Network Intrusion Detection System Using Machine Learning
DOI:
https://doi.org/10.32628/CSEIT228329Keywords:
nids, dtc, bnb, knn, Dynamic Complex types of securityAbstract
The latest advances in the internet and communication areas have resulted in a massive expansion of network size and data. As a result, plenty of new dangers have arisen, making it difficult for network security to identify attacks effectively Furthermore, intruders with the intent of executing innumerable assaults within the network cannot be overlooked. An intrusion detection system (IDS) is a tool that inspects network traffic to verify confidentiality, integrity, and availability. Despite the researchers' best efforts, IDS continues to encounter difficulties in boosting detection accuracy while lowering false alarm rates and detecting fresh intrusions. Machine learning (ML)-based IDS systems have recently been deployed as promising solutions for quickly detecting intrusions across the network. This article defines IDS and then presents a taxonomy based on prominent machine learning techniques used in the construction of network-based IDS (NIDS) systems. The benefits and drawbacks of the proposed solutions are discussed in depth in this detailed evaluation of current NIDS-based studies. The proposed technique, evaluation criteria, and dataset selection are then discussed, as well as recent trends and breakthroughs in ML-based NIDS. We highlighted many research obstacles and recommended future research scope for improving ML-based NIDS using the weaknesses of the proposed approaches.
References
- Aburomman, A. A., &Reaz, M. B. I. (2016) “Ensemble of binary SVM classifiers based on PCA and LDA feature extraction for intrusion detection.”Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC): 636-640.
- Al-Jarrah, O. Y., Al-Hammdi, Y., Yoo, P. D., Muhaidat, S., & Al-Qutayri, M. (2018) “Semi-supervised multi-layered clustering model for intrusion detection.” Digital Communications and Networks 4(4): 277-286.
- Al-Yaseen, W. L., Othman, Z. A., &Nazri, M. Z. A. (2017) “Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system.” Expert Systems with Applications 67(1): 296-303.
- An, X., Su, J., Lü, X., & Lin, F. (2018) “Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system.” EURASIP Journal on Wireless Communications and Networking 249 (1): 1-9.
- Belavagi, M. C., &Muniyal, B. (2016) “Performance evaluation of supervised machine learning algorithms for intrusion detection.” Procedia Computer Science 89(1): 117-123.
- Elrawy, M. F., Awad, A. I., &Hamed, H. F. (2018) “Intrusion detection systems for IoT-based smart environments: a survey.” Journal of Cloud Computing 7 (1): 21
- Elsaeidy, A., Munasinghe, K. S., Sharma, D., &Jamalipour, A. (2019) “Intrusion detection in smart cities using Restricted Boltzmann Machines.” Journal of Network and Computer Applications 135 (1): 76-83.
- Shetty Akshada, Jadhav Shailaja et. al., “Detection of fake accounts in online social networks (OSN)” International Journal of Modern Trends in Engineering and Science IJMTES 2017, Volume 4 -Issue 5 Pages 1-3.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.