Study of Intrusion Detection System using Machine Learning Approach

Authors

  • Sachin Ahirwar, Prof. Sarvesh Site

Keywords:

Intrusion Detection System, Machine Learning, Network Intrusion Detection System

Abstract

Due to the expansion and development of modern networks, the volume and destructiveness of cyber-attacks are continuously increasing. Intrusion Detection Systems (IDSs) are essential techniques for maintaining and enhancing network security. IDS-ML is an open-source code repository written in Python for developing IDSs from public network traffic datasets using traditional and advanced Machine Learning (ML) algorithms. The accuracy and timely detection should be ensured by Network Intrusion Detection System (NIDS). For intrusion detection in balance and imbalance network traffic, machine learning and deep learning methods can be used. In this paper a survey of different intrusion detection systems based on machine learning and deep learning methods is performed. The proposed system adds on ensemble learning approach to improve accuracy. A review on various intrusion detection system (IDS) using the techniques in machine learning is been put forwarded.

References

Pierre-Francois Marteau, ―Sequence Covering for Efficient Host-Based Intrusion Detection‖, IEEE Transactions on Information Forensics and Security, Vol. 14, No. 4, April 2019, pp. 944–1006.

Rashidah Funke Olanrewaju, Burhan Ul Islam Khan, Athaur Rahman Najeeb, Ku Nor Afiza Ku Zahir and Sabahat Hussain, ―Snort-Based Smart and Swift Intrusion Detection System‖, Indian Journal of Science and Technology, Vol. 11(4), DOI: 10.17485/ijst/2018/v11i4/120917, January 2018.

Ashima Chawla, Brian Lee, Sheila Fallon, and Paul Jacob, ―Host Based Intrusion Detection System with Combined CNN/RNN Model‖, Springer Nature Switzerland, August 2019, pp. 149–158.

Md. Zahangir Alom, Venkata Ramesh Bontupalli, and Tarek M. Taha, ―Intrusion Detection using Deep Belief Networks‖, IEEE 2015, pp. 339–344.

Hebatallah Mostafa Anwer, Mohamed Farouk, Ayman Abdel-Hamid, ―A Framework for Efficient Network Anomaly Intrusion Detection with Features Selection‖, IEEE 2018, pp. 157–162.

Nutan Farah Haq, Musharrat Rafni, Abdur Rahman Onik, ―Application of Machine Learning Approaches in Intrusion Detection System: A Survey‖, (IJARAI) International Journal of Advanced Research in Artificial Intelligence, Vol. 4, No. 3, 2015, pp. 9–18.

Rana Aamir Raza Ashfaq, Xi-Zhao Wang, Joshua Zhexue Huang, Haider Abbas, Yu-Lin He, ―Fuzziness Based Semi-Supervised Learning Approach for Intrusion Detection System‖, Elsevier 2016, pp. 484–497.

Anna L. Buczak and Erhan Guven, ―A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection‖, IEEE Communications Surveys & Tutorials, Vol. 18, No. 2, Second Quarter 2016, pp. 1153–1176.

Jabez J., Dr. B. Muthukumar, ―Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach‖, Procedia Computer Science, vol. 48, 2015, pp. 338–346.

M. Firoj Kabir, Sven Hartman, ―Cyber Security: Challenges – An Efficient Intrusion Detection System Design‖, IEEE 2018, pp. 19–24.

Poonam Sinai Kenkre, Anusha Pai, and Louella Colaco, ―Real Time Intrusion Detection and Prevention System‖, Springer International Publishing Switzerland 2015, pp. 405–411.

Pierre-Francois Marteau, ―Sequence Covering for Efficient Host-Based Intrusion Detection‖, Journal of LaTeX Class Files, Vol. 14, No. X, February 2018, pp. 1–14.

G. Yedukondalu, J. Anand Chandulal and M. Srinivasa Rao, ―Host-Based Intrusion Detection System Using File Signature Technique‖, Springer Nature Singapore Pte Ltd., 2017, pp. 225–232.

Okan Can, Ozgur Koray Sahingoz, ―A Survey of Intrusion Detection Systems in Wireless Sensor Networks‖, IEEE 2015, pp. 1–6.

Shijoe Jose, D. Malathi, Bharath Reddy, Dorathi Jayaseeli, ―A Survey on Anomaly Based Host Intrusion Detection System‖, NCMTA 2018, pp. 1–11.

Downloads

How to Cite

Sachin Ahirwar, Prof. Sarvesh Site. (2024). Study of Intrusion Detection System using Machine Learning Approach. International Journal of Research & Technology, 12(4), 27–31. Retrieved from https://ijrt.org/j/article/view/166

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.