NETWORK ATTACK DETECTION USING MACHINE LEARNING APPROACH

Rashmi Hebbar ., Mohan K .

Abstract


With the massive growth of computer networks and the enormous increase in the number of applications that rely on it, network security is becoming very important. Moreover, almost all computer systems in any organization suffer from security vulnerabilities which are both technically difficult and economically expensive to be solved by the manufacturers. Network intrusion Detection System is one of the fundamental components to monitor and analyze the traffic to find out any possible attacks in the network. They are the safety measurements of any network. NIDS plays an important role in privacy security. But the problem is that at what level these NIDS will efficiently able to work? In this paper, the framework for the network intrusion using anomaly method by considering machine learning algorithm is proposed. And the comparison result of using different classifier is achieved.


References


. Prerika Agarwal, S.Satapathy, “Implementation of Signature-based Detection System using Snort in windows”, International Journal of Innovation & Advancement in Computer Science (IJIACS), May 2014.

. C.Modi, Dhiran Patel, “A Novel hybrid- Network Intrusion Detection System in Cloud Computing”, IEEE, 2013.

. R. Vanathi, S. Gunasekaran, “Comparision of Network Intrusion Detection System in Cloud Computing Environment”, International Conference on Computer Communication and Informatics (ICCCI -2012), Jan. 10 – 12, 2012, Coimbatore, INDIA

. J. Allen, A. Christie, W. Fithen, J. McHugh, and J. Pickel,“State of the practice of intrusion detection technologies,” in CMU/SEI-99-TR-028, 2000.

. M. Panda and M.R Patra, “Network Intrusion Detection using naïve bayes”, International Journal of Computer science and Network Security (IJCSNS) Volume-7, No 12, December 2007, pp-258-236.

. R. Dubey, P. Nandan Pathak, “ KNN based Clasiffier system for Intrusion Detection”, International Journal of Advanced Computer Technologies(IJACT), Volume 2, N0 4, ISSN: 2319-7900.

. G. Stein, B.Chen, “Decision Tree Classifier for Network Intrusion Detection with GA based feature selection”, University of Central Florida. ACM-SE 43, Proceeding of 43rd annual Southeast regional Conference, Volume-2, 2005 ACM, New York, USA.

. H. Nguyen, K. Franke, S. Petrovi’c, “ Improving effectiveness of Intrusion Detection by Correlation Feature Selectio”, International Conference on Availability, Reliability and Security, pp. 17-24. IEEE 2010.

. M. Ektefa, S. Memar, et.al. “Intrusion Detection using Data Mining Technique”, Proceedings of IEEE International Conference on Information Retrieval & Knowledge Management, Exploring Invisible World, CAMP’10, 2010, pp200-203.

. A. Jain, S.Sharma, M. S. Sisodia, “Network Intrusion Detection by using Supervised and Unsupervised Machine Learning Techniques: A survey”, International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 1, Issue 3, Nov 2011.

. Y. K. Jain and Upendra, “ An Efficient Intrusion Detection Based on Decision Tree Classifir Feature Reduction”, International Journal of Scientific and Research Publications, Volume 2, Issue 1, January 2012.

. http://scikit-learn.org/stable/modules/neighbors.html

. KDD cup 1999 [Online] Available: http://kdd.ics.uci.edu/databases/kddcup99/kdcup99.htm

. S.S Sathya, R.G. Ramani, and K. Sivaselvi, “Discriminant Analysis based Feature Selection in KDD Intrusion Dataset”, International Journal of Computer application, vol 31, n0-11, pp.1-7,2011.

. J. Singh, M. J. Nene, “A Survey on Machine Learning Techniques for Intrusion Detection Systems”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 11, November 2013.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.