Network Intrusion Detection using ML Techniques for Sustainable Information System

Author:

Chandra Mouli K.,Indupriya B.,Ushasree D.,Raghavendran Ch.V.,Rawat Babita,Madhu Bhukya

Abstract

Network intrusion detection is a vital element of cybersecurity, focusing on identification of malicious activities within computer networks. With the increasing complexity of cyber-attacks and the vast volume of network data being spawned, traditional intrusion detection methods are becoming less effective. In response, machine learning has emerged as a promising solution to enhance the accuracy and efficiency of intrusion detection. This abstract provides an overview of proper utilization of machine learning techniques in intrusion detection and its associated benefits. The base paper explores various machine learning algorithms employed for intrusion detection and evaluates their performance. Findings indicate that machine learning algorithms exhibit a significant improvement in intrusion detection accuracy compared to traditional methods, achieving an accuracy rate of approximately 90 percent. It is worth noting that the previous work experienced computational challenges due to the time-consuming nature of the utilized algorithm when processing datasets. In this paper, we propose the exertion of more efficient algorithms to compute datasets, resulting in reduced processing time and increased precision compared to other algorithms to provide sustainability. This approach proves particularly when computational resources are limited or when the relationship between features and target variables is relatively straightforward.

Publisher

EDP Sciences

Subject

General Medicine

Reference30 articles.

1. Ramana Venkata, Mouli Chandra, Eenaja Aileni “Network Intrusion Detection By SVM & ANN With Feature Selection” (2020) IJCRT | Volume 8, Issue 6 June 2020 | ISSN: 2320-2882.

2. Intrusion Detection Systems Part I – (network intrusions; attack symptoms; IDS tasks; and IDS architecture) By Przemyslaw Kazienko Piotr Dorosz / April 7, (2003)

3. A Macro-Social Exploratory Analysis of the Rate of Interstate Cyber-Victimization

4. Alaei P. and Noorbehbahani F., “Incremental anomaly-based intrusion detection system using limited labeled data,” in Web Research (ICWR), 2017 3th International Conference on, 2017, pp. 178–184.

5. Saber M., Chadli S., Emharraf M., and Farissi I., “Modeling and implementation approach to evaluate the intrusion detection system,” in International Conference on Networked Systems, (2015), pp. 513–517.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3