Author:
Chandra Mouli K.,Indupriya B.,Ushasree D.,Raghavendran Ch.V.,Rawat Babita,Madhu Bhukya
Abstract
Network intrusion detection is a vital element of cybersecurity, focusing on identification of malicious activities within computer networks. With the increasing complexity of cyber-attacks and the vast volume of network data being spawned, traditional intrusion detection methods are becoming less effective. In response, machine learning has emerged as a promising solution to enhance the accuracy and efficiency of intrusion detection. This abstract provides an overview of proper utilization of machine learning techniques in intrusion detection and its associated benefits. The base paper explores various machine learning algorithms employed for intrusion detection and evaluates their performance. Findings indicate that machine learning algorithms exhibit a significant improvement in intrusion detection accuracy compared to traditional methods, achieving an accuracy rate of approximately 90 percent. It is worth noting that the previous work experienced computational challenges due to the time-consuming nature of the utilized algorithm when processing datasets. In this paper, we propose the exertion of more efficient algorithms to compute datasets, resulting in reduced processing time and increased precision compared to other algorithms to provide sustainability. This approach proves particularly when computational resources are limited or when the relationship between features and target variables is relatively straightforward.
Reference30 articles.
1. Ramana Venkata, Mouli Chandra, Eenaja Aileni “Network Intrusion Detection By SVM & ANN With Feature Selection” (2020) IJCRT | Volume 8, Issue 6 June 2020 | ISSN: 2320-2882.
2. Intrusion Detection Systems Part I – (network intrusions; attack symptoms; IDS tasks; and IDS architecture) By Przemyslaw Kazienko Piotr Dorosz / April 7, (2003)
3. A Macro-Social Exploratory Analysis of the Rate of Interstate Cyber-Victimization
4. Alaei P. and Noorbehbahani F., “Incremental anomaly-based intrusion detection system using limited labeled data,” in Web Research (ICWR), 2017 3th International Conference on, 2017, pp. 178–184.
5. Saber M., Chadli S., Emharraf M., and Farissi I., “Modeling and implementation approach to evaluate the intrusion detection system,” in International Conference on Networked Systems, (2015), pp. 513–517.