• Register
  • Login

International Research Journal on Advanced Science Hub

  1. Home
  2. Review on Intrusion Detection System (IDS) for Network Security using Machine Learning Algorithms

Current Issue

By Issue

By Author

Author Index

Keyword Index

About Journal

News

Aims and Scope

Editorial Board

Publication Ethics

Indexing and Abstracting

Related Links

FAQ

Peer Review Process

Journal Metrics

Advertising policy

Editor and Reviewer guidelines

Digital Archiving & Preservation Policy

Copyright Terms

Licensing Terms

Editorial Process - Peer Reviewed

Review on Intrusion Detection System (IDS) for Network Security using Machine Learning Algorithms

    Authors

    • Nusrath Unnisa A 1
    • Manjula Yerva 2
    • Kurian M Z 3

    1 Department of Electronics and Communications Engineering, Sri Siddhartha Institute of Technology, Karnataka, India

    2 Assistant Professor, Department of Electronics and Communications Engineering, Sri Siddhartha Institute of Technology, Karnataka, India

    3 Head of the Department, Department of Electronics and Communications Engineering, Sri Siddhartha Institute of Technology, Karnataka, India

,

Document Type : Review Article

10.47392/irjash.2022.014
  • Article Information
  • References
  • Download
  • Highlights
  • Full Text
  • Export Citation
  • Statistics
  • Share

Abstract

With the advancement in the artificial intelligence technologies and develop- ment of fifth generation networks, a network may face many hazards and chal- lenges as the number of users are accessing the network simultaneously which makes the user to think of losing the confidentiality of the data and hence the network to be considered for security. Threats on the network can be classified in many ways and to detect such threats an Intrusion detection system (IDS) is the one which is mainly used. A network can be attacked in two ways as minor attack and major attack. Denial-of-Service (DoS) and Prob attacks belong to major kind and User-to-Root (U2R) and Remote-to-Login (R2L) goes to minor attack categories. The minor attacks are also called as rare attacks which are very injurious for a host and it is very difficult to recognize these attacks. This paper consists of a survey made on IDS and different algorithms used to imple- ment these IDSs using machine learning.

Keywords

  • Denial-of-Service
  • Intrusion detection system
  • Machine learning algo- rithms
  • Network
  • User-to-Root
  • Remote-to-Login

Highlights

 

Full Text

 

