Perspective Analysis of Machine Learning Algorithms for Detecting Network Intrusions

被引:0
作者
Nadiammai, G. V. [1 ]
Hemalatha, M. [2 ]
机构
[1] Karpagam Univ, Coimbatore, Tamil Nadu, India
[2] Karpagam Univ, Dept Software Syst & Res, Coimbatore, Tamil Nadu, India
来源
2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT) | 2012年
关键词
Data Mining; Intrusion Detection; Machine Learning; Rule based Classifier and Function Based Classifier;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network security has become an important issue due to the evolution of internet. It brings people not only together but also provides huge potential threats. Intrusion detection technique is considered as the immense method to deploy networks security behind firewalls. An intrusion is defined as a violation of security policy of the system. Intrusion detection systems are developed to detect those violations. Due to the effective data analysis method, data mining is introduced into IDS. This paper brings an idea of applying data mining algorithms to intrusion detection database. Performance of various rule and function based classifiers like Part, Ridor, NNge, DTNB, JRip, Conjunctive Rule, One R, Zero R, Decision Table, RBF, Multi Layer Perception and SMO algorithms are compared and result shows that SMOciassification algorithm performs well in terms of accuracy, specificity and sensitivity. The performance of the model is measured using 10-fold cross validation.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Detecting Bad Smells with Machine Learning Algorithms: an Empirical Study
    Cruz, Daniel
    Santana, Amanda
    Figueiredo, Eduardo
    2020 IEEE/ACM INTERNATIONAL CONFERENCE ON TECHNICAL DEBT, TECHDEBT, 2020, : 31 - 40
  • [42] A Novel Method for Detecting Disk Filtration Attacks via the Various Machine Learning Algorithms
    Weijun Zhu
    Mingliang Xu
    中国通信, 2020, 17 (04) : 99 - 108
  • [43] A Novel Method for Detecting Disk Filtration Attacks via the Various Machine Learning Algorithms
    Zhu, Weijun
    Xu, Mingliang
    CHINA COMMUNICATIONS, 2020, 17 (04) : 99 - 108
  • [44] Automated crater detection algorithms from a machine learning perspective in the convolutional neural network era
    DeLatte, D. M.
    Crites, S. T.
    Guttenberg, N.
    Yairi, T.
    ADVANCES IN SPACE RESEARCH, 2019, 64 (08) : 1615 - 1628
  • [45] Evaluation of Machine Learning Algorithms for Detection of Malicious Traffic in SCADA Network
    Rajesh, L.
    Satyanarayana, Penke
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2022, 17 (02) : 913 - 928
  • [46] Network Traffic Classification Techniques and Comparative Analysis Using Machine Learning Algorithms
    Shafiq, Muhammad
    Yu, Xiangzhan
    Laghari, Asif Ali
    Yao, Lu
    Karn, Abin Kumar
    Abdessamia, Oudil
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 2451 - 2455
  • [47] Detection of Intrusions with Machine Learning Methods
    Bostanci, Beyzanur
    Albayrak, Ahmet
    2ND INTERNATIONAL INFORMATICS AND SOFTWARE ENGINEERING CONFERENCE (IISEC), 2021,
  • [48] Detect-IoT: A Comparative Analysis of Machine Learning Algorithms for Detecting Compromised IoT Devices
    Siwakoti, Yuba R.
    Rawat, Danda B.
    PROCEEDINGS OF THE 2023 INTERNATIONAL SYMPOSIUM ON THEORY, ALGORITHMIC FOUNDATIONS, AND PROTOCOL DESIGN FOR MOBILE NETWORKS AND MOBILE COMPUTING, MOBIHOC 2023, 2023, : 370 - 375
  • [49] A Survey of On-Device Machine Learning: An Algorithms and Learning Theory Perspective
    Dhar, Sauptik
    Guo, Junyao
    Liu, Jiayi
    Tripathi, Samarth
    Kurup, Unmesh
    Shah, Mohak
    ACM TRANSACTIONS ON INTERNET OF THINGS, 2021, 2 (03):
  • [50] Comparative Analysis of Ensemble Learning Methods in Classifying Network Intrusions
    Moritalho, Francis Jesmar P.
    Festijo, Enrique D.
    2019 IEEE 9TH INTERNATIONAL CONFERENCE ON SYSTEM ENGINEERING AND TECHNOLOGY (ICSET), 2019, : 431 - 436