Intrusion Detection System using Machine Learning

Authors

  • Jayesh Zala  Computer Engineering Department, A. D. Patel Institute of Technology, Karamsad, Gujarat, India
  • Aditya Panchal  Computer Engineering Department, A. D. Patel Institute of Technology, Karamsad, Gujarat, India
  • Advait Thakkar  Computer Engineering Department, A. D. Patel Institute of Technology, Karamsad, Gujarat, India
  • Bhagirath Prajapati  Computer Engineering Department, A. D. Patel Institute of Technology, Karamsad, Gujarat, India
  • Priyanka Puvar  Computer Engineering Department, A. D. Patel Institute of Technology, Karamsad, Gujarat, India

DOI:

https://doi.org//10.32628/CSEIT2062166

Keywords:

Intrusion Detection System, Host, Network, Detection Techniques, Support vector machine, Machine Learning, NIDS, HIDS.

Abstract

Intrusion Detection System (IDS) is a tool, or software application, that monitors network or system activity and detects malicious activity occurring. The protected evolution of the network must incorporate new threats and related approaches to avoid these threats. The key role of the IDS is to secure resources against the attacks. Several approaches, methods and algorithms of the intrusion detection help to detect a plethora of attacks. The main objective of this paper is to provide a complete system to detect intruding attacks using the Machine Learning technique which identifies the unknown attacks using the past information gained from the known attacks. The paper explains preprocessing techniques, model comparisons for training as well as testing, and evaluation technique.

References

  1. C. Chang and C. J. Lin, LIBSVM, “A Library for Support Vector Machines”, the use of LIBSVM, 2009.
  2. Rung-Ching Chen, Kai-Fan Cheng and Chia-Fen Hsieh, “Using Rough Set and Support Vector Machine for Network Intrusion Detection”, International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 1, 2009.
  3. Need and study on existing Intrusion Detection System. Available at: http://www.sans.org/resources/idfaq.
  4. Resources about packet capturing. Available at: http://www.netsearch.org/jpcap.
  5. Salvatore Pontarelli, Giuseppe Bianchi, Simone Teofili. Traffic-aware Design of a High Speed FPGA Network Intrusion Detection System. Digital Object Identifier 10.1109/TC.2012.105, IEEE TRANSACTIONS ON COMPUTERS.
  6. PrzemyslawKazienko&PiotrDorosz.IntrusionDetection Systems (IDS) Part I - (network intrusions; attack symptoms; IDS tasks; and IDS architecture). www.windowsecurity.com › Articles & Tutorials
  7. Sailesh Kumar, “Survey of Current Network Intrusion Detection Techniques”, available at http://www.cse.wustl.edu/~jain/cse571-07/ftp/ids.pdf.
  8. Dataset: https://www.unb.ca/cic/datasets/nsl.html
  9. AHMAD, M. BASHERI, M. J. IQBAL, and A. RAHIM, “Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection.” Online]. Available: 0.1109/ACCESS.2018.2841987
  10. H. Nkiama, S. Z. M. Said, and M. Saidu, “A Subset Feature Elimination Mechanism for Intrusion Detection System,” (IJACSA) International Journal of Advanced Computer Science and Applications,, vol. Vol. 7, no. No. 4, 2016.
  11. “Sparsity-driven weighted ensemble classifier.” Online]. Available: https://arxiv.org/abs/1610.00270
  12. Prof.S.S.Manivannan and Dr.E.Sathiyamoorthy, “An Efficient and Ac-curate Intrusion Detection System to detect the Network Attack Groups using the Layer wise Individual Feature
  13. S. Revathi and D. A. Malathi, “A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion De-tection,” International Journal of Engineering Research & Technology (IJERT), vol. 2, no. 12, 2013.
  14. R. Vinayakumar, K. P. Soman, and P. Poornachandran, “Applying con-volutional neural network for network intrusion detection.” in ICACCI 2017, pp. 1222–1228.
  15. K. S. Desale, C. N. Kumathekar, and A. P. Chavan, “Efficient Intrusion Detection System using Stream Data Mining Classification Technique,,” in International Conference on Computing Communication Control and Automation,, 2015.
  16. Q. Niyaz, M. Alam, W. Sun, and A. Y. Javaid, “A Deep Learning Approach for Network Intrusion Detection System,,” in Conference Paper in Security and Safety, 2015.
  17. “Mrutyunjaya Panda and Manas Ranjan Patra, “Network Intrusion Detection using Naive Bayes”,” International Journal of Computer
  18. “Types of Intrusion Detection System.” Online]. Available: https://en. wikipedia.org/wiki/Intrusion_detection_system
  19. K. A. I. PENG, V. C. M. LEUNG, and Q. HUANG, “Clustering Approach Based on Mini Batch Kmeans for Intrusion Detection System Over Big Data,” SPECIAL SECTION ON CYBERPHYSICAL- SOCIAL COMPUTING AND NETWORKING, , 2018. Online]. Available: 0.1109/ACCESS.2018.2810267
  20. H. su Chae and S. H. Choi, “Feature Selection for efficient Intrusion Detection using Attribute Ratio,” INTERNATIONAL JOURNAL OF COMPUTERS AND COMMUNICATIONS , vol. Volume 8, 2014.
  21. SPECIAL SECTION ON CHALLENGES AND OPPORTUNITIES OF BIG DATA AGAINST CYBER CRIME, 2018. Online]. Available: 10.1109/ACCESS.2018.2854599
  22. Vipin Das , Vijaya Pathak, Sattvik Sharma, Sreevathsan, MVVNS.Srikanth, Gireesh Kumar T,” NETWORK INTRUSION DETECTION SYSTEM BASED ON MACHINE LEARNING ALGORITHMS” International Journal of Computer Science & Information Technology (IJCSIT), Vol 2, No 6, pp 138-150, December 2010.
  23. Majed Tabash, Tawfiq Barhoom,” An Approach for Detecting and Preventing DoS Attacks in LAN,” International Journal of Computer Trends and Technology (IJCTT) – Volume 18 Number 6, pp 265-27, Dec 2014.

Downloads

Published

2020-04-30

Issue

Section

Research Articles

How to Cite

[1]
Jayesh Zala, Aditya Panchal, Advait Thakkar, Bhagirath Prajapati, Priyanka Puvar, " Intrusion Detection System using Machine Learning, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 3, pp.61-71, May-June-2020. Available at doi : https://doi.org/10.32628/CSEIT2062166