CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Machine Learning Approaches for Detecting Intrusions in Network System

Published on September 2012 by S. V. Shirbhate, V. M. Thakare, S. S. Sherekar
National Conference "MEDHA 2012"
Foundation of Computer Science USA
MEDHA - Number 1
September 2012
Authors: S. V. Shirbhate, V. M. Thakare, S. S. Sherekar
19afc6ad-a362-4c8c-bd3a-288666eb8c2e

S. V. Shirbhate, V. M. Thakare, S. S. Sherekar . Machine Learning Approaches for Detecting Intrusions in Network System. National Conference "MEDHA 2012". MEDHA, 1 (September 2012), 39-42.

@article{
author = { S. V. Shirbhate, V. M. Thakare, S. S. Sherekar },
title = { Machine Learning Approaches for Detecting Intrusions in Network System },
journal = { National Conference "MEDHA 2012" },
issue_date = { September 2012 },
volume = { MEDHA },
number = { 1 },
month = { September },
year = { 2012 },
issn = 0975-8887,
pages = { 39-42 },
numpages = 4,
url = { /proceedings/medha/number1/8677-1020/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference "MEDHA 2012"
%A S. V. Shirbhate
%A V. M. Thakare
%A S. S. Sherekar
%T Machine Learning Approaches for Detecting Intrusions in Network System
%J National Conference "MEDHA 2012"
%@ 0975-8887
%V MEDHA
%N 1
%P 39-42
%D 2012
%I International Journal of Computer Applications
Abstract

As the speedy development of internet services and rising intrusion problem the traditional intrusion detection methods cannot work well for complicated intrusions. From the last decade intrusion detection is the type of security management system for computer and network which are attracted by computational intelligent society. To improve the performance of IDS nowadays many of the researchers are paying attentions towards the machine learning algorithms. It is one of the major concerns in the research of intrusion detection. This paper focuses onthevarious approaches for feature selection of intrusion detection system,analyses the various intrusion detection techniques based on machine learning including SVM, outlier mining,Bayesian method and data mining.

References
  1. S. V. Shirbhate, Dr V. M. Thakare, Dr S. S. Sherekar, "Data Mining Approaches For Network Intrusion Detection System", International Journal of Computer Technology and Electronics Engineering (IJCTEE),ISSN 2249-6343,PP. 41-44,2011.
  2. Liu Hui, CAO Yonghui, " Research Intrusion Detection Techniques From the Prespective Of Machine Learning", second International Conference On Multimedia and Information Technology, 978-0-7695-4008-5/10, IEEE Computer Society, PP. 166-168,2010.
  3. Yuan-Cheng Li, Zhong-Qiang Wang, "An Intrusion Detection Method Based On SVM And KPCA"Proceedings of the 2007 International Conference on Wavelet Analysis and Pattern Recognition, Beijing, China, 1-4244-1066-5/077 IEEE ,PP. 1462-1466, 2007.
  4. Jiong Zhang and Mohammad Zulkernine, "Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection", Proceeding of IEEE workshop on Information Assurance United statusMiltaryAcadamy, PP. 1-6,2005.
  5. Nannan Wu, Liang Shi, Qingshan Jiang, and FangfeiWeng, " An Outlier Mining-Based method for anomaly Detection", 1-4244-1035-5/07IEEE,PP. 152-156, 2007.
  6. Dewan Md. Farid, NouriaHarbi, SumanAhmmed, Md. ZahidurRahman, and ChowdhuryMofizurRahman, "Mining Network Data for Intrusion Detection through Naïve Bayesian with Clustering", proceeding in World Academy of Science, Engineering and Technology,PP. 341-345, 201
  7. Christine Dartigue, Hyun Ik Jang, and WenjunZeng, "A New Data-Mining Based Approach for Network Intrusion Detection", Seventh Annual Communications Networks and Services Research Conference, 978-0-7695-3649-1/09 DOI 10. 1109/CNSR, IEEE computer Society,PP. 372-377,2009.
  8. Xin Jin, Ronghuai Huang, RongfangBie, "Detecting Network Attacks via Improved Iterative Scaling", 1-4244-0865-2/07, IEEE, PP. 113-118, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection Svm Outlier Mining Naïve Bayesian And Data Mining