A Survey on Intrusion Detection System using Machine Learning and Deep Learning
DOI:
https://doi.org/10.32628/CSEIT195264Keywords:
IOT, IDS, deep learning, machine learning.Abstract
As we know internet of Things (IoT) is one of the fastest growing paradigm which is composed of Internet and different physical devices with different domains or the smart applications like home automation, business automation applications, health and environmental monitoring applications. The dependency on IOT devices is increasing day by day with our daily activities, which leads to most important challenge for security. Since having a better monitoring system for better security is a need. From more than two decades the concept or the frame work called IDS (Intrusion detection system) is playing important role for detecting the attacks in the network. Since the network attacks are not fixed in nature, a new type of attacks are happening on the network applications. There are many traditional IDS techniques are available but they are complex to apply. Since machine learning is one of the important area which is achieving good results in many applications. In this paper we study about the different machine learning techniques used till now and the methodology for the attack detection and the validation strategy. We will also discuss about the performance metrics.
References
- S.Revathi and A.Malathi, "A detailed analysis on NSL- KDD dataset using various machine learning techniques for intrusion detection," Int. J. Eng. Res. Technol., vol. 2, pp. 1848 -1853, Dec. 2013.
- R. R. Reddy, Y. Ramadevi, and K. V. N. Sunitha, "Effective discriminant function for intrusion detection using SVM," in Proc. Int. Conf. Adv. Comput., Commun. Inform. (ICACCI), Sep. 2016, pp. 1148-1153.
- N.Paulauskasand J.Auskalnis, "Analysis of data preprocessing in fluence on intrusion detection using NSL-KDD dataset," in Proc. Open Conf. Elect., Electron. Inf. Sci. (eStream), Apr. 2017, pp. 1-5.
- R. K. Sharma, H. K. Kalita, and P. Borah, "Analysis of machine learning techniques based intrusion detection systems," in Proc. Int. Conf. Adv.Comput., Netw., Inform., 2016, pp. 485-493.
- A. Milenkoski, M. Vieira, S. Kounev, A. Avritzer, and B. D. Payne, "Evaluating computer intrusion detection systems: A survey of common practices," ACM Comput. Surv., vol. 48, no. 1, pp. 1-41, 2015.
- E. Viegas, A. O. Santin, A. França, R. Jasinski, V. A. Pedroni, and L. S. Oliveira, "Towards an energy-efficient anomaly-based intrusion detection engine for embedded systems," IEEE Trans. Comput., vol. 66, no. 1, pp. 163-177, Jan. 2017.
- M. I. Jordan and T. M. Mitchell, "Machine learning: Trends, perspectives, and prospects," Science, vol. 349, no. 6245, pp. 255-260, 2015.
- M. V. Kotpalliwar and R. Wajgi, "Classification of attacks using support vector machine (SVM) on KDDCUP’99 IDS database," in Proc. Int. Conf. Commun. Syst. Netw. Technol., 2015, pp. 987-990.
- D. Moon, H. Im, I. Kim, and J. H. Park, "DTB-IDS: An intrusion detection system based on decision tree using behavior analysis for preventing APT attacks," J. Supercomput., vol. 73, no. 7, pp. 2881-2895, 2017.
- S. Jo, H. Sung, and B. Ahn, "A comparative study on the performance of intrusion detection using decision tree and artificial neural network models," J. Korea Soc. Digit. Ind. Inf. Manage., vol. 11, no. 4, pp. 33-45, 2015.
- M. Nadeem, O. Marshall, S. Singh, X. Fang, and X. Yuan, "Semi-supervised deep neural network for network intrusion detection," in Proc. KSU Conf. Cybersecur. Educ. Res. Pract., Oct. 2016, pp. 1-13.
- W. Meng, W. Li, and L.-F. Kwok, "Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection," Secur. Commun. Netw., vol. 8, no. 18, pp. 3883-3895, 2015.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.