Multi-Attacks Detection in Distributed System using Machine Learning
DOI:
https://doi.org/10.26438/ijcse/v7i1.601605Keywords:
IDS, Intrusion Detection System, Multiple attacks, Machine Learning, Network SecurityAbstract
Intrusion compromises a computer by breaking its security and thereby the computer enters into an insecure state. If such an event takes place, the computer becomes vulnerable to several attacks. These attacks aim to obtain information about the target computer and the information so obtained can be used to conduct fraudulent activities. It is difficult to prevent an intrusion into the system. However, if these computer intrusions are detected in time, the administrator can be informed and necessary actions can be taken at early stages. Previous Intrusion detection system (IDS) utilized several features to detect various malicious activities. However, these IDS methods only detect specific attack. They fail when the attacks are combined. For this purpose, we propose an Intrusion Detection System in distributed environment to mitigate the individual and combination routing attacks. This paper explains the method we used to generate such a system. Our proposed system of Intrusion Detection uses feature selection techniques to determine significant features, along with the best classification method will distinguish between an attack and non-attack. We aim to increase detection accuracy and reduce false alarm rate. NSLKDD dataset has been used to train our model. The paper also explains related work done in this field and briefly explains the network attacks and the dataset.
References
[1] M.N. Napiah, M.Y.I. Idris, R. Ramli, I. Ahmedy , “Compression header analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN communication protocol” ,IEEE Access, Vol. 6, 2018.
[2] P. Aggarwala, S.K. Sharma, “Analysis of KDD dataset attributes-class wise for intrusion detection”, Procedia Computer Science, Vol. 57, pp. 842–851, 2015.
[3] H. Chae, B. Jo, S. Choi, T. Park, “Feature selection for intrusion detection using NSL-KDD”, Recent Advances in Computer Science, pp. 184-187, 2013.
[4] S.S. Panwar, Dr. Y. P. Raiwani, “Data reduction techniques to analyze NSL-KDD dataset”, International Journal of Computer Engineering and Technology (IJCET), Vol. 5, Issue 10, pp. 21-31, October (2014).
[5] H.P.S. Sasan and M. Sharma, “Intrusion detection using feature selection and machine learning algorithm with misuse detection”, International Journal of Computer Science & Information Technology (IJCSIT), vol. 8,no.1,pp. 17-25, 2016.
[6] L.Dhanabal, Dr. S.P. Shantharajah. “A study on NSL- KDD dataset for intrusion detection system based on classification algorithms” International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 6, 2015.
[7] A. Narayan and T.J. Parvat., “An Intrusion Detection System, (IDS) with Machine Learning (ML) model combining hybrid classifiers” Journal of Multidisciplinary Engineering Science and Technology (JMEST), Vol. 2, Issue 4, April - 2015.
[8] P. Rutravigneshwaran, “A Study of Intrusion Detection System using Efficient Data Mining Techniques” International Journal of Scientific Research in Network Security and Communication, Vol. 5, Issue 6, December – 2017.
[9] M. Arora, S. Sharma, “Synthesis of Cryptography and Security Attacks” International Journal of Scientific Research in Network Security and Communication, Vol. 5, Issue 5, October – 2017.
[10] U. K. Singh, C. Joshi, S. K. Singh, “Zero day Attacks Defense Technique for Protecting System against Unknown Vulnerabilities” International Journal of Scientific Research in Computer Science and Engineering, Vol. 5, Issue 1, February – 2017.
[11] A. Ahmad , M. Asif, S. R. Ali, “Shallow Learning and Deep Learning Methods for Network security” International Journal of Scientific Research in Computer Science and Engineering, Vol. 6, Issue 5, October – 2018.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
