A novel and an effective intrusion detection system using machine learning techniques
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.3.40Keywords:
Intrusion, Security, Supervised, Neighbor, Attack, Rule Mining, Machine Learning.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Network environments become more and more diverse with the presence of many different network protocols, services, applications and so on. With this diversity, many different types of attacks appear and target at a computer or a network every day. A single type of intrusion detection systems (IDSs), which has its own advantages and disadvantages, seems to be insufficient to detect all the attacks. Since us don’t know which types of attacks are coming next, the primary difficulty lays on selecting of the best IDS at a certain time. In our scenario, we assume that each IDS has its own favorite types of attacks to detect. In this paper is investigated for intrusion detection system (IDS) and its performance has been evaluated on the normal and abnormal intrusion datasets (KDDCUP99). New technique of k-NN algorithm using NA (Network Anomaly) rules for intrusion detection system is experimented. The research work compares accuracy, detection rate, false alarm rate and accuracy of other attacks under different proportion of normal information. Comparison between Naive Bayes classifier, SVM and NA-kNN for same training data set and testing data set has carried out. Experimental results show that for Probe, U2R, and R2L, NA-kNN gives better result. Overall correct count to detect correct attacks is larger in NA-kNN than other classifier algorithms.Abstract
How to Cite
Downloads
Similar Articles
- V. Babydeepa, K. Sindhu, Piecewise adaptive weighted smoothing-based multivariate rosenthal correlative target projection for lung and uterus cancer prediction with big data , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- R.R. Jenifer, V.S.J. Prakash, Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- R Prabhu, S Sathya, P Umaeswari, K Saranya, Lung cancer disease identification using hybrid models , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Shobhit Shukla, Suman Mishra, Gaurav Goel, River flow modeling for flood prediction using machine learning techniques in Godavari river, India , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Swetha Rajkumar, Jayaprasanth Devakumar, LSTM based data driven fault detection and isolation in small modular reactors , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- T. Kanimozhi, V. Rajeswari, R. Suguna, J. Nirmaladevi, P. Prema, B. Janani, R. Gomathi, RWHO: A hybrid of CNN architecture and optimization algorithm to predict basal cell carcinoma skin cancer in dermoscopic images , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Mufeeda V. K., R. Suganya, Novel deep learning assisted plant leaf classification system using optimized threshold-based CNN , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- O. Devipriya, K. Kungumaraj, Enhancing cloud efficiency: an intelligent virtual machine selection and migration approach for VM consolidation , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- G. Hemamalini, V. Maniraj, Enhanced otpmization based support vector machine classification approach for the detection of knee arthritis , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Priya Nandhagopal, Jayasimman Lawrence, ETTG: Enhanced token and tag generation for authenticating users and deduplicating data stored in public cloud storage , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
<< < 5 6 7 8 9 10 11 12 13 14 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Sruthy M.S, R. Suganya, An efficient key establishment for pervasive healthcare monitoring , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Mufeeda V. K., R. Suganya, Novel deep learning assisted plant leaf classification system using optimized threshold-based CNN , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper