Performance Analysis of Different Machine Learning Algorithm on Intrusion Detection System

Authors

  • Ganeshe R Dept. of Computer Science & Engineering, University Institute of Technology, RGPV, Bhopal
  • Ahirwar MK Dept. of Computer Science & Engineering, University Institute of Technology, RGPV, Bhopal
  • Pandey R Dept. of Computer Science & Engineering, University Institute of Technology, RGPV, Bhopal

DOI:

https://doi.org/10.26438/ijcse/v7i7.8386

Keywords:

Intrusion Detection system, Anomaly detection, deep belief network, state preserving extreme learning machine

Abstract

There are rapidly increasing attacks on computers creates a problem for network administration for averting the computer from these attacks. There are many conventional intrusion detection systems (IDS) is present but they are unable to prevent computer system completely. These IDS finds the spiteful actions on net traffics and they find the anomalies in network system. But in numerous instances they are unable for detecting spiteful actions in the networks. There is human interaction is also required to process the network traffic or detect malicious activity. In this paper we present various data mining algorithms helps in machine learning to detect intrusion accurately.

References

[1] Rahul Vigneswaran K, Vinayakumar R and Prabaharan Poornachandran, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security" in IEEE 2018.

[2] Yaping Chang ; Wei Li ; Zhongming Yang, " Network Intrusion Detection Based on Random Forest and Support Vector Machine" in IEEE 2017.

[3] David Ahmad Effendy, Sudarmawan Sudarmawan, “Classification of Intrusion Detection System (IDS) Based on Computer Network” in 2017 IEEE.

[4] Amreen Sultana, M.A.Jabbar, “Intelligent Network Intrusion Detection System using Data Mining Techniques” in IEEE 2016.

[5] James P. Anderson, "Computer security threat monitoring and surveillance," in USA, April 1980.

[6] Nawfal Turki Obeis, Wesam Bhaya, “Review of Data Mining Techniques for Malicious Detetion”, in RJAS, 2016.

[7] Jau-Hwang WANG and Peter S. DENG, “Virus Detection Using Data Mining Techniques”, in Taiwan.

[8] Chi Zhang, Jinyuan Sun, “Privacy and Security for Online Social Networks: Challenges and Opportunity”, in University of Florida and Xidian University.

[9] Uma Salunkhe, Suresh N. Mali, “ Enrichment in Intrusion Detection System Using Ensemble”, in JECE.

[10] Q.S. Qassim, A. M. Zin and M. J. Ab Aziz, “Anomalies classification approach for network- based intrusion detection system”, in IJNS, 2016.

[11] O.Y.Al-Jarrah, P.D.Yoo, K.Taha and K. Kim, “ Data Randomization and Cluster-based Partitioning for botnet intrusion detection”, in IEEE, 2016.

[12] Solane Duque, Dr. Mohd. Nizam Bin Omar, “Using Data Mining Algorithm for Developing a Model for Intrusion Detection System(IDS)”, in procedia Computer Science, 2015.

[13] Abhaya, K. Kumar, S. Afroz, “Data Mining Techniques for Intrusion Detection: A Review,” in IJARCCE, 2014.

[14] R.J. Manish, H.T. Hadi, “A review of network traffic analysis and prediction techniques”.

[15] S. Choudhury, A.Bhowal,“Comparative Analysis of Machine Learning Algorithms along with Classifiers for Network Intrusion Detection.” in IEEE, 2015.

[16] ] S.B. Kotsiantis, P.E. Pintelas, “Machine Learning: a Review of Classification and combining Techniques,” in Artificial Intelligence Review, 2006.

[17] I. Witten, E. Frank, M. Hall, “Data mining: Practical Machine Learning Tools and Techniques.” in 2011.

[18] M. Masud, L. Khan, B. Thuraisingham, “Data mining tools for malware detection,” in 2012.

[19] R.S. Wahono, “A Systematic Literature Review of Software Defect Prediction: Research Trends, Datasets, Methods and Frameworks,” In 2015.

[20] M.H. Haratian, “An Architectural Design for a Hybrid Intrusion Detection System for Database,”.

[21] S. Zargari, D. Voorhris, “Feature Selection in the Corrected KDDdataset,” in 2012.

Downloads

Published

2019-07-31
CITATION
DOI: 10.26438/ijcse/v7i7.8386
Published: 2019-07-31

How to Cite

[1]
R. Ganeshe, M. K. Ahirwar, and R. Pandey, “Performance Analysis of Different Machine Learning Algorithm on Intrusion Detection System”, Int. J. Comp. Sci. Eng., vol. 7, no. 7, pp. 83–86, Jul. 2019.

Issue

Section

Review Article