SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4707
Machine Learning Processing for Intrusion Detection
Ms. Vandana Vishnu Ardad, Ms. Ankita Dhar, Dr. Shikha Nema
1Student, Dept. of Electronics Engineering, Usha Mittal Institute of Technology, Maharashtra, India
2Student, Dept. of Electronics Engineering, Usha Mittal Institute of Technology, Maharashtra, India
3Head of Department, Dept. of Electronics and communication, Usha Mittal Institute of Technology, Maharashtra,
India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - —In current scenarios, data is one of the most
valuable resource. The safety of data through any network
is one of the most important factors for any system,
company or organization. For better prediction of abnormal
networks which can create troubles within the system or are
threat to the valuable data, network intrusion detection
systems are used. There are various machine learning
techniques for many applications that works equally well on
all data sets. In this paper five different Machine Learning
algorithms are provided against KDD dataset with which
intrusions can be detected. The accuracy of logistic
regression, naive bays, support vector machine, K nearest
neighbor and decision tree are discussed and analyzed with
the help of ROC’s. Among the various techniques decision
tree gives optimum accuracy i.e. 99.83%.
Key Words: IDS, Machine learning techniques,
Confusion matrix, ROC’s, Accuracy.
1. INTRODUCTION
Data these days has developed to be the most important
part of our day to day life. Be it our work, our bank
transactions, our personal details or for business
purposes. So its security is one of the major issues right
now. The companies and business setups invest a lot and
lot of money in cyber security or simply for the security of
their data. Intrusion Detection system serve a pivotal role
in securing computer networks.
IDS stand for Intrusion Detection System. To protect from
cyber attacks many new advancements have been made
like introduction of statistics or artificial intelligence.
Automatic intrusion detection system has become an
important examination topic. Till now researchers have
studied on Intrusion Detection Systems (IDS) successfully
with the capability of detecting attacks in various fields;
now latest on the scene are Machine Learning (ML)
Approaches. In this paper a machine learning approach is
used to distinguish between normal and abnormal
network. ML processing algorithms can improve
processing speed especially dealing with big data sets.
Machine learning techniques are the sets of algorithms
that have improved performance in the situations they
have already encountered with vast range of applications
such as speech recognition, pattern detection, outlier
analysis etc. There are a number of machine learning
techniques developed for many applications and there is
no universal technique which work equally well on all data
sets. In this work, we evaluated the machine learning
algorithms for intrusion detection. The motive here is to
evaluate classification accuracy of a supervised learning
algorithm. In this paper the KDD data set is used for
intrusion detection [1].
2. LITERATURE SURVEY
Traditional methods of IDS were based on low level
attacks and generated isolated alerts. Although there was
a logical connection between them but still it was
incapable of giving combined results. To overcome this
problem, DIDS was used [2]. The DIDS combines all these
scattered alerts and makes use of their logical relationship,
thus obtaining additional information. The huge range of
small low cost embedded devices provided with one or
more sensors are interconnected through wireless or
cable network integrated to the internet. But the system
used were not simple and used
Several technologies and network resources making it
more complicated. Also due to this fact sophisticated
management was necessary by learned and experienced
administrators.
Further, sensor fusion was done to detect the abnormal
Networks accurately [3]. IDS have distinct preferences for
detecting a particular class of attack with improved
accuracy while performing moderately on other classes. So
deploying different methods on same network can give
better and accurate detection. The main issue in this case
was the false alarming. Handling of sensors was complex.
Moreover the management was difficult as well. The
process became slow as various sensors and methods
were used.
To avoid the above complexities, a simple software
application is used. Also programmable signature
matching is used [4]. Networks use deep packet inspection
to enable sophisticated services like intrusion detection.
Signature matching is the heart of deep packet inspection
which involves matching resupplied signature to network
payloads at line rates. Content searching/ matching
detects a variety of attacks. This method is efficient but
does not use or apply machine learning capabilities to
generalize signature matching techniques.
Further the network analysis here is done with the help of
machine learning techniques. Various machine learning
methods are applied on a data set known as KDD. The
accuracy of different machine learning methods on this
dataset is calculated. The machine learning approach is
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4708
intelligent and involves various steps to distinguish
between the normal and abnormal networks efficiently
[1].
3. DATASET
The KDD dataset is a derived from big DARPA dataset used
for intrusion detection.
3.1 Intrusion detector learning
A predictive model is built so that the data can be
classified so as to detect an intrusion if present. The
learning process includes building this model only. Its
main agenda is to makes a model which is able to
distinguish between good and bad network.
DARPA was prepared to evaluate the intrusion detection
in 1998[5]. The KDD dataset is the version of this data set.
Lincoln Labs worked for 9 weeks to acquire raw TCP
dump data for a LAN. The LAN was tested on an Air Force
Environment and preparation for many attacks was done.
