PERFORMANCE ANALYSIS OF MACHINE LEARNING TECHNIQUES FOR INTRUSION DETECTION SYSTEM

被引:0
|
作者
Jadhav, Abhijit D. [1 ,2 ]
Pellakuri, Vidyullatha [1 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Vaddeswaram, AP, India
[2] Dr DY Patil Inst Technol, Dept Comp Engn, Pune 18, Maharashtra, India
关键词
accuracy; efficiency; intrusion detection; machine learning techniques; survey;
D O I
10.1109/iccubea47591.2019.9128917
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is very important to protect organizations assets and resources over the network from attackers. Much of the work is already been done in the past by different researchers from different corners of the universe. Many of them have been proved successful over the years. The work is related to detection of such intruders prior any damage being done by them to important assets. The systems used for intruder detection are called as Intrusion Detection Systems (IDS). Now a days, solving problems with data acquisition is very effective, which is nothing but the machine learning approach. Same approach can be used for implementation of IDS. In fact, many researchers have done the lot of work in IDS implementations by using different machine learning techniques. There are number of machine learning techniques which are proving and producing better results for in different areas for problem solutions. Here, we will try to find and compare the different results obtained by researchers with different machine learning techniques for IDS implementation.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Performance Analysis of Machine Learning Techniques in Intrusion Detection
    Tungjaturasopon, Praiya
    Piromsopa, Krerk
    [J]. PROCEEDINGS OF 2018 VII INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2018), 2018, : 6 - 10
  • [2] Performance Analysis Of Machine Learning Techniques In Intrusion Detection
    Kaya, Cetin
    Yildiz, Oktay
    Ay, Sinan
    [J]. 2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 1473 - 1476
  • [3] Analysis on intrusion detection system using machine learning techniques
    Seraphim B.I.
    Poovammal E.
    [J]. Lecture Notes on Data Engineering and Communications Technologies, 2021, 66 : 423 - 441
  • [4] Machine Learning Techniques for Intrusion Detection: A Comparative Analysis
    Hamid, Yasir
    Sugumaran, M.
    Journaux, Ludovic
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [5] Performance Analysis of Network Intrusion Detection System using Machine Learning
    Alsaeedi, Abdullah
    Khan, Mohammad Zubair
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (12) : 671 - 678
  • [6] A Review on Intrusion Detection System using Machine Learning Techniques
    Musa, Usman Shuaibu
    Chakraborty, Sudeshna
    Abdullahi, Muhammad M.
    Maini, Tarun
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 541 - 549
  • [7] Parameter Optimization and Performance Analysis of State-of-the-Art Machine Learning Techniques for Intrusion Detection System (IDS)
    Chowdhury, Rashedun Nobi
    Chowdhury, Maliha M.
    Chowdhury, Sujoy
    Islam, Mohammed Rashedul
    Ayub, Md Ahsan
    Chowdhury, Anik
    Kalpoma, Kazi A.
    [J]. 2020 23RD INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT 2020), 2020,
  • [8] Performance Analysis of Machine Learning Classifiers for Intrusion Detection
    Zwane, Skhumbuzo
    Tarwireyi, Paul
    Adigun, Matthew
    [J]. 2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 538 - 542
  • [9] A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection
    Vitorino, Joao
    Andrade, Rui
    Praca, Isabel
    Sousa, Orlando
    Maia, Eva
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 191 - 207
  • [10] Analysis of Machine Learning Techniques Based Intrusion Detection Systems
    Sharma, Rupam Kr.
    Kalita, Hemanta Kumar
    Borah, Parashjyoti
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 485 - 493