Andhra Pradesh. Author
  • K.Sridevi (Assistant Professor), Master of Computer Applications, DNR collage, Bhimavaram, Andhra Pradesh. Author

Abstract

The proliferation of web-based applications and
services has led to a significant rise in the
frequency and sophistication of cyberattacks. From
SQL injections to cross-site scripting (XSS) and
denial-of-service (DoS) attacks, these threats can
cause serious disruptions and data breaches. The
need for intelligent, scalable, and accurate detection
systems is more urgent than ever. This project aims
to conduct a comprehensive performance analysis
of various Machine Learning (ML) and Deep
Learning (DL) algorithms to detect web-based
attacks effectively. By leveraging well-established
datasets and evaluation metrics, we assess each
algorithm’s capacity to identify different categories
of web threats. The models explored include both
classical ML algorithms—such as Support Vector
Machines (SVM), Decision Trees, and Random
Forests—and advanced DL models like
Convolutional Neural Networks (CNNs) and Long
Short-Term Memory (LSTM) networks. Each of
these is evaluated under consistent data and
performance metrics.
Through comparative analysis, this research seeks
to recommend the most efficient models for realtime
implementation, balancing performance,
scalability, and interpretability. The insights gained
will contribute to the design of more robust
intrusion detection systems for modern web
infrastructure.

Downloads

Download data is not yet available.

References

Yin, C., Zhu, Y., Fei, J., & He, X.

(2017). *A Deep Learning Approach for

Intrusion Detection Using Recurrent

Neural Networks*. IEEE Access, 5,

21954–21961.

5. Javaid, A., Niyaz, Q., Sun, W., & Alam,

M. (2016). *A Deep Learning Approach

for Network Intrusion Detection System*.

EAI International Conference on Bioinspired

Information and Communications

Technologies.

6. Ahmad, I., Basheri, M., Iqbal, M. J., &

Rahim, A. (2018). *Performance

Comparison of Support Vector Machine,

Random Forest, and Extreme Learning

Machine for Intrusion Detection*. IEEE

Access, 6, 33789–33795.

7. Vinayakumar, R., Soman, K. P., &

Poornachandran, P. (2017). *Applying

Convolutional Neural Network for

Network Intrusion Detection*.

International Conference on Advances in

Computing, Communications and

Informatics (ICACCI).

8. Sharafaldin, I., Lashkari, A. H., &

Ghorbani, A. A. (2018). *Toward

Generating a New Intrusion Detection

Dataset and Intrusion Traffic

Characterization*. Proceedings of ICISSP.

9. Berman, D. S., Buczak, A. L., Chavis, J.

S., & Corbett, C. L. (2019). *A Survey of

Deep Learning Methods for Cyber

Security*. Information, 10(4), 122.

10. Kwon, D., Kim, J., & Kim, J. (2019).

*Deep Learning-Based Anomaly

Detection System for Discovering Web

Attacks*. IEEE Access, 7, 183527–

183536.

11. Goodfellow, I., Bengio, Y., &

Courville, A. (2016). *Deep Learning*.

MIT Press.

12. Lippmann, R. P., Haines, J. W., Fried,

D. J., Korba, J., & Das, K. (2000). *The

1999 DARPA Off-Line Intrusion

Detection Evaluation*. Computer

Networks, 34(4), 579–595.

13. Kim, Y., Kim, W., & Kim, H. K.

(2020). *A Novel Hybrid Intrusion

Detection Method Integrating Anomaly

Detection with Misuse Detection*. Expert

Systems with Applications, 186, 115002.

14. Sommer, R., & Paxson, V. (2010).

*Outside the Closed World: On Using

Machine Learning for Network Intrusion

Detection*. IEEE Symposium on Security

and Privacy.

15. Khan, L., Awad, M., &

Thuraisingham, B. (2007). *A New

Intrusion Detection System Using Support

Vector Machines and Hierarchical

Clustering*. The VLDB Journal, 16(4),

507–521.

Downloads

Published

2025-05-01

Issue

Section

Articles

How to Cite

Bus Ticketing Online System. (2025). International Journal of Multidisciplinary Engineering In Current Research, 10(5), 194-198. https://ijmec.com/index.php/multidisciplinary/article/view/640