The training data was 4GB of compressed binary TCP data.
This data was then processed for 5 million connection
records. Each connection here is labeled as normal or
attack type [6].
3.2 Attack types
1. DoS: Denial of service.
2. Probing: probing attack like port scanning
3. U2R: unauthorized access to the root.
4. R2L: unauthorized access from remote system.
syn flooding, port scanning, buffer overflow attacks,
password guessing are the examples of DoS, Probbing,
U2R and R2L respectively. This data set has 24 training
attack and 14 types for the test data. Conclusion records
used the destination host and the construction of window
was made by 100 connections. In this model, 80% training
set is used and 20% test set is there. Now for mining the
unstructured data portions of packets automatically, few
useful algorithms are there. Stolfo et al used domain
knowledge to add features
which look for suspicious behavior in the data portions,
like the number of failed login attempts. These features
are known as”content” features. A few set of features are
given in the three tables below which are defined for the
connection records.
Table -1: Basic features of individual TCP connections
Feature
Name
Description
duration length of the connection
protocol_ty
pe
type of the protocol e.g tcp, ip etc.
service destination network service, e.g., http, telnet,
etc.
src_ bytes from source to destination - number of data
bytes
dst_bytes from destination to source - number of data
bytes
Flag status of the connection = error or normal
land if connection is from/to the same host = 1; 0
otherwise
wrong_
fragment
number of fragments which are ”wrong”
urgent number of packets which are urgent
Table -2: Content features within a connection suggested
by domain knowledge
Feature Name Description
hot number of indicators which are ”hot”
num_ failed num failed logins failed login attempts
logged_ in if successfully logged in = 1; 0 otherwise
num_
compromised
number of conditions which are
”compromised”
root_shell if root shell is obtained = 1; 0 otherwise
su_ attempted if ”su root” command attempted = 1 ; 0
otherwise
num_root ”root” accesses
num_file_
creations
number of operations for file creation
num_ shells shell prompts
num_access_ files operations on access control files
num _outbound_
cmds
in an ftp session, number of outbound
commands.
is_ hot_login if the login belongs to the ”hot” list = 1; 0
otherwise
is_ guest_ login if the login is a ”guest” login = 1; 0
otherwise
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4709
Table -3: Traffic features computed using a two-second
time Window
Feature Name Type Description
count in the past two seconds as the same
connection as the current, the
number of connections to the same
host
Note: The following features refer to
these same host connections.
serror_ rate percentage of connections that have
”SYN” errors
rerror_ rate percentage of connections with
”REJ” errors
same_ srv_ rate percentage of connections to the
same service
diff_ srv_ rate percentage of connections to
different services
srv_ count in the past two seconds as the same
connection as the current, the
number of connections to the same
server
Note: The following features refer to
these same service connections.
srv_ serror_ rate percentage of connections with
”SYN” errors
srv_ rerror_ rate percentage of connections with
”REJ” errors
srv_ diff_ host_ rate percentage of connections to
different hosts
4. MACHINE LEARNING ALGORITHMS
4.1 Logistic Regression
It is used when only two outputs are there. It doesn’t work
on linear equation type of classes. For each experiment,
only two values can be there. It produces a curve of
outcomes having values between 0 and 1 only or yes/no
[7].
The fundamental equation of linear model is:
g(E(y)) = ⍶+ß x1 + x2 (1)
The value lies between any ranges. But to compress the
data to 0 and we used the sigmoid function for squashing.
Sigmoid Function of Logistic Function is:
g(x) =1/(1 + e˄(-x)) (2)
4.2 Naive Bayes
This algorithm is based on the Bayes theorem used in
probability. This classifier considers the features to be
independent. The features independently contribute to the
output probability.
This is one of the easiest to understand and fairly efficient
way of classifying different type of classes as the
calculation is easy. The classifier uses this simple formula
based on Bayes theorem.
P(x/y) =p(y/x)p(x)/p(y) (3)
Above,
P(x/y) is the later probability of the event.
P(x) is the former probability of the event.
P(y/x) is the likelihood
P(y) is the former probability of predictor.
4.3 Support Vector Machine
This classifier is based on separating two types of
categories by using a hyperplane. Hyperplane is a feature
by which two different classes which have different
features are separated out. The hyperplane must have
maximum distance between the data of both classes.[7]
The data, in the form of points, is plotted in a frame and
best possible hyperplane is chosen to separate the two
classes have distinct data points.
In SVM, the output taken from the linear function like
linear regression is squashed and we get the values
between -1 and 1.Here the main focus is on to maximize
the distance between the hyperplane and data points. so to
achieve this we use a cost function. The formula for cost
function:
)) ) ) (4)
4.4 K Nearest Neighbor
It is used for both linear and classification problems. In
this method of classification, we choose a factor k i.e. the
value of k is selected. And with the help of that value we
create boundaries. These boundaries then help in
distinguishing different kind of classes.[9] As the value of k
is increased, the boundaries become smoother. Based on
the majority votes of the neighbors, the outcome is
processed. There is no assumption of the data so it is
useful for the real time applications.
4.5 Decision Tree:
It is a graphical representation which is computed by the
method of branching. The branches of various small
possibilities are setup. Based on the homogeneity of the
different sets a final set is created. It is a type of
supervised learning. The samples are differentiated into
