Improve the Efficiency of Large RFID Network Using Enhanced Security Data Delivery Model for Machine Learning Based Network Intrusion Detection System – A Survey
Keywords:
Machine Learning, Cyber Security, Intrusion Detection SystemAbstract
The main issue in both computer and computer networks is security. Intrusion Detection System (IDS) has faced many problems constantly growing methods and techniques by attackers and also the increase of connected devices from interpretation to operation. A major research problem in network security is IDS. Machine Learning algorithms were adapted as a result of this for Network IDS. To analyze network traffic datasets are used and a framework developed which enables the use of network traffic that is frequently updated and concerned to entitle the complete solutions for model deployment. The framework consists of (i)generation of attacked Dataset, (ii) the bonafide dataset, (iii) training models using machine learning techniques, (iv) training the model, and (v) deployment and evaluation of the model. This framework has the following characteristics: frequently updated network traffic, reproducible attacks, and addresses that examine the model’s realization and deployment.
References
Vinayakumar, A. (2019). Vinayakumar R., Alazab M., Soman K., Poornachandran P., Al-Nemrat A., Venkatraman S. Deep learning approach for intelligent intrusion detection system, IEEE Access, 7, 41525-41550.
Lv, L., Wang, W., Zhang, Z., & Liu, X. (2020). A novel intrusion detection system based on an optimal hybrid kernel extreme learning machine. Knowledge-based systems, 195, 105648.
Bedi, P., Gupta, N., & Jindal, V. (2021). I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems. Applied Intelligence, 51(2), 1133-1151.
Alaparthy, V. T., & Morgera, S. D. (2018). A multi-level intrusion detection system for wireless sensor networks based on immune theory. IEEE Access, 6, 47364-47373.
Kaja, N., Shaout, A., & Ma, D. (2019). An intelligent intrusion detection system. Applied Intelligence, 49(9), 3235-3247.
Maseer, Z. K., Yusof, R., Bahaman, N., Mostafa, S. A., & Foozy, C. F. M. (2021). Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset. IEEE access, 9, 22351-22370.
Devan, P., & Khare, N. (2020). An efficient XGBoost–DNN-based classification model for network intrusion detection system. Neural Computing and Applications, 32(16), 12499-12514.
Ismail, A. M. A. M. B. (2018). A Zolkipli MF. A new intrusion detection system based on fast learning network and particle swarm optimization IEEE Access, 6, 20255-20261.
Salama, S. E., Marie, M. I., El-Fangary, L. M., & Helmy, Y. K. (2012). Web anomaly misuse intrusion detection framework for SQL injection detection. International Journal of Advanced Computer Science and Applications, 3(3).
Friedberg, I., Skopik, F., Settanni, G., & Fiedler, R. (2015). Combating advanced persistent threats: From network event correlation to incident detection. Computers & Security, 48, 35-57.
Alhajjar, E., Maxwell, P., & Bastian, N. (2021). Adversarial machine learning in network intrusion detection systems. Expert Systems with Applications, 186, 115782.
Disha, R. A., & Waheed, S. (2022). Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique. Cybersecurity, 5(1), 1-22.
Kilincer, I. F., Ertam, F., & Sengur, A. (2021). Machine learning methods for cyber security intrusion detection: Datasets and comparative study. Computer Networks, 188, 107840.
Sarker, I. H. (2021). CyberLearning: effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet Things 14, 100393 (2021).
Gupta, M., Gupta, M., & Deshmukh, M. (2020). Single secret image sharing scheme using neural cryptography. Multimedia Tools and Applications, 79(17), 12183-12204.
Gad, A. R., Nashat, A. A., & Barkat, T. M. (2021). Intrusion detection system using machine learning for vehicular ad hoc networks based on ToN-IoT dataset. IEEE Access, 9, 142206-142217.
Yang, L., Moubayed, A., Hamieh, I., & Shami, A. (2019, December). Tree-based intelligent intrusion detection system in internet of vehicles. In 2019 IEEE global communications conference (GLOBECOM) (pp. 1-6). IEEE.
Singh, D., Patel, D., Borisaniya, B., & Modi, C. (2013). Collaborative ids framework for cloud. International Journal of Network Security, vol. 18(4):699-709.
Ahmed, S. S. T., Thanuja, K., Guptha, N. S., & Narasimha, S. (2016, January). Telemedicine approach for remote patient monitoring system using smart phones with an economical hardware kit. In 2016 international conference on computing technologies and intelligent data engineering (ICCTIDE'16) (pp. 1-4). IEEE.
Modi, C. N., & Patel, D. (2013, April). A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing. In 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS) (pp. 23-30). IEEE.
Kim, G., Lee, S., & Kim, S. (2014). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4), 1690-1700.
Mehmood, T., & Rais, H. B. M. (2016, August). Machine learning algorithms in context of intrusion detection. In 2016 3rd International Conference on Computer and Information Sciences (ICCOINS) (pp. 369-373). IEEE.
Dua, M. (2019, June). Machine learning approach to IDS: A comprehensive review. In 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA) (pp. 117-121). IEEE.
Alqahtani, H., Sarker, I. H., Kalim, A., Hossain, M., Md, S., Ikhlaq, S., & Hossain, S. (2020, March). Cyber intrusion detection using machine learning classification techniques. In International conference on computing science, communication and security (pp. 121-131). Springer, Singapore.
Sreedhar, S., Ahmed, S., Flora, P., Hemanth, L. S., Aishwarya, J., & Naik, R. (2021, January). An Improved Approach of Unstructured Text Document Classification Using Predetermined Text Model and Probability Technique. In Proceedings of the First International Conference on Advanced Scientific Innovation in Science, Engineering and Technology, ICASISET 2020, 16-17 May 2020, Chennai, India.
Othman, S. M., Ba-Alwi, F. M., Alsohybe, N. T., & Al-Hashida, A. Y. Intrusion detection model using machine learning algorithm on Big Data environment. J. Big Data 5 (1), 1–12 (2018).
Sreedhar Kumar, S., Ahmed, S. T., & NishaBhai, V. B. Type of Supervised Text Classification System for Unstructured Text Comments using Probability Theory Technique. International Journal of Recent Technology and Engineering (IJRTE), 8(10).
Kumar, S., Viinikainen, A., & Hamalainen, T. (2016, December). Machine learning classification model for network based intrusion detection system. In 2016 11th international conference for internet technology and secured transactions (ICITST) (pp. 242-249). IEEE.
Al-Milli, N., & Almobaideen, W. (2019, April). Hybrid neural network to impute missing data for IoT applications. In 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT) (pp. 121-125). IEEE.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Nagarathna C, B Muthu Kumar, Bhavana N, Manjushree T L, Deepa Pattan
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.