Comparative Evaluation of Machine learning methods for Network Intrusion Detection System.
Abstract
Cyber security is becoming more sophisticated, and as a result, there is an increasing challenge to accurately detect intrusions. Lack of intrusion prevention can degrade the credibility of security services, namely data confidentiality, integrity and availability. Many intrusion detection methods have been suggested in the literature to address threats to computer security, which can be broadly classified into signature-based intrusion detection (SIDS) and anomaly-based intrusion detection systems. (AIDS). This research presents the contemporary taxonomy of IDS, a comprehensive review of important recent work, and an overview of commonly used datasets for assessment purposes. It also presents detail analysis of different machine learning approach for intrusion detection.
Keywords
Full Text:
PDFReferences
Varun Chandola, ArindamBanerjee, Vipin Kumar, Outlier Detection: A Survey, ACM Computing Surveys, 2009.
Prasanta Gogoi, D.K. Bhattacharyya, B. Borah, Jugal K. Kalita, A Survey of Outlier Detection Methods in Network Anomaly Identification, The Computer Journal ( Volume: 54, Issue: 4, Apr. 2011)
Ansam Khraisat, Iqbal Gondal, Peter Vamplew and Joarder Kamruzzaman, Survey of intrusion detection systems: techniques, datasets and challenges, Khraisat et al. Cybersecurity(2019)
T. Ye, S. Kalyanaraman, D. Harrison, B. Sikdar, B. Mo, H. T. Kaur, K. Vastola, and B. Szymanski, “Network management and control using collaborative on-line simulation,” in Proc. CNDSMS, 2000
M. Thottan and C. Ji, “Using network fault predictions to enable ip traffic management,” J. Network Syst. Manage., 2000.
R. Maxion and F. E. Feather, “A case study of ethernet anomalies in a distributed computing environment,” IEEE Trans. Reliability, vol. 39, pp. 433–443, Oct. 1990.
G. Vigna and R. A. Kemmerer, “Netstat: A network based intrusuion detection approach,” in Proc. ACSAC, 1998.
J. Yang, P. Ning, X. S. Wang, and S. Jajodia, “Cards: A distributed system for detecting coordinated attacks,” in Proc. SEC, 2000, pp. 171–180.
H. Wang, D. Zhang, and K. G. Shin, “Detecting syn flooding attacks,” in Proc. IEEE INFOCOM, 2002.
S. Savage, D. Wetherall, A. R. Karlin, and T. Anderson, “Practical net- work support for ip traceback,” in Proc. ACM SIGCOMM, 2000, pp. 295–306.
Dhruba Kumar Bhattacharyya ,Jugal Kumar Kalita, Network Anomaly Detection:A Machine Learning Perspective , ISBN 9781466582088, Published July 5, 2013 by Chapman and Hall/CR,366 Pages
Effective approach toward Intrusion Detection System using data mining techniques, Nadiammai, M.Hemalatha Egyptian Informatics Journal (2014) 15,
Stallings William. Network and internetwork security: Principles and practice. Englewood Cliffs: Prentice Hall.
Verwoerd, Theuns, Ray Hunt. Intrusion detection techniques and approaches. 15, s.l.: Elsevier, Computer Communications. 2002;25:1356-1365.
Anonymous. Intrusion detection FAQ. May 19; 2010. Available:http://www.sans.org/ Available:http://www.sans.org/security- resources/idfaq/
Shun Julian, Heidar Malki. Network intrusion detection system using neural networks. s.l.: IEEE, ICNC'08. Fourth International Conference. 2008.
Machine learning.[Online]August6;2015.Available:https://en.wikipedia.org/wiki/ Machine learning.
Dong Ling Tong and Robert Mintram, “Genetic Algorithm-Neural Network (GANN): a study of neural network activation functions and depth of genetic algorithm search applied to feature selection”, International Journal of Machine Learning and Cybernetics, Vol. 1, No. 1-4, pp. 75-87, 2010.
Peddabachigari S., Abraham A., Thomas J., “Intrusion Detection Systems Using Decision Trees and Support Vector Machines”, International Journal of Applied Science and Computations, Vol.11, No.3, pp.118-134, 2004.
Sindhu, Siva S Sivatha, Geetha S, Kannan, A Decision tree based light weight intrusion detection using a wrapper approach. 1, s.l. : Elsevier, Expert Systems with applications. 2012;39:129-141.
“KDD Cup 1999 Data.” [Online]. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
DOI: https://doi.org/10.26483/ijarcs.v12i4.6748
Refbacks
- There are currently no refbacks.
Copyright (c) 2021 International Journal of Advanced Research in Computer Science