two or more sets. The samples are segregated based on
the values and then the best homogeneous set is created.
This classifier is very easy to understand and it is one of
the fastest ways to compute the outcome.[10]
5. IMPLEMENTATION
We used SPYDER software to run the machine learning
algorithms. It writes and run codes in PYTHON language.
For ease of understanding the codes for different
classifiers are written in PYTHON. SPYDER has inbuilt
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4710
functions and packages for classifiers. Hence this makes it
easy to write and apply codes on this software. IT is a
powerful interactive development environment for the
Python language and also provides an object inspector
that executes in the context of the console. Python
includes numpy library which is used to acquire the
numerical values. It also include package from library
known as the pandas which is used to acquire the data set.
With the help of this function we can access dataset for the
code.[8] The train set and test set is divided and to avoid
any randomness after that we put random state i.e 0. The
average and mean values are pre calculated. Then
classifiers use this data for their processing and next step
includes importing of classifiers from the library. These
classifiers then give the accuracy on data set. The
predicted value is calculated using training data set and
the test data set is used to make out the difference
between actual and predicted values which gives us
accuracy based on confusion matrix.
5.1 Confusion Matrix
A confusion matrix tells us about the overall efficiency and
accuracy of an algorithm over a data set. It is based on test
data sets for which the true values are known. It is an
efficient way of calculating the accuracy. It gives us the
knowledge about the true positive and true negative
values and also false positive and false negative values of a
particular classifier over a data set. Therefore confusion
matrix is as follows:
[ ]
Where
TP : True Positive data
TN : True Negative data
FP : False Positive data
FN : False Negative data
5.2 Accuracy is given as follows
Accuracy=(TruePositive+TrueNegative)/(TotalData
Samples) (5)
5.3 Receiver Operating Characteristic curve (ROC
curve)
The Receiver Operating Characteristic curve is obtained by
plotting the rate of true positive value (TPR) versus the
rate of false positive value (FPR) at different threshold
settings. In machine learning the true-positive rate is also
known as sensitivity, or probability of detection and the
false-positive rate is known as the fall out or probability of
false alarm which is calculated as 1 specifically. In general,
the ROC curve can be generated if the probability
distributions of detection as well as false alarm are known,
by plotting the cumulative distribution function of the
detection (probability values) in the y axis against the
cumulative distribution function of the false alarm
(probability values) on the x axis.
6. RESULT
6.1 Confusion Matrix
Table-4: Confusion Matrix table
Classifier Type Confusion Matrix
Logistic
Regression
[ ]
Naïve Bayes [ ]
Support Vector
Machine
[ ]
KNN [ ]
Decision Tree [ ]
6.2 Accuracy
Table-5: Accuracy Table:
Classifier Used Accuracy
Logistic Regression 95%
Naïve Bayes 90%
Support Vector Machine 95.5%
KNN 99.51%
Decision Tree 99.83%
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4711
6.3 Receiver Operating Characteristic Curves
Fig -1: ROC of Logistic Regression
Fig -2: ROC of Naïve Bayes
Fig -3: ROC of Support Vector Machine
Fig -4: ROC of KNN
Fig -5: ROC of Decision Tree
7. CONCLUSION
The machine learning techniques which were applied on
KDD dataset is studied. Logistic regression, naive bayes,
support vector machine, K nearest neighbor and decision
tree classifiers are used and their result is calculated. We
obtained confusion matrices for all classifiers we used and
calculated the Accuracy of each classifier. The ROCs are
also developed to better understand the machine learning
efficiency on given data set.
Among the various techniques, Decision Tree classifier has
the optimum accuracy i.e 99.83% as it is best suited for
outputs with two values. The branching techniques are
best suited for the classification of networks. This can be
further used in user interfaces. In which the user inputs
the name of network through voice or text and in the
background the machine learning algorithms detect the
the network to be normal or abnormal. The output is
displayed to the user through text or through voice. The
real time use is yet not possible. But the study of machine
learning algorithms can be done through this process. The
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4712
machine learning techniques thus can be used to detect
intrusions and they have a good efficiency and accuracy as
well.
REFERENCES
[1] Machine Learning techniques for Intrusion detection: A
comparative Analysis. Yasir Hamid, M Sugumaran, Ludovic
Journaux. November 2016.
[2] Network intrusion Traditional detection system
embedded on smart sensors. IEEE Trans. on Industrial
electronics, March 2011.
[3] Improvement in intrusion detection with advance in
sensor fusion, IEEE Trans. on information forensics and
security, September 2009
[4] Evaluating GPU for network packet signature
matching, in March, 2009.
[5] Usefulness of DARPA dataset for Intrusion Detection
System.
[6] Cost- based modeling and evaluation for data mining
with application to fraud and Intrusion Detection.
[7] Supervised Machine Learning: A Review of
Classification Techniques by S. B. Kotsiantis.
[8] R. Heady, G. F. Luger, A. Maccabe, and M. Servilla, The
architecture of a network level intrusion detection system.
Department of Computer Science, College of Engineering,
University of New Mexico, 1990.
[9] W. Lee, S. J. Stolfo, and others, Data mining approaches
for intrusion detection, in Usenix security, 1998.
[10] M. Khan and S. M. K. Quadri, Evaluating Various
Learning Techniques for Efficiency, International Journal
of Engineering and Advanced Technology (IJEAT), vol. 2,
no. 2, pp. 326331, 2012.

