Online Bus Ticketing Application

Authors

  • Kolli Chiranjivi Venu Gopal PG scholar, Department of MCA, CDNR collage, Bhimavaram, Andhra Pradesh Author
  • K.Venkatesh (Assistant Professor), Master of Computer Applications, DNR collage, Bhimavaram, Andhra Pradesh. Author

Abstract

The proliferation of web-based applications and
services has led to a significant rise in the
frequency and sophistication of cyberattacks. From
SQL injections to cross-site scripting (XSS) and
denial-of-service (DoS) attacks, these threats can
cause serious disruptions and data breaches. The
need for intelligent, scalable, and accurate detection
systems is more urgent than ever. This project aims
to conduct a comprehensive performance analysis
of various Machine Learning (ML) and Deep
Learning (DL) algorithms to detect web-based
attacks effectively. By leveraging well-established
datasets and evaluation metrics, we assess each
algorithm’s capacity to identify different categories
of web threats. The models explored include both
classical ML algorithms—such as Support Vector
Machines (SVM), Decision Trees, and Random
Forests—and advanced DL models like
Convolutional Neural Networks (CNNs) and Long
Short-Term Memory (LSTM) networks. Each of
these is evaluated under consistent data and
performance metrics.
Through comparative analysis, this research seeks
to recommend the most efficient models for realtime
implementation, balancing performance,
scalability, and interpretability. The insights gained
will contribute to the design of more robust
intrusion detection systems for modern web
infrastructure.

Downloads

Download data is not yet available.

References

1. Shone, N., Ngoc, T. N., Phai, V. D., &

Shi, Q. (2018). *A Deep Learning

Approach to Network Intrusion

Detection*. IEEE Transactions on

Emerging Topics in Computational

Intelligence, 2(1), 41–50.

2. Moustafa, N., & Slay, J. (2015).

*UNSW-NB15: A Comprehensive Data

Set for Network Intrusion Detection

Systems*. Military Communications and

Information Systems Conference

(MilCIS), IEEE.

3. Tavallaee, M., Bagheri, E., Lu, W., &

Ghorbani, A. A. (2009). *A Detailed

Analysis of the KDD CUP 99 Data Set*.

IEEE Symposium on Computational

Intelligence for Security and Defense

Applications.

4. Yin, C., Zhu, Y., Fei, J., & He, X.

(2017). *A Deep Learning Approach for

Intrusion Detection Using Recurrent

Neural Networks*. IEEE Access, 5,

21954–21961.

5. Javaid, A., Niyaz, Q., Sun, W., & Alam,

M. (2016). *A Deep Learning Approach

for Network Intrusion Detection System*.

EAI International Conference on Bioinspired

Information and Communications

Technologies.

6. Ahmad, I., Basheri, M., Iqbal, M. J., &

Rahim, A. (2018). *Performance

Comparison of Support Vector Machine,

Random Forest, and Extreme Learning

Machine for Intrusion Detection*. IEEE

Access, 6, 33789–33795.

7. Vinayakumar, R., Soman, K. P., &

Poornachandran, P. (2017). *Applying

Convolutional Neural Network for

Network Intrusion Detection*.

International Conference on Advances in

Computing, Communications and

Informatics (ICACCI).

Downloads

Published

2025-05-01

Issue

Section

Articles

How to Cite

Online Bus Ticketing Application. (2025). International Journal of Multidisciplinary Engineering In Current Research, 10(5), 295-301. https://ijmec.com/index.php/multidisciplinary/article/view/656

Most read articles by the same author(s)

1 2 > >>