Corpus ID: 212594426

A Survey on Machine Learning Techniques for Intrusion Detection Systems

@inproceedings{Singh2013ASO,
  title={A Survey on Machine Learning Techniques for Intrusion Detection Systems},
  author={Jayveer Singh and Manisha J. Nene},
  year={2013}
}
The rapid development of computer networks in the past decades has created many security problems related to intrusions on computer and network systems. Intrusion Detection Systems IDSs incorporate methods that help to detect and identify intrusive and non-intrusive network packets. Most of the existing intrusion detection systems rely heavily on human analysts to analyze system logs or network traffic to differentiate between intrusive and non-intrusive network traffic. With the increase in… Expand

Figures and Tables from this paper

A survey on types of machine learning techniques in intrusion prevention systems
  • Soubhik Das, M. Nene
  • Computer Science
  • 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
  • 2017
TLDR
A survey is done on various machine learning and computational intelligence techniques that envisage using IDPS to mitigate the security issues and concerns and the need to evolve with the novel and 'human-like' methods to mitigate them. Expand
An Empirical Study of Intrusion Detection System Using Feature Reduction Based on Evolutionary Algorithms and Swarm Intelligence Methods
The use of computer more and more need to be increase the security day by day in a real world, the process of monitoring the computer system in a secure way for an unknown and known attack increaseExpand
Transfer Learning Based Intrusion Detection
TLDR
A transfer learning based intrusion detection method which transfers knowledge between the networks and eliminates the problem of providing training samples that is a costly procedure is proposed. Expand
Accelerated deep neural networks for enhanced Intrusion Detection System
  • Sasanka Potluri, C. Diedrich
  • Engineering, Computer Science
  • 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA)
  • 2016
TLDR
An accelerated DNN architecture is developed to identify the abnormalities in the network data and NSL-KDD dataset is used to compute the training time and to analyze the effectiveness of the detection mechanism. Expand
NETWORK ATTACK DETECTION USING MACHINE LEARNING APPROACH
With the massive growth of computer networks and the enormous increase in the number of applications that rely on it, network security is becoming very important. Moreover, almost all computerExpand
Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model
TLDR
A new hybrid model can be used to estimate the intrusion scope threshold degree based on the network transaction data’s optimal features that were made available for training and revealed that the hybrid approach had a significant effect on the minimisation of the computational and time complexity involved when determining the feature association impact scale. Expand
Evolving neural network intrusion detection system for MCPS
TLDR
A neural network technique that evolves based on classification, elimination and prioritization while considering time, space, and accuracy to efficiently classify the four major types of network attack traffic found in an effectively pruned KDD dataset is proposed. Expand
Packet Analysis with Network Intrusion Detection System
Attacks on a computer network grow stronger each and every day. Network intrusion Detection System is one of the fundamental components to monitor and analyze the traffic to find out any possibleExpand
Big Data in Intrusion Detection Systems and Intrusion Prevention Systems
TLDR
Big data in intrusion detection systems and Big Data analytics for huge volume of data, heterogeneous features, and real-time stream processing, and challenges posed by stream processing of big data in the systems are discussed. Expand
Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning
TLDR
The findings support that neural network-based IDS is susceptible to model evasion attack, and attackers can essentially use this technique to evade intrusion detection systems effectively. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 22 REFERENCES
Anomaly-based network intrusion detection: Techniques, systems and challenges
TLDR
The main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues are outlined. Expand
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems
TLDR
An overview of IDPS is presented, which includes mechanisms for carrying out TCP port scans, Traceroute scan, ping scan and packet sniffing to monitor net-work health detect various types of attacks. Expand
Learning intrusion detection based on adaptive bayesian algorithm
  • D. M. Farid, M.Z. Rahman
  • Computer Science
  • 2008 11th International Conference on Computer and Information Technology
  • 2008
TLDR
This paper presents, theoretical overview of intrusion detection and a new approach for intrusion detection based on adaptive Bayesian algorithm, which correctly classify different types of attack of KDD99 benchmark intrusion detection dataset with high detection accuracy in short response time. Expand
Comparison of Machine Learning algorithms performance in detecting network intrusion
TLDR
The performance of a Machine Learning algorithm called Decision Tree (J48) is evaluated and compared with two other Machine Learning algorithms namely Neural Network and Support Vector Machines and it was found that the Decision tree (J 48) algorithm outperformed the other two algorithms. Expand
Evolving Fuzzy Classifiers for Intrusion Detection
TLDR
The main idea is to evolve two rules, one for the normal class and other for the abnormal class using a profile data set with information related to the computer network during the normal behavior and during intrusive behavior. Expand
Intrusion detection through learning behavior model
TLDR
An algorithm for intrusion detection, called Genetic algorithm Based Intrusion Detector (GBID) based on ''learning the individual user behavior'' is proposed, which is learnt by using genetic algorithms. Expand
A Survey of Intrusion Detection Analysis Methods
1 Introduction In modern computer systems, there is an increased need for secure operation. Modern systems tend to rely heavily upon networking and interoperation on public networks; the potentialExpand
An Intrusion-Detection Model
  • D. Denning
  • Computer Science
  • IEEE Transactions on Software Engineering
  • 1987
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis thatExpand
Genetic Algorithm Rule-Based Intrusion Detection System (GAIDS)
This study examines the detection of attacks or network intrusion by users referred to as hackers (whose aim is to gain illegal entry as well as access to a network system and resources. Network andExpand
Machine Learning-based Intrusion Detection Algorithms
TLDR
A new approach to detect network attacks, which aims to study the efficiency of the method based on machine learning in intrusion detection, including artificial neural networks and support vector machine, is proposed. Expand
...
1
2
3
...