More Related Content

What's hot

IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET Journal
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IJNSA Journal
 
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET Journal
 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analyticsIJNSA Journal
 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSIJNSA Journal
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...IRJET Journal
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”IRJET Journal
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesIJRES Journal
 
Intrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIntrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIJERA Editor
 
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET Journal
 
Intrusion detection system via fuzzy
Intrusion detection system via fuzzyIntrusion detection system via fuzzy
Intrusion detection system via fuzzyIJDKP
 
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray CastingIRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray CastingIRJET Journal
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logicijdpsjournal
 
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic AlgorithmIRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic AlgorithmIRJET Journal
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET Journal
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
 

What's hot (19)

M0446772
M0446772M0446772
M0446772
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
 
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analytics
 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
 
Intrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIntrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring System
 
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial Intelligence
 
Intrusion detection system via fuzzy
Intrusion detection system via fuzzyIntrusion detection system via fuzzy
Intrusion detection system via fuzzy
 
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray CastingIRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
 
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic AlgorithmIRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic Algorithm
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 

Similar to IRJET- Machine Learning Processing for Intrusion Detection

IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing SuiteIRJET Journal
 
PREDICTION OF CYBER ATTACK USING DATA SCIENCE TECHNIQUE
PREDICTION OF CYBER ATTACK USING DATA SCIENCE TECHNIQUEPREDICTION OF CYBER ATTACK USING DATA SCIENCE TECHNIQUE
PREDICTION OF CYBER ATTACK USING DATA SCIENCE TECHNIQUEIRJET Journal
 
