Comparative Evaluation of Machine learning methods for Network Intrusion Detection System.

Main Article Content

SUNIL KUMAR RAJWAR

Abstract

Cyber security is becoming more sophisticated, and as a result, there is an increasing challenge to accurately detect intrusions. Lack of intrusion prevention can degrade the credibility of security services, namely data confidentiality, integrity and availability. Many intrusion detection methods have been suggested in the literature to address threats to computer security, which can be broadly classified into signature-based intrusion detection (SIDS) and anomaly-based intrusion detection systems. (AIDS). This research presents the contemporary taxonomy of IDS, a comprehensive review of important recent work, and an overview of commonly used datasets for assessment purposes. It also presents detail analysis of different machine learning approach for intrusion detection.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biography

SUNIL KUMAR RAJWAR, VINOBA BHAVE UNIVERSITY

ASSISTANT PROFESSOR, UNIVERSITY DEPT. OF COMPUTER APPLICATIONS, VINOBA BHAVE UNIVERSITY,HAZARIBAG,JHARKHAND

References

Varun Chandola, ArindamBanerjee, Vipin Kumar, Outlier Detection: A Survey, ACM Computing Surveys, 2009.

Prasanta Gogoi, D.K. Bhattacharyya, B. Borah, Jugal K. Kalita, A Survey of Outlier Detection Methods in Network Anomaly Identification, The Computer Journal ( Volume: 54, Issue: 4, Apr. 2011)

Ansam Khraisat, Iqbal Gondal, Peter Vamplew and Joarder Kamruzzaman, Survey of intrusion detection systems: techniques, datasets and challenges, Khraisat et al. Cybersecurity(2019)

T. Ye, S. Kalyanaraman, D. Harrison, B. Sikdar, B. Mo, H. T. Kaur, K. Vastola, and B. Szymanski, “Network management and control using collaborative on-line simulation,†in Proc. CNDSMS, 2000

M. Thottan and C. Ji, “Using network fault predictions to enable ip traffic management,†J. Network Syst. Manage., 2000.

R. Maxion and F. E. Feather, “A case study of ethernet anomalies in a distributed computing environment,†IEEE Trans. Reliability, vol. 39, pp. 433–443, Oct. 1990.

G. Vigna and R. A. Kemmerer, “Netstat: A network based intrusuion detection approach,†in Proc. ACSAC, 1998.

J. Yang, P. Ning, X. S. Wang, and S. Jajodia, “Cards: A distributed system for detecting coordinated attacks,†in Proc. SEC, 2000, pp. 171–180.

H. Wang, D. Zhang, and K. G. Shin, “Detecting syn flooding attacks,†in Proc. IEEE INFOCOM, 2002.

S. Savage, D. Wetherall, A. R. Karlin, and T. Anderson, “Practical net- work support for ip traceback,†in Proc. ACM SIGCOMM, 2000, pp. 295–306.

Dhruba Kumar Bhattacharyya ,Jugal Kumar Kalita, Network Anomaly Detection:A Machine Learning Perspective , ISBN 9781466582088, Published July 5, 2013 by Chapman and Hall/CR,366 Pages

Effective approach toward Intrusion Detection System using data mining techniques, Nadiammai, M.Hemalatha Egyptian Informatics Journal (2014) 15,

Stallings William. Network and internetwork security: Principles and practice. Englewood Cliffs: Prentice Hall.

Verwoerd, Theuns, Ray Hunt. Intrusion detection techniques and approaches. 15, s.l.: Elsevier, Computer Communications. 2002;25:1356-1365.

Anonymous. Intrusion detection FAQ. May 19; 2010. Available:http://www.sans.org/ Available:http://www.sans.org/security- resources/idfaq/

Shun Julian, Heidar Malki. Network intrusion detection system using neural networks. s.l.: IEEE, ICNC'08. Fourth International Conference. 2008.

Machine learning.[Online]August6;2015.Available:https://en.wikipedia.org/wiki/ Machine learning.

Dong Ling Tong and Robert Mintram, “Genetic Algorithm-Neural Network (GANN): a study of neural network activation functions and depth of genetic algorithm search applied to feature selectionâ€, International Journal of Machine Learning and Cybernetics, Vol. 1, No. 1-4, pp. 75-87, 2010.

Peddabachigari S., Abraham A., Thomas J., “Intrusion Detection Systems Using Decision Trees and Support Vector Machinesâ€, International Journal of Applied Science and Computations, Vol.11, No.3, pp.118-134, 2004.

Sindhu, Siva S Sivatha, Geetha S, Kannan, A Decision tree based light weight intrusion detection using a wrapper approach. 1, s.l. : Elsevier, Expert Systems with applications. 2012;39:129-141.

“KDD Cup 1999 Data.†[Online]. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html