A Survey on Intrusion Detection System using Machine Learning and Deep Learning

Authors

  • Hemavati  Department of Information Science and Technology, SIT, Tumakuru, Karnataka, India
  • Dr. Aparna R  Department of Information Science and Technology, SIT, Tumakuru, Karnataka, India

DOI:

https://doi.org//10.32628/CSEIT195264

Keywords:

IOT, IDS, deep learning, machine learning.

Abstract

As we know internet of Things (IoT) is one of the fastest growing paradigm which is composed of Internet and different physical devices with different domains or the smart applications like home automation, business automation applications, health and environmental monitoring applications. The dependency on IOT devices is increasing day by day with our daily activities, which leads to most important challenge for security. Since having a better monitoring system for better security is a need. From more than two decades the concept or the frame work called IDS (Intrusion detection system) is playing important role for detecting the attacks in the network. Since the network attacks are not fixed in nature, a new type of attacks are happening on the network applications. There are many traditional IDS techniques are available but they are complex to apply. Since machine learning is one of the important area which is achieving good results in many applications. In this paper we study about the different machine learning techniques used till now and the methodology for the attack detection and the validation strategy. We will also discuss about the performance metrics.

References

  1. S.Revathi and A.Malathi, "A detailed analysis on NSL- KDD dataset using various machine learning techniques for intrusion detection," Int. J. Eng. Res. Technol., vol. 2, pp. 1848 -1853, Dec. 2013.
  2. R. R. Reddy, Y. Ramadevi, and K. V. N. Sunitha, "Effective discriminant function for intrusion detection using SVM," in Proc. Int. Conf. Adv. Comput., Commun. Inform. (ICACCI), Sep. 2016, pp. 1148-1153.
  3. N.Paulauskasand J.Auskalnis, "Analysis of data preprocessing in fluence on intrusion detection using NSL-KDD dataset," in Proc. Open Conf. Elect., Electron. Inf. Sci. (eStream), Apr. 2017, pp. 1-5.
  4. R. K. Sharma, H. K. Kalita, and P. Borah, "Analysis of machine learning techniques based intrusion detection systems," in Proc. Int. Conf. Adv.Comput., Netw., Inform., 2016, pp. 485-493.
  5. A. Milenkoski, M. Vieira, S. Kounev, A. Avritzer, and B. D. Payne, "Evaluating computer intrusion detection systems: A survey of common practices," ACM Comput. Surv., vol. 48, no. 1, pp. 1-41, 2015.
  6. E. Viegas, A. O. Santin, A. França, R. Jasinski, V. A. Pedroni, and L. S. Oliveira, "Towards an energy-efficient anomaly-based intrusion detection engine for embedded systems," IEEE Trans. Comput., vol. 66, no. 1, pp. 163-177, Jan. 2017.
  7. M. I. Jordan and T. M. Mitchell, "Machine learning: Trends, perspectives, and prospects," Science, vol. 349, no. 6245, pp. 255-260, 2015.
  8. M. V. Kotpalliwar and R. Wajgi, "Classification of attacks using support vector machine (SVM) on KDDCUP’99 IDS database," in Proc. Int. Conf. Commun. Syst. Netw. Technol., 2015, pp. 987-990.
  9. D. Moon, H. Im, I. Kim, and J. H. Park, "DTB-IDS: An intrusion detection system based on decision tree using behavior analysis for preventing APT attacks," J. Supercomput., vol. 73, no. 7, pp. 2881-2895, 2017.
  10. S. Jo, H. Sung, and B. Ahn, "A comparative study on the performance of intrusion detection using decision tree and artificial neural network models," J. Korea Soc. Digit. Ind. Inf. Manage., vol. 11, no. 4, pp. 33-45, 2015.
  11. M. Nadeem, O. Marshall, S. Singh, X. Fang, and X. Yuan, "Semi-supervised deep neural network for network intrusion detection," in Proc. KSU Conf. Cybersecur. Educ. Res. Pract., Oct. 2016, pp. 1-13.
  12. W. Meng, W. Li, and L.-F. Kwok, "Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection," Secur. Commun. Netw., vol. 8, no. 18, pp. 3883-3895, 2015.

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
Hemavati, Dr. Aparna R, " A Survey on Intrusion Detection System using Machine Learning and Deep Learning, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 2, pp.264-270, March-April-2019. Available at doi : https://doi.org/10.32628/CSEIT195264