Comparative Evaluation of Machine learning methods for Network Intrusion Detection System.
Main Article Content
Abstract
Cyber security is becoming more sophisticated, and as a result, there is an increasing challenge to accurately detect intrusions. Lack of intrusion prevention can degrade the credibility of security services, namely data confidentiality, integrity and availability. Many intrusion detection methods have been suggested in the literature to address threats to computer security, which can be broadly classified into signature-based intrusion detection (SIDS) and anomaly-based intrusion detection systems. (AIDS). This research presents the contemporary taxonomy of IDS, a comprehensive review of important recent work, and an overview of commonly used datasets for assessment purposes. It also presents detail analysis of different machine learning approach for intrusion detection.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Varun Chandola, ArindamBanerjee, Vipin Kumar, Outlier Detection: A Survey, ACM Computing Surveys, 2009.
Prasanta Gogoi, D.K. Bhattacharyya, B. Borah, Jugal K. Kalita, A Survey of Outlier Detection Methods in Network Anomaly Identification, The Computer Journal ( Volume: 54, Issue: 4, Apr. 2011)
Ansam Khraisat, Iqbal Gondal, Peter Vamplew and Joarder Kamruzzaman, Survey of intrusion detection systems: techniques, datasets and challenges, Khraisat et al. Cybersecurity(2019)
T. Ye, S. Kalyanaraman, D. Harrison, B. Sikdar, B. Mo, H. T. Kaur, K. Vastola, and B. Szymanski, “Network management and control using collaborative on-line simulation,†in Proc. CNDSMS, 2000
M. Thottan and C. Ji, “Using network fault predictions to enable ip traffic management,†J. Network Syst. Manage., 2000.
R. Maxion and F. E. Feather, “A case study of ethernet anomalies in a distributed computing environment,†IEEE Trans. Reliability, vol. 39, pp. 433–443, Oct. 1990.
G. Vigna and R. A. Kemmerer, “Netstat: A network based intrusuion detection approach,†in Proc. ACSAC, 1998.
J. Yang, P. Ning, X. S. Wang, and S. Jajodia, “Cards: A distributed system for detecting coordinated attacks,†in Proc. SEC, 2000, pp. 171–180.
H. Wang, D. Zhang, and K. G. Shin, “Detecting syn flooding attacks,†in Proc. IEEE INFOCOM, 2002.
S. Savage, D. Wetherall, A. R. Karlin, and T. Anderson, “Practical net- work support for ip traceback,†in Proc. ACM SIGCOMM, 2000, pp. 295–306.
Dhruba Kumar Bhattacharyya ,Jugal Kumar Kalita, Network Anomaly Detection:A Machine Learning Perspective , ISBN 9781466582088, Published July 5, 2013 by Chapman and Hall/CR,366 Pages
Effective approach toward Intrusion Detection System using data mining techniques, Nadiammai, M.Hemalatha Egyptian Informatics Journal (2014) 15,
Stallings William. Network and internetwork security: Principles and practice. Englewood Cliffs: Prentice Hall.
Verwoerd, Theuns, Ray Hunt. Intrusion detection techniques and approaches. 15, s.l.: Elsevier, Computer Communications. 2002;25:1356-1365.
Anonymous. Intrusion detection FAQ. May 19; 2010. Available:http://www.sans.org/ Available:http://www.sans.org/security- resources/idfaq/
Shun Julian, Heidar Malki. Network intrusion detection system using neural networks. s.l.: IEEE, ICNC'08. Fourth International Conference. 2008.
Machine learning.[Online]August6;2015.Available:https://en.wikipedia.org/wiki/ Machine learning.
Dong Ling Tong and Robert Mintram, “Genetic Algorithm-Neural Network (GANN): a study of neural network activation functions and depth of genetic algorithm search applied to feature selectionâ€, International Journal of Machine Learning and Cybernetics, Vol. 1, No. 1-4, pp. 75-87, 2010.
Peddabachigari S., Abraham A., Thomas J., “Intrusion Detection Systems Using Decision Trees and Support Vector Machinesâ€, International Journal of Applied Science and Computations, Vol.11, No.3, pp.118-134, 2004.
Sindhu, Siva S Sivatha, Geetha S, Kannan, A Decision tree based light weight intrusion detection using a wrapper approach. 1, s.l. : Elsevier, Expert Systems with applications. 2012;39:129-141.
“KDD Cup 1999 Data.†[Online]. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html