Open Access   Article Go Back

Smart Intrusion Detection Using Machine Learning Techniques

Ashish Puri1 , Md Tabrez Nafis2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 483-488, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.483488

Online published on Apr 30, 2019

Copyright © Ashish Puri, Md Tabrez Nafis . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ashish Puri, Md Tabrez Nafis, “Smart Intrusion Detection Using Machine Learning Techniques,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.483-488, 2019.

MLA Style Citation: Ashish Puri, Md Tabrez Nafis "Smart Intrusion Detection Using Machine Learning Techniques." International Journal of Computer Sciences and Engineering 7.4 (2019): 483-488.

APA Style Citation: Ashish Puri, Md Tabrez Nafis, (2019). Smart Intrusion Detection Using Machine Learning Techniques. International Journal of Computer Sciences and Engineering, 7(4), 483-488.

BibTex Style Citation:
@article{Puri_2019,
author = {Ashish Puri, Md Tabrez Nafis},
title = {Smart Intrusion Detection Using Machine Learning Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {483-488},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4062},
doi = {https://doi.org/10.26438/ijcse/v7i4.483488}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.483488}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4062
TI - Smart Intrusion Detection Using Machine Learning Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - Ashish Puri, Md Tabrez Nafis
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 483-488
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
341 201 downloads 163 downloads
  
  
           

Abstract

Intrusion Detection is one of the most effective and widely used implementation against the attacks and threats .Further more attackers keeps on varying their attacking techniques and tools .In this paper we have tried to perform a simulation study to evaluate the performance of varied machine learning classifiers to detect intrusion detection based on KDD 99 cups data set [1] focusing on enhancing the proficiency of Intrusion Detection system (IDS).

Key-Words / Index Term

DoS- Denial Of Service; U2R-User to root; R2L: Root to local; CIA-Confidentilaity,Integrity,availability ; CM-Confusion Matrix; MLP-Multi Layer perceptron ; NEA-Nearest Cluster Algorithm.; GAU:- Gaussian; K-M: K means algorithm; CPE: - Cost Per example; Pd:Probabilty Detection; FaR:False alrm Rate

References

[1] A. M., C. and K., R. (2012). Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set. International Journal of Information and Network Security (IJINS), 1(4).
[2] K. Park and Y. Cheong, "Classification of Attack Types for Intrusion Detection Systems Using a Machine Learning Algorithm," 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService), Bamberg, Germany, 2018, pp. 282-286
[3] Durcikova and M. E. Jennex, "Introduction to Confidentiality, Integrity, and Availability of Knowledge, Innovation, and Entrepreneurial Systems Minitrack," 2016 49th Hawaii International Conference on System Sciences (HICSS), Koloa, HI, USA, 2016, pp. 4010
[4] K. Alrawashdeh and C. Purdy, "Toward an Online Anomaly Intrusion Detection System Based on Deep Learning," IEEE International Conference 2016 on Machine Learning Applications , Anaheim, California, USA, 2017, pp. 195-200
[5] Levin,KDD-99 classifier learning Contest Llsofts Result Overview“,SIGKDD ,January 2000,Vol.I (2) pp 67-75.
[6] L.Ertoz,M.Steinbock and V.Kumar in finding cluster of different sizes and shapes,and densities in Noisy and high dimensional data“ Technical Report.
[7] D.Y Yeung and Chow „ Parzen Window network Intrsion Detection“.Sixteenth international conferance on platform recognition ,Quback city canada P.P 11-15.
[8] C4.5 Simulator downloaded from: https://github.com/scottjulian/C4.5/tree/master/src/main/java/myc45
[9] Zaghian, A. & Noorbehbahani, F. Pattern Anal Applic (2017) 20: 701. https://doi.org/10.1007/s10044-015-0527-6.
[10] Pérez-Miñana E. (1998) A Generative Learning Algorithm that uses Structural Knowledge of the Input Domain yields a better Multi-layer Perceptron. In: Bullinaria J.A., Glasspool D.W., Houghton G. (eds) 4th Neural Computation and Psychology Workshop, London, 9–11 April 1997. Perspectives in Neural Computing. Springer, London
[11] Parvin H., Mohamadi M., Parvin S., Rezaei Z., Minaei B. (2012) Nearest Cluster Classifier. In: Corchado E., Snášel V., Abraham A., Woźniak M., Graña M., Cho SB. (eds) Hybrid Artificial Intelligent Systems. HAIS 2012. Lecture Notes in Computer Science, vol 7208. Springer, Berlin, Heidelberg
[12] A. K. Amoura, J. König and E. Bampis, "Scheduling Algorithms for Parallel Gaussian Elimination With Communication Costs," in IEEE Transactions on Parallel & Distributed Systems, vol. 9, no. , pp. 679-686, 1998.
doi:10.1109/71.707547
[13] M. Ohsaki, et al.,"Confusion-Matrix-Based Kernel Logistic Regression for Imbalanced Data Classification" in IEEE Transactions on Knowledge & Data Engineering, vol. 29, no. 09, pp. 1806-1819, 2017.
[14] V. Lesser, E. Durfee and D. Corkill, "Trends in Cooperative Distributed Problem Solving" in IEEE Transactions on Knowledge & Data Engineering, vol. 18, no. 01, pp. 63-83, 1989.
[15] G. Smith, et al., "Anatomy of a Real-Time Intrusion Prevention System," in Autonomic Computing, International Conference on, null, 2008 pp. 151-160.
[16] P. Anitha, D. Rajesh, K. Venkata Ratnam, "Machine Learning in Intrusion Detection – A Survey", International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.112-119, 2019.
[17] Madhavi Dhingra, "Survey on Intrusion Detection System Based on Feature Classification and Selection", International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.399-403, 2019.
[18] P. Patil, T. Bagwan, S. Kulkarni, C. Lobo, S.R. Khonde, "Multi-Attacks Detection in Distributed System using Machine Learning", International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.601-605, 2019.