Open Access   Article Go Back

Multi-Attacks Detection in Distributed System using Machine Learning

P. Patil1 , T. Bagwan2 , S. Kulkarni3 , C. Lobo4 , S.R. Khonde5

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-1 , Page no. 601-605, Jan-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i1.601605

Online published on Jan 31, 2019

Copyright © P. Patil, T. Bagwan, S. Kulkarni, C. Lobo, S.R. Khonde . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Patil, T. Bagwan, S. Kulkarni, C. Lobo, S.R. Khonde, “Multi-Attacks Detection in Distributed System using Machine Learning,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.601-605, 2019.

MLA Style Citation: P. Patil, T. Bagwan, S. Kulkarni, C. Lobo, S.R. Khonde "Multi-Attacks Detection in Distributed System using Machine Learning." International Journal of Computer Sciences and Engineering 7.1 (2019): 601-605.

APA Style Citation: P. Patil, T. Bagwan, S. Kulkarni, C. Lobo, S.R. Khonde, (2019). Multi-Attacks Detection in Distributed System using Machine Learning. International Journal of Computer Sciences and Engineering, 7(1), 601-605.

BibTex Style Citation:
@article{Patil_2019,
author = {P. Patil, T. Bagwan, S. Kulkarni, C. Lobo, S.R. Khonde},
title = {Multi-Attacks Detection in Distributed System using Machine Learning},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {601-605},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3551},
doi = {https://doi.org/10.26438/ijcse/v7i1.601605}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.601605}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3551
TI - Multi-Attacks Detection in Distributed System using Machine Learning
T2 - International Journal of Computer Sciences and Engineering
AU - P. Patil, T. Bagwan, S. Kulkarni, C. Lobo, S.R. Khonde
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 601-605
IS - 1
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
372 264 downloads 124 downloads
  
  
           

Abstract

Intrusion compromises a computer by breaking its security and thereby the computer enters into an insecure state. If such an event takes place, the computer becomes vulnerable to several attacks. These attacks aim to obtain information about the target computer and the information so obtained can be used to conduct fraudulent activities. It is difficult to prevent an intrusion into the system. However, if these computer intrusions are detected in time, the administrator can be informed and necessary actions can be taken at early stages. Previous Intrusion detection system (IDS) utilized several features to detect various malicious activities. However, these IDS methods only detect specific attack. They fail when the attacks are combined. For this purpose, we propose an Intrusion Detection System in distributed environment to mitigate the individual and combination routing attacks. This paper explains the method we used to generate such a system. Our proposed system of Intrusion Detection uses feature selection techniques to determine significant features, along with the best classification method will distinguish between an attack and non-attack. We aim to increase detection accuracy and reduce false alarm rate. NSL-KDD dataset has been used to train our model. The paper also explains related work done in this field and briefly explains the network attacks and the dataset.

Key-Words / Index Term

IDS, Intrusion Detection System, Multiple attacks, Machine Learning, Network Security

References

[1] M.N. Napiah, M.Y.I. Idris, R. Ramli, I. Ahmedy , “Compression header analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN communication protocol” ,IEEE Access, Vol. 6, 2018.
[2] P. Aggarwala, S.K. Sharma, “Analysis of KDD dataset attributes-class wise for intrusion detection”, Procedia Computer Science, Vol. 57, pp. 842–851, 2015.
[3] H. Chae, B. Jo, S. Choi, T. Park, “Feature selection for intrusion detection using NSL-KDD”, Recent Advances in Computer Science, pp. 184-187, 2013.
[4] S.S. Panwar, Dr. Y. P. Raiwani, “Data reduction techniques to analyze NSL-KDD dataset”, International Journal of Computer Engineering and Technology (IJCET), Vol. 5, Issue 10, pp. 21-31, October (2014).
[5] H.P.S. Sasan and M. Sharma, “Intrusion detection using feature selection and machine learning algorithm with misuse detection”, International Journal of Computer Science & Information Technology (IJCSIT), vol. 8,no.1,pp. 17-25, 2016.
[6] L.Dhanabal, Dr. S.P. Shantharajah. “A study on NSL- KDD dataset for intrusion detection system based on classification algorithms” International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 6, 2015.
[7] A. Narayan and T.J. Parvat., “An Intrusion Detection System, (IDS) with Machine Learning (ML) model combining hybrid classifiers” Journal of Multidisciplinary Engineering Science and Technology (JMEST), Vol. 2, Issue 4, April - 2015.
[8] P. Rutravigneshwaran, “A Study of Intrusion Detection System using Efficient Data Mining Techniques” International Journal of Scientific Research in Network Security and Communication, Vol. 5, Issue 6, December – 2017.
[9] M. Arora, S. Sharma, “Synthesis of Cryptography and Security Attacks” International Journal of Scientific Research in Network Security and Communication, Vol. 5, Issue 5, October – 2017.
[10] U. K. Singh, C. Joshi, S. K. Singh, “Zero day Attacks Defense Technique for Protecting System against Unknown Vulnerabilities” International Journal of Scientific Research in Computer Science and Engineering, Vol. 5, Issue 1, February – 2017.
[11] A. Ahmad , M. Asif, S. R. Ali, “Shallow Learning and Deep Learning Methods for Network security” International Journal of Scientific Research in Computer Science and Engineering, Vol. 6, Issue 5, October – 2018.