  • XML
  • PDF 2.21 M
  • RIS
  • EndNote
  • Mendeley
  • BibTeX
  • APA
  • MLA
  • HARVARD
  • CHICAGO
  • VANCOUVER
References
Anita, Chordia, S, and S Gupta. “An effective model for anomaly IDS to improve the efficiency”. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT) (2015): 190– 194. 10.1109/ICGCIoT.2015.7380455.
Buczak, Anna L. and  Erhan  Guven.  “A  Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection”. IEEE Communications Surveys & Tutorials 18.2 (2016): 1153–1176. 10 . 1109 / comst . 2015 .2494502.
Chen, Mingzhe, et al. “Artificial Neural Networks- Based Machine Learning for Wireless Net- works: A Tutorial”. IEEE Communications Sur- veys & Tutorials 21.4 (2019): 3039–3071. 10.1109/comst.2019.2926625.
Dias, L P, et al. “Using artificial neural network   in intrusion detection systems to computer net- works”. 9th Computer Science and Electronic Engineering (CEEC) (2017): 145–150. 10.1109/ CEEC.2017.8101615.
Gu, Bin, et al. “Kernel Path for ν-Support Vec-    tor Classification”. IEEE Transactions on Neural Networks and Learning Systems (2021): 1–12. 10. 1109/tnnls.2021.3097248.
Hindy, Hanan, et al. “A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems”. IEEE Access 8 (2020): 104650–104675. 10 . 1109 / access. 2020 .3000179.
Khosravi-Farmad, Masoud, Ali Ahmadian Ramaki, and Abbas Ghaemi Bafghi. “Risk-based intru- sion response management in IDS using Bayesian decision networks”. 2015 5th International Con- ference on Computer and Knowledge Engineer- ing (ICCKE) (2015): 307–312. 10.1109/ICCKE.2015.7365847.
Lansky, Jan, et al. “Deep Learning-Based Intru- sion Detection Systems: A Systematic Review”. IEEE Access 9 (2021): 101574–101599. 10.1109/ access.2021.3097247.
Masduki, Bisyron Wahyudi, et al. “Study on imple- mentation of machine learning methods combina- tion for improving attacks detection accuracy on Intrusion Detection System (IDS)”. 2015 Interna- tional Conference on Quality in Research (QiR) (2015): 56–64. 10.1109/QiR.2015.7374895.
Pattawaro, Apichit and Chantri Polprasert. “Anomaly-Based  Network  Intrusion  Detec- tion System through Feature Selection and Hybrid Machine Learning Technique”. 2018 16th International Conference on ICT and Knowledge Engineering (ICT&KE) (2018): 1–6. 10.1109/ICTKE.2018.8612331.
Pressley, T. “A new paradigm for intrusion detec- tion systems”. Proceedings. Eleventh Interna- tional Conference on Computer Communications and Networks (2002): 390–390. 10.1109/ICCCN.
2002.1206523.
Shah, Ajay, et al. “Building Multiclass Classi- fication Baselines for Anomaly-based Network Intrusion Detection Systems”. IEEE 7th Interna- tional Conference on Data Science and Advanced Analytics (DSAA) (2020): 759–760. 10 . 1109 / DSAA49011.2020.00102.
Shi, Kansheng, et al. “An improved KNN text clas- sification algorithm based on density”. 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (2011): 113–117. 10 . 1109/CCIS.2011.6045043.
Singh,  Preeti,  S  P  Singh,  and  D  S   Singh.   “AN INTRODUCTION AND REVIEW ON MACHINE LEARNING APPLICATIONS IN MEDICINE AND HEALTHCARE”. 2019 IEEE Conference on Information and Communication Technology (2019): 1–6. 10 . 1109 / CICT48419 .
2019.9066250.
Tirumala, Sreenivas Sremath, Hira Sathu, and Abdolhossein Sarrafzadeh. “Free and open source intrusion detection systems: A study”. 2015 Inter- national Conference on Machine Learning and Cybernetics (ICMLC) (2015): 205–210. 10.1109/ ICMLC.2015.7340923.
Umbarkar, Swapnil and Sanyam Shukla. “Analysis of Heuristic based Feature Reduction method in Intrusion Detection System”. 2018 5th Interna- tional Conference on Signal Processing and Inte- grated Networks (SPIN) (2018): 717–720. 10 . 1109/SPIN.2018.8474283.
Wasi, Sarwar, et al. “Intrusion Detection Using Deep Learning and Statistical Data Analysis”. 2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST) (2019): 1–5. 10 . 1109 / ICEEST48626 . 2019 . 8981688.
Zhengbing, Hu, Li Zhitang, and Wu Junqi. “A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining”. First International Workshop on Knowledge Dis- covery and Data Mining (WKDD 2008) (2008): 10–16. 10.1109/WKDD.2008.48.
    • Article View: 612
    • PDF Download: 455
International Research Journal on Advanced Science Hub
Volume 4, Issue 03
March 2022
Page 67-74
Files
  • XML
  • PDF 2.21 M
History
  • Receive Date: 14 February 2022
  • Revise Date: 18 March 2022
  • Accept Date: 25 March 2022
Share
Export Citation
  • RIS
  • EndNote
  • Mendeley
  • BibTeX
  • APA
  • MLA
  • HARVARD
  • CHICAGO
  • VANCOUVER
Statistics
  • Article View: 612
  • PDF Download: 455

APA

Unnisa A, N. , Yerva, M. and M Z, K. (2022). Review on Intrusion Detection System (IDS) for Network Security using Machine Learning Algorithms. International Research Journal on Advanced Science Hub, 4(03), 67-74. doi: 10.47392/irjash.2022.014

MLA

Unnisa A, N. , , Yerva, M. , and M Z, K. . "Review on Intrusion Detection System (IDS) for Network Security using Machine Learning Algorithms", International Research Journal on Advanced Science Hub, 4, 03, 2022, 67-74. doi: 10.47392/irjash.2022.014

HARVARD

Unnisa A, N., Yerva, M., M Z, K. (2022). 'Review on Intrusion Detection System (IDS) for Network Security using Machine Learning Algorithms', International Research Journal on Advanced Science Hub, 4(03), pp. 67-74. doi: 10.47392/irjash.2022.014

CHICAGO

N. Unnisa A , M. Yerva and K. M Z, "Review on Intrusion Detection System (IDS) for Network Security using Machine Learning Algorithms," International Research Journal on Advanced Science Hub, 4 03 (2022): 67-74, doi: 10.47392/irjash.2022.014

VANCOUVER

Unnisa A, N., Yerva, M., M Z, K. Review on Intrusion Detection System (IDS) for Network Security using Machine Learning Algorithms. International Research Journal on Advanced Science Hub, 2022; 4(03): 67-74. doi: 10.47392/irjash.2022.014

  • Home
  • About Journal
  • Editorial Board
  • Submit Manuscript
  • Contact Us
  • Sitemap

News

  • Career at RSP SCIENCE HUB 2024-05-03

Newsletter Subscription

Subscribe to the journal newsletter and receive the latest news and updates

© Journal Management System. Powered by iJournalPro.com