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership FunctionDetecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership FunctionIRJET Journal
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET Journal
 
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET Journal
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIRJET Journal
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSieijjournal1
 
IRJET- A Review on Intrusion Detection System
IRJET-  	  A Review on Intrusion Detection SystemIRJET-  	  A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection SystemIRJET Journal
 
Denial of Service Attack Defense Techniques
Denial of Service Attack Defense TechniquesDenial of Service Attack Defense Techniques
Denial of Service Attack Defense TechniquesIRJET Journal
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...IJNSA Journal
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using BacktrackingIRJET Journal
 
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMINTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMIRJET Journal
 
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET Journal
 
Network Intrusion Detection System Based on Modified Random Forest Classifier...
Network Intrusion Detection System Based on Modified Random Forest Classifier...Network Intrusion Detection System Based on Modified Random Forest Classifier...
Network Intrusion Detection System Based on Modified Random Forest Classifier...IRJET Journal
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsIRJET Journal
 
Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.IRJET Journal
 
Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...
Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...
Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...IRJET Journal
 

Similar to IRJET- Machine Learning Processing for Intrusion Detection (20)

IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
PREDICTION OF CYBER ATTACK USING DATA SCIENCE TECHNIQUE
PREDICTION OF CYBER ATTACK USING DATA SCIENCE TECHNIQUEPREDICTION OF CYBER ATTACK USING DATA SCIENCE TECHNIQUE
PREDICTION OF CYBER ATTACK USING DATA SCIENCE TECHNIQUE
 
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership FunctionDetecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
Detecting Various Intrusion Attacks using A Fuzzy Triangular Membership Function
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
 
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
IRJET- A Review on Intrusion Detection System
IRJET-  	  A Review on Intrusion Detection SystemIRJET-  	  A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection System
 
Denial of Service Attack Defense Techniques
Denial of Service Attack Defense TechniquesDenial of Service Attack Defense Techniques
Denial of Service Attack Defense Techniques
 
A45010107
A45010107A45010107
A45010107
 
A45010107
A45010107A45010107
A45010107
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
 
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMINTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM
 
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
 
Network Intrusion Detection System Based on Modified Random Forest Classifier...
Network Intrusion Detection System Based on Modified Random Forest Classifier...Network Intrusion Detection System Based on Modified Random Forest Classifier...
Network Intrusion Detection System Based on Modified Random Forest Classifier...
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
 
Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...
Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...
Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 

Recently uploaded (20)

Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 

IRJET- Machine Learning Processing for Intrusion Detection

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4707 Machine Learning Processing for Intrusion Detection Ms. Vandana Vishnu Ardad, Ms. Ankita Dhar, Dr. Shikha Nema 1Student, Dept. of Electronics Engineering, Usha Mittal Institute of Technology, Maharashtra, India 2Student, Dept. of Electronics Engineering, Usha Mittal Institute of Technology, Maharashtra, India 3Head of Department, Dept. of Electronics and communication, Usha Mittal Institute of Technology, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - —In current scenarios, data is one of the most valuable resource. The safety of data through any network is one of the most important factors for any system, company or organization. For better prediction of abnormal networks which can create troubles within the system or are threat to the valuable data, network intrusion detection systems are used. There are various machine learning techniques for many applications that works equally well on all data sets. In this paper five different Machine Learning algorithms are provided against KDD dataset with which intrusions can be detected. The accuracy of logistic regression, naive bays, support vector machine, K nearest neighbor and decision tree are discussed and analyzed with the help of ROC’s. Among the various techniques decision tree gives optimum accuracy i.e. 99.83%. Key Words: IDS, Machine learning techniques, Confusion matrix, ROC’s, Accuracy. 1. INTRODUCTION Data these days has developed to be the most important part of our day to day life. Be it our work, our bank transactions, our personal details or for business purposes. So its security is one of the major issues right now. The companies and business setups invest a lot and lot of money in cyber security or simply for the security of their data. Intrusion Detection system serve a pivotal role in securing computer networks. IDS stand for Intrusion Detection System. To protect from cyber attacks many new advancements have been made like introduction of statistics or artificial intelligence. Automatic intrusion detection system has become an important examination topic. Till now researchers have studied on Intrusion Detection Systems (IDS) successfully with the capability of detecting attacks in various fields; now latest on the scene are Machine Learning (ML) Approaches. In this paper a machine learning approach is used to distinguish between normal and abnormal network. ML processing algorithms can improve processing speed especially dealing with big data sets. Machine learning techniques are the sets of algorithms that have improved performance in the situations they have already encountered with vast range of applications such as speech recognition, pattern detection, outlier analysis etc. There are a number of machine learning techniques developed for many applications and there is no universal technique which work equally well on all data sets. In this work, we evaluated the machine learning algorithms for intrusion detection. The motive here is to evaluate classification accuracy of a supervised learning algorithm. In this paper the KDD data set is used for intrusion detection [1]. 2. LITERATURE SURVEY Traditional methods of IDS were based on low level attacks and generated isolated alerts. Although there was a logical connection between them but still it was incapable of giving combined results. To overcome this problem, DIDS was used [2]. The DIDS combines all these scattered alerts and makes use of their logical relationship, thus obtaining additional information. The huge range of small low cost embedded devices provided with one or more sensors are interconnected through wireless or cable network integrated to the internet. But the system used were not simple and used Several technologies and network resources making it more complicated. Also due to this fact sophisticated management was necessary by learned and experienced administrators. Further, sensor fusion was done to detect the abnormal Networks accurately [3]. IDS have distinct preferences for detecting a particular class of attack with improved accuracy while performing moderately on other classes. So deploying different methods on same network can give better and accurate detection. The main issue in this case was the false alarming. Handling of sensors was complex. Moreover the management was difficult as well. The process became slow as various sensors and methods were used. To avoid the above complexities, a simple software application is used. Also programmable signature matching is used [4]. Networks use deep packet inspection to enable sophisticated services like intrusion detection. Signature matching is the heart of deep packet inspection which involves matching resupplied signature to network payloads at line rates. Content searching/ matching detects a variety of attacks. This method is efficient but does not use or apply machine learning capabilities to generalize signature matching techniques. Further the network analysis here is done with the help of machine learning techniques. Various machine learning methods are applied on a data set known as KDD. The accuracy of different machine learning methods on this dataset is calculated. The machine learning approach is
