Open Access   Article Go Back

Performance Analysis of Different Machine Learning Algorithm on Intrusion Detection System

Ritu Ganeshe1 , Manish Kumar Ahirwar2 , Rajeev Pandey3

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-7 , Page no. 83-86, Jul-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i7.8386

Online published on Jul 31, 2019

Copyright © Ritu Ganeshe, Manish Kumar Ahirwar, Rajeev Pandey . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ritu Ganeshe, Manish Kumar Ahirwar, Rajeev Pandey, “Performance Analysis of Different Machine Learning Algorithm on Intrusion Detection System,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.83-86, 2019.

MLA Style Citation: Ritu Ganeshe, Manish Kumar Ahirwar, Rajeev Pandey "Performance Analysis of Different Machine Learning Algorithm on Intrusion Detection System." International Journal of Computer Sciences and Engineering 7.7 (2019): 83-86.

APA Style Citation: Ritu Ganeshe, Manish Kumar Ahirwar, Rajeev Pandey, (2019). Performance Analysis of Different Machine Learning Algorithm on Intrusion Detection System. International Journal of Computer Sciences and Engineering, 7(7), 83-86.

BibTex Style Citation:
@article{Ganeshe_2019,
author = {Ritu Ganeshe, Manish Kumar Ahirwar, Rajeev Pandey},
title = {Performance Analysis of Different Machine Learning Algorithm on Intrusion Detection System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2019},
volume = {7},
Issue = {7},
month = {7},
year = {2019},
issn = {2347-2693},
pages = {83-86},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4725},
doi = {https://doi.org/10.26438/ijcse/v7i7.8386}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i7.8386}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4725
TI - Performance Analysis of Different Machine Learning Algorithm on Intrusion Detection System
T2 - International Journal of Computer Sciences and Engineering
AU - Ritu Ganeshe, Manish Kumar Ahirwar, Rajeev Pandey
PY - 2019
DA - 2019/07/31
PB - IJCSE, Indore, INDIA
SP - 83-86
IS - 7
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
409 249 downloads 158 downloads
  
  
           

Abstract

There are rapidly increasing attacks on computers creates a problem for network administration for averting the computer from these attacks. There are many conventional intrusion detection systems (IDS) is present but they are unable to prevent computer system completely. These IDS finds the spiteful actions on net traffics and they find the anomalies in network system. But in numerous instances they are unable for detecting spiteful actions in the networks. There is human interaction is also required to process the network traffic or detect malicious activity. In this paper we present various data mining algorithms helps in machine learning to detect intrusion accurately.

Key-Words / Index Term

Intrusion Detection system, Anomaly detection, deep belief network, state preserving extreme learning machine

References

[1] Rahul Vigneswaran K, Vinayakumar R and Prabaharan Poornachandran, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security" in IEEE 2018.
[2] Yaping Chang ; Wei Li ; Zhongming Yang, " Network Intrusion Detection Based on Random Forest and Support Vector Machine" in IEEE 2017.
[3] David Ahmad Effendy, Sudarmawan Sudarmawan, “Classification of Intrusion Detection System (IDS) Based on Computer Network” in 2017 IEEE.
[4] Amreen Sultana, M.A.Jabbar, “Intelligent Network Intrusion Detection System using Data Mining Techniques” in IEEE 2016.
[5] James P. Anderson, "Computer security threat monitoring and surveillance," in USA, April 1980.
[6] Nawfal Turki Obeis, Wesam Bhaya, “Review of Data Mining Techniques for Malicious Detetion”, in RJAS, 2016.
[7] Jau-Hwang WANG and Peter S. DENG, “Virus Detection Using Data Mining Techniques”, in Taiwan.
[8] Chi Zhang, Jinyuan Sun, “Privacy and Security for Online Social Networks: Challenges and Opportunity”, in University of Florida and Xidian University.
[9] Uma Salunkhe, Suresh N. Mali, “ Enrichment in Intrusion Detection System Using Ensemble”, in JECE.
[10] Q.S. Qassim, A. M. Zin and M. J. Ab Aziz, “Anomalies classification approach for network- based intrusion detection system”, in IJNS, 2016.
[11] O.Y.Al-Jarrah, P.D.Yoo, K.Taha and K. Kim, “ Data Randomization and Cluster-based Partitioning for botnet intrusion detection”, in IEEE, 2016.
[12] Solane Duque, Dr. Mohd. Nizam Bin Omar, “Using Data Mining Algorithm for Developing a Model for Intrusion Detection System(IDS)”, in procedia Computer Science, 2015.
[13] Abhaya, K. Kumar, S. Afroz, “Data Mining Techniques for Intrusion Detection: A Review,” in IJARCCE, 2014.
[14] R.J. Manish, H.T. Hadi, “A review of network traffic analysis and prediction techniques”.
[15] S. Choudhury, A.Bhowal,“Comparative Analysis of Machine Learning Algorithms along with Classifiers for Network Intrusion Detection.” in IEEE, 2015.
[16] ] S.B. Kotsiantis, P.E. Pintelas, “Machine Learning: a Review of Classification and combining Techniques,” in Artificial Intelligence Review, 2006.
[17] I. Witten, E. Frank, M. Hall, “Data mining: Practical Machine Learning Tools and Techniques.” in 2011.
[18] M. Masud, L. Khan, B. Thuraisingham, “Data mining tools for malware detection,” in 2012.
[19] R.S. Wahono, “A Systematic Literature Review of Software Defect Prediction: Research Trends, Datasets, Methods and Frameworks,” In 2015.
[20] M.H. Haratian, “An Architectural Design for a Hybrid Intrusion Detection System for Database,”.
[21] S. Zargari, D. Voorhris, “Feature Selection in the Corrected KDDdataset,” in 2012.