MLIDS: A Machine Learning Approach for Intrusion Detection for Real Time Network Dataset

被引:3
|
作者
Rokade, Monika D. [1 ]
Sharma, Yogesh Kumar [2 ]
机构
[1] Shri JJT Univ, Dept Comp Sci & Engn, Jhunjhunu, Rajasthan, India
[2] Dept Comp Sci & Engn, Jhunjhunu, India
关键词
Intrusion Detection System; Network security; Naive Bayes; SVM; Artificial Neural Network; KDDCUP99;
D O I
10.1109/ESCI50559.2021.9396829
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer network and virtual machine security is very essential in today's era. Various architectures have been proposed for network security or prevent malicious access of internal or external users. Various existing systems have already developed to detect malicious activity on victim machines; sometimes any external user creates some malicious behavior and gets unauthorized access of victim machines to such a behavior system considered as malicious activities or Intruder. Numerous machine learning and soft computing techniques design to detect the activities in real-time network log audit data. KKDDCUP99 and NLSKDD most utilized data set to detect the Intruder on benchmark data set. In this paper, we proposed the identification of intruders using machine learning algorithms. Two different techniques have been proposed like a signature with detection and anomaly-based detection. In the experimental analysis, demonstrates SVM, Naive Bayes and ANN algorithm with various data sets and demonstrate system performance on the real-time network environment.
引用
收藏
页码:533 / 536
页数:4
相关论文
共 50 条
  • [1] A Continuous Learning Approach for Real-Time Network Intrusion Detection
    Martina, Marcello Rinaldo
    Foresti, Gian Luca
    INTERNATIONAL JOURNAL OF NEURAL SYSTEMS, 2021, 31 (12)
  • [2] Network intrusion detection system: A machine learning approach
    Panda, Mrutyunjaya
    Abraham, Ajith
    Das, Swagatam
    Patra, Manas Ranjan
    INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS, 2011, 5 (04): : 347 - 356
  • [3] A novel, refined dataset for real-time Network Intrusion Detection
    Komisarek, Mikolaj
    Pawlicki, Marek
    Mihailescu, Maria-Elena
    Mihai, Darius
    Carabas, Mihai
    Kozik, Rafal
    Choras, Michal
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [4] Meta learning intrusion detection in real time network
    Bie, Rongfang
    Jin, Xin
    Chen, Chuanliang
    Xu, Chuan
    Huang, Ronghuai
    ARTIFICIAL NEURAL NETWORKS - ICANN 2007, PT 1, PROCEEDINGS, 2007, 4668 : 809 - +
  • [5] Machine Learning in Network Intrusion Detection: A Cross-Dataset Generalization Study
    Cantone, Marco
    Marrocco, Claudio
    Bria, Alessandro
    IEEE ACCESS, 2024, 12 : 144489 - 144508
  • [6] Machine Learning Techniques for Intrusion Detection on Public Dataset
    Thanthrige, Udaya Sampath K. Perera Miriya
    Samarabandu, Jagath
    Wang, Xianbin
    2016 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2016,
  • [7] A machine learning approach for improving the performance of network intrusion detection systems
    Azizan A.H.
    Mostafa S.A.
    Mustapha A.
    Mohd Foozy C.F.
    Abd Wahab M.H.
    Mohammed M.A.
    Khalaf B.A.
    Annals of Emerging Technologies in Computing, 2021, 5 (Special issue 5) : 201 - 208
  • [8] Classification of Intrusion Detection Dataset using machine learning Approaches
    Subramanyam, Doodipalli
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 280 - 283
  • [9] A hybrid approach for real-time network intrusion detection systems
    Lee, Sang Min
    Kim, Dong Seong
    Park, Jong Sou
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 712 - 715
  • [10] A Deep Learning Approach for Network Intrusion Detection Based on NSL-KDD Dataset
    Zhang, Chongzhen
    Ruan, Fangming
    Yin, Lan
    Chen, Xi
    Zhai, Lidong
    Liu, Feng
    PROCEEDINGS OF 2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (IEEE-ASID'2019), 2019, : 41 - 45