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4708 intelligent and involves various steps to distinguish between the normal and abnormal networks efficiently [1]. 3. DATASET The KDD dataset is a derived from big DARPA dataset used for intrusion detection. 3.1 Intrusion detector learning A predictive model is built so that the data can be classified so as to detect an intrusion if present. The learning process includes building this model only. Its main agenda is to makes a model which is able to distinguish between good and bad network. DARPA was prepared to evaluate the intrusion detection in 1998[5]. The KDD dataset is the version of this data set. Lincoln Labs worked for 9 weeks to acquire raw TCP dump data for a LAN. The LAN was tested on an Air Force Environment and preparation for many attacks was done. The training data was 4GB of compressed binary TCP data. This data was then processed for 5 million connection records. Each connection here is labeled as normal or attack type [6]. 3.2 Attack types 1. DoS: Denial of service. 2. Probing: probing attack like port scanning 3. U2R: unauthorized access to the root. 4. R2L: unauthorized access from remote system. syn flooding, port scanning, buffer overflow attacks, password guessing are the examples of DoS, Probbing, U2R and R2L respectively. This data set has 24 training attack and 14 types for the test data. Conclusion records used the destination host and the construction of window was made by 100 connections. In this model, 80% training set is used and 20% test set is there. Now for mining the unstructured data portions of packets automatically, few useful algorithms are there. Stolfo et al used domain knowledge to add features which look for suspicious behavior in the data portions, like the number of failed login attempts. These features are known as”content” features. A few set of features are given in the three tables below which are defined for the connection records. Table -1: Basic features of individual TCP connections Feature Name Description duration length of the connection protocol_ty pe type of the protocol e.g tcp, ip etc. service destination network service, e.g., http, telnet, etc. src_ bytes from source to destination - number of data bytes dst_bytes from destination to source - number of data bytes Flag status of the connection = error or normal land if connection is from/to the same host = 1; 0 otherwise wrong_ fragment number of fragments which are ”wrong” urgent number of packets which are urgent Table -2: Content features within a connection suggested by domain knowledge Feature Name Description hot number of indicators which are ”hot” num_ failed num failed logins failed login attempts logged_ in if successfully logged in = 1; 0 otherwise num_ compromised number of conditions which are ”compromised” root_shell if root shell is obtained = 1; 0 otherwise su_ attempted if ”su root” command attempted = 1 ; 0 otherwise num_root ”root” accesses num_file_ creations number of operations for file creation num_ shells shell prompts num_access_ files operations on access control files num _outbound_ cmds in an ftp session, number of outbound commands. is_ hot_login if the login belongs to the ”hot” list = 1; 0 otherwise is_ guest_ login if the login is a ”guest” login = 1; 0 otherwise
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4709 Table -3: Traffic features computed using a two-second time Window Feature Name Type Description count in the past two seconds as the same connection as the current, the number of connections to the same host Note: The following features refer to these same host connections. serror_ rate percentage of connections that have ”SYN” errors rerror_ rate percentage of connections with ”REJ” errors same_ srv_ rate percentage of connections to the same service diff_ srv_ rate percentage of connections to different services srv_ count in the past two seconds as the same connection as the current, the number of connections to the same server Note: The following features refer to these same service connections. srv_ serror_ rate percentage of connections with ”SYN” errors srv_ rerror_ rate percentage of connections with ”REJ” errors srv_ diff_ host_ rate percentage of connections to different hosts 4. MACHINE LEARNING ALGORITHMS 4.1 Logistic Regression It is used when only two outputs are there. It doesn’t work on linear equation type of classes. For each experiment, only two values can be there. It produces a curve of outcomes having values between 0 and 1 only or yes/no [7]. The fundamental equation of linear model is: g(E(y)) = ⍶+ß x1 + x2 (1) The value lies between any ranges. But to compress the data to 0 and we used the sigmoid function for squashing. Sigmoid Function of Logistic Function is: g(x) =1/(1 + e˄(-x)) (2) 4.2 Naive Bayes This algorithm is based on the Bayes theorem used in probability. This classifier considers the features to be independent. The features independently contribute to the output probability. This is one of the easiest to understand and fairly efficient way of classifying different type of classes as the calculation is easy. The classifier uses this simple formula based on Bayes theorem. P(x/y) =p(y/x)p(x)/p(y) (3) Above, P(x/y) is the later probability of the event. P(x) is the former probability of the event. P(y/x) is the likelihood P(y) is the former probability of predictor. 4.3 Support Vector Machine This classifier is based on separating two types of categories by using a hyperplane. Hyperplane is a feature by which two different classes which have different features are separated out. The hyperplane must have maximum distance between the data of both classes.[7] The data, in the form of points, is plotted in a frame and best possible hyperplane is chosen to separate the two classes have distinct data points. In SVM, the output taken from the linear function like linear regression is squashed and we get the values between -1 and 1.Here the main focus is on to maximize the distance between the hyperplane and data points. so to achieve this we use a cost function. The formula for cost function: )) ) ) (4) 4.4 K Nearest Neighbor It is used for both linear and classification problems. In this method of classification, we choose a factor k i.e. the value of k is selected. And with the help of that value we create boundaries. These boundaries then help in distinguishing different kind of classes.[9] As the value of k is increased, the boundaries become smoother. Based on the majority votes of the neighbors, the outcome is processed. There is no assumption of the data so it is useful for the real time applications. 4.5 Decision Tree: It is a graphical representation which is computed by the method of branching. The branches of various small possibilities are setup. Based on the homogeneity of the different sets a final set is created. It is a type of supervised learning. The samples are differentiated into two or more sets. The samples are segregated based on the values and then the best homogeneous set is created. This classifier is very easy to understand and it is one of the fastest ways to compute the outcome.[10] 5. IMPLEMENTATION We used SPYDER software to run the machine learning algorithms. It writes and run codes in PYTHON language. For ease of understanding the codes for different classifiers are written in PYTHON. SPYDER has inbuilt
