CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Retrospect of Machine Learning Techniques for Designing Secure System

by Nikita Singh, Nidhi Chandra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 20
Year of Publication: 2013
Authors: Nikita Singh, Nidhi Chandra
10.5120/11696-6506

Nikita Singh, Nidhi Chandra . Retrospect of Machine Learning Techniques for Designing Secure System. International Journal of Computer Applications. 68, 20 ( April 2013), 28-32. DOI=10.5120/11696-6506

@article{ 10.5120/11696-6506,
author = { Nikita Singh, Nidhi Chandra },
title = { Retrospect of Machine Learning Techniques for Designing Secure System },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 20 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 28-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number20/11696-6506/ },
doi = { 10.5120/11696-6506 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:28:24.743343+05:30
%A Nikita Singh
%A Nidhi Chandra
%T Retrospect of Machine Learning Techniques for Designing Secure System
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 20
%P 28-32
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is the latest research which is of essential concern for many researchers. As the data is generated every second both in host and network so it's necessary to ensure the preservation of their integrity. So, this paper is retrospection of various security measures which are necessary to protect the system from harmful threats/attacks. Machine learning is one of the best technique by which we can apply to get the best results and in turn build an efficient Intrusion Detection System.

References
  1. Krupa, F. ,"The Evolution of the Telephone System", 1992 From Bell's Electric Toy to the Internet.
  2. Mark Havens, "Brief History of Computer Security", Dallas makerspace, 2010.
  3. William Stallings, "Cryptography and Network Security: principles and practices", Pearson publications, 2008.
  4. Mrutyunjaya Panda, Manas Ranja Patra, "Evaluating Machine Learning Algorithms for Detecting Network Intrusions", International Journal of recent trends in Engineering, 2009.
  5. Hua Tang, Zhuolin CAO, "Machine Learning-based Intrusion Detection Algorithms", Journal of Computational Information Systems, 2009.
  6. Vipin Das, Vijaya Pathak, Sattvik Sharma, Sreevathan, MVVNS. Srikanth, Gireesh Kumar T, "Network Intrusion Detection System Based on Machine Learning ALgorithm", International Journal of Computer Science & Information Technology, 2010.
  7. W. Nicholas Greene, Nathan Newsom, "Classification of Malicious Network Activity", 2011.
  8. O. Dekel, L. Xiao, "Learning to classify with missing and corrupted features", Machine Learning, 81(2):149-178, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Host/Network attacks Machine Learning