Open Access   Article Go Back

A survey on Detecting Network Intrusions Using Machine Learning

K. Haritha1 , CH. Mallikarjuna Rao2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 1101-1105, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.11011105

Online published on May 31, 2019

Copyright © K. Haritha, CH. Mallikarjuna Rao . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K. Haritha, CH. Mallikarjuna Rao, “A survey on Detecting Network Intrusions Using Machine Learning,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1101-1105, 2019.

MLA Style Citation: K. Haritha, CH. Mallikarjuna Rao "A survey on Detecting Network Intrusions Using Machine Learning." International Journal of Computer Sciences and Engineering 7.5 (2019): 1101-1105.

APA Style Citation: K. Haritha, CH. Mallikarjuna Rao, (2019). A survey on Detecting Network Intrusions Using Machine Learning. International Journal of Computer Sciences and Engineering, 7(5), 1101-1105.

BibTex Style Citation:
@article{Haritha_2019,
author = {K. Haritha, CH. Mallikarjuna Rao},
title = {A survey on Detecting Network Intrusions Using Machine Learning},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1101-1105},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4368},
doi = {https://doi.org/10.26438/ijcse/v7i5.11011105}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.11011105}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4368
TI - A survey on Detecting Network Intrusions Using Machine Learning
T2 - International Journal of Computer Sciences and Engineering
AU - K. Haritha, CH. Mallikarjuna Rao
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1101-1105
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
274 167 downloads 133 downloads
  
  
           

Abstract

Intrusion Detection (ID) is a basic part of security, for example, versatile security machines. Earlier different ID procedures are utilized; however their execution is an issue. ID execution relies upon precision, which needs to enhance to diminish false alarms and to expand the detection rate. To determine concerns on execution, multi-layer network, SVM, Naïve Bayes and different procedures have been utilized in later. Such procedures demonstrate restrictions and are not proficient for use in huge data, for example, complex and system data. The ID framework is utilized in breaking down immense traffic data; thus, a proficient classification method is important to beat the issue. This issue is considered in this paper. Popular data mining and machine learning methods are used. They are SVM, and Random forest and KNN, Decision Tree, Extreme Learning Machine (ELM). These methods are outstanding a direct result of their capacity in classification. NSL_KDD dataset is used.

Key-Words / Index Term

ID, Anomaly Detection, False Alarms, NSL_KDD dataset, Ensemble Approaches

References

[1] H.Wang,J.Gu,andS.Wang,‘‘An effective intrusion detection framework based on SVM with feature augmentation,’’ Knowl.-Based Syst., vol. 136, pp. 130–139, Nov. 2017, doi: 10.1016/j.knosys.2017.09.014.
[2] S. Duque, N.B Omar, “Using data Mining Algorithms for Developing a Model for ID System (IDS)”, Proceedings of Science direct: Procedia Computer Science 61, pp. (46-51), 2015.
[3] B. Sharma and H. Gupta, “A design and Implementation of ID System by using Data Mining”, IEEE Fourth International Conference on Communication Systems and Network Technologies, pp.700-704, 2015.
[4] U. Ravale, M. marathe, P. Padiya, “Feature Selection based Hybrid Anomoly ID System using K Means and RBF Kernal Function”, Proceedings of Science Direct: International Conference on Advanced Computing Technologies and Applications (ICACTA), pp. 428-435, 2015.
[5] W. C. Lin, S. W. Ke, C. F. Tsai, “CANN: An ID system based on combining cluster centers and nearest neighbors”, Proceedings of Science direct: Knowledge-Based Systems, pp. 13-21, 2015.
[6] J. Haque, K.W. Magld, N. Hundewale, “An Intelligent Approach for ID based on Data Mining Techniques”, Proceedings of IEEE, 2012.
[7] Liang Hu, Taihui Li, NannanXie, Jiejunhu, “False Positive Elemination in ID based on Clustering”, IEEE International Conference on Funny System and Knowledge Discovery (FSKD), pp. 519-523, 2015.
[8] Zhengjie Li, Yongzhong Li, Lei Xu, “Anomoly ID Method based on K-Means Clustering Algorithm with Particle Swarm Optimization”, IEEE International Conference of Information Technology, Computer Engineering and Management Sciences, pp. 157- 161, 2011.
[9] S. J. Horng, M.Y. Su, Y. H. Chen, T. W. Kao, R. J. Chen, J. L. Lai, C. D. Perkasa, “A novel ID system based on hierarchical clustering and support vector machines”, Proceedings of Science direct: Expert Systems with Applications, pp. 306-313, 2011.
[10] http://nsl.cs.unb.ca/NSL-KDD/
[11] K. Shivshankar E., “Combination of Data Mining Techniques for ID System”, IEEE International Conference on Computer, Communication and Control (IC4-2015).
[12] L. Dhanabal, S.P. Shantharajah, “A study of NSL-KDD Dataset for ID System based on Classification Algorithms”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.4, Issue 6, pp. (446-452), June 2015.
[13] Chang, Y., Li, W., & Yang, Z. (2017). Network Intrusion Detection Based on Random Forest and Support Vector Machine. 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC). doi:10.1109/cse-euc.2017.118
[14] Basic Evaluation Measures From the Confusion Matrix. Accessed: May 20, 2018. [Online]. Available: http://WordPress.com and https:// classeval.wordpress.com
[15] Swati Paliwal and Ravindra Gupta. Article: Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm. International Journalof Computer Applications 60(19):57-62, December 2012.
[16] G.-B. Huang, Q.-Y. Zhu, and C.-K. Siew, ‘‘Extreme learning machine: A new learning scheme of feedforward neural networks,’’ in Proc. IEEE Int. Joint Conf. Neural Netw., vol. 2, Jul. 2004, pp. 985–990, doi: 10.1109/IJCNN.2004.1380068.