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4710 functions and packages for classifiers. Hence this makes it easy to write and apply codes on this software. IT is a powerful interactive development environment for the Python language and also provides an object inspector that executes in the context of the console. Python includes numpy library which is used to acquire the numerical values. It also include package from library known as the pandas which is used to acquire the data set. With the help of this function we can access dataset for the code.[8] The train set and test set is divided and to avoid any randomness after that we put random state i.e 0. The average and mean values are pre calculated. Then classifiers use this data for their processing and next step includes importing of classifiers from the library. These classifiers then give the accuracy on data set. The predicted value is calculated using training data set and the test data set is used to make out the difference between actual and predicted values which gives us accuracy based on confusion matrix. 5.1 Confusion Matrix A confusion matrix tells us about the overall efficiency and accuracy of an algorithm over a data set. It is based on test data sets for which the true values are known. It is an efficient way of calculating the accuracy. It gives us the knowledge about the true positive and true negative values and also false positive and false negative values of a particular classifier over a data set. Therefore confusion matrix is as follows: [ ] Where TP : True Positive data TN : True Negative data FP : False Positive data FN : False Negative data 5.2 Accuracy is given as follows Accuracy=(TruePositive+TrueNegative)/(TotalData Samples) (5) 5.3 Receiver Operating Characteristic curve (ROC curve) The Receiver Operating Characteristic curve is obtained by plotting the rate of true positive value (TPR) versus the rate of false positive value (FPR) at different threshold settings. In machine learning the true-positive rate is also known as sensitivity, or probability of detection and the false-positive rate is known as the fall out or probability of false alarm which is calculated as 1 specifically. In general, the ROC curve can be generated if the probability distributions of detection as well as false alarm are known, by plotting the cumulative distribution function of the detection (probability values) in the y axis against the cumulative distribution function of the false alarm (probability values) on the x axis. 6. RESULT 6.1 Confusion Matrix Table-4: Confusion Matrix table Classifier Type Confusion Matrix Logistic Regression [ ] Naïve Bayes [ ] Support Vector Machine [ ] KNN [ ] Decision Tree [ ] 6.2 Accuracy Table-5: Accuracy Table: Classifier Used Accuracy Logistic Regression 95% Naïve Bayes 90% Support Vector Machine 95.5% KNN 99.51% Decision Tree 99.83%
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4711 6.3 Receiver Operating Characteristic Curves Fig -1: ROC of Logistic Regression Fig -2: ROC of Naïve Bayes Fig -3: ROC of Support Vector Machine Fig -4: ROC of KNN Fig -5: ROC of Decision Tree 7. CONCLUSION The machine learning techniques which were applied on KDD dataset is studied. Logistic regression, naive bayes, support vector machine, K nearest neighbor and decision tree classifiers are used and their result is calculated. We obtained confusion matrices for all classifiers we used and calculated the Accuracy of each classifier. The ROCs are also developed to better understand the machine learning efficiency on given data set. Among the various techniques, Decision Tree classifier has the optimum accuracy i.e 99.83% as it is best suited for outputs with two values. The branching techniques are best suited for the classification of networks. This can be further used in user interfaces. In which the user inputs the name of network through voice or text and in the background the machine learning algorithms detect the the network to be normal or abnormal. The output is displayed to the user through text or through voice. The real time use is yet not possible. But the study of machine learning algorithms can be done through this process. The
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4712 machine learning techniques thus can be used to detect intrusions and they have a good efficiency and accuracy as well. REFERENCES [1] Machine Learning techniques for Intrusion detection: A comparative Analysis. Yasir Hamid, M Sugumaran, Ludovic Journaux. November 2016. [2] Network intrusion Traditional detection system embedded on smart sensors. IEEE Trans. on Industrial electronics, March 2011. [3] Improvement in intrusion detection with advance in sensor fusion, IEEE Trans. on information forensics and security, September 2009 [4] Evaluating GPU for network packet signature matching, in March, 2009. [5] Usefulness of DARPA dataset for Intrusion Detection System. [6] Cost- based modeling and evaluation for data mining with application to fraud and Intrusion Detection. [7] Supervised Machine Learning: A Review of Classification Techniques by S. B. Kotsiantis. [8] R. Heady, G. F. Luger, A. Maccabe, and M. Servilla, The architecture of a network level intrusion detection system. Department of Computer Science, College of Engineering, University of New Mexico, 1990. [9] W. Lee, S. J. Stolfo, and others, Data mining approaches for intrusion detection, in Usenix security, 1998. [10] M. Khan and S. M. K. Quadri, Evaluating Various Learning Techniques for Efficiency, International Journal of Engineering and Advanced Technology (IJEAT), vol. 2, no. 2, pp. 326331, 2012.