A novel and an effective intrusion detection system using machine learning techniques
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.3.40Keywords:
Intrusion, Security, Supervised, Neighbor, Attack, Rule Mining, Machine Learning.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Network environments become more and more diverse with the presence of many different network protocols, services, applications and so on. With this diversity, many different types of attacks appear and target at a computer or a network every day. A single type of intrusion detection systems (IDSs), which has its own advantages and disadvantages, seems to be insufficient to detect all the attacks. Since us don’t know which types of attacks are coming next, the primary difficulty lays on selecting of the best IDS at a certain time. In our scenario, we assume that each IDS has its own favorite types of attacks to detect. In this paper is investigated for intrusion detection system (IDS) and its performance has been evaluated on the normal and abnormal intrusion datasets (KDDCUP99). New technique of k-NN algorithm using NA (Network Anomaly) rules for intrusion detection system is experimented. The research work compares accuracy, detection rate, false alarm rate and accuracy of other attacks under different proportion of normal information. Comparison between Naive Bayes classifier, SVM and NA-kNN for same training data set and testing data set has carried out. Experimental results show that for Probe, U2R, and R2L, NA-kNN gives better result. Overall correct count to detect correct attacks is larger in NA-kNN than other classifier algorithms.Abstract
How to Cite
Downloads
Similar Articles
- Karthik Gangadhar, Prem Kumar N, Neuroprotective activity of alcoholic extract of Operculina turpethum roots in aluminum chloride-induced Alzheimer’s disease in rats , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Sandip Sane, Diksha Tripathi, Nitin Ranjan, Digital transformation in management education: Bridging theory and practice , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- O. Devipriya, K. Kungumaraj, Enhancing cloud efficiency: an intelligent virtual machine selection and migration approach for VM consolidation , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Priya Nandhagopal, Jayasimman Lawrence, ETTG: Enhanced token and tag generation for authenticating users and deduplicating data stored in public cloud storage , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- G. Hemamalini, V. Maniraj, Enhanced otpmization based support vector machine classification approach for the detection of knee arthritis , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- M. Iniyan, A. Banumathi, The WBANs: Steps towards a comprehensive analysis of wireless body area networks , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Sabeerath K, Manikandasaran S. Sundaram, ESPoW: Efficient and secured proof of ownership method to enable authentic deduplicated data access in public cloud storage , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- N. Ruba, A. S. A. Khadir, Session password Blum–Goldwasser cryptography based user three layer authentication for secured financial transaction , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Jayaganesh Jagannathan, Dr. Agrawal Rajesh K, Dr. Neelam Labhade-Kumar, Ravi Rastogi, Manu Vasudevan Unni, K. K. Baseer, Developing interpretable models and techniques for explainable AI in decision-making , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- R. Selvakumar, A. Manimaran, Janani G, K.R. Shanthy, Design and development of artificial intelligence assisted railway gate controlling system using internet of things , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
<< < 6 7 8 9 10 11 12 13 14 15 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Sruthy M.S, R. Suganya, An efficient key establishment for pervasive healthcare monitoring , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Mufeeda V. K., R. Suganya, Novel deep learning assisted plant leaf classification system using optimized threshold-based CNN , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper