A novel and an effective intrusion detection system using machine learning techniques
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.3.40Keywords:
Intrusion, Security, Supervised, Neighbor, Attack, Rule Mining, Machine Learning.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Network environments become more and more diverse with the presence of many different network protocols, services, applications and so on. With this diversity, many different types of attacks appear and target at a computer or a network every day. A single type of intrusion detection systems (IDSs), which has its own advantages and disadvantages, seems to be insufficient to detect all the attacks. Since us don’t know which types of attacks are coming next, the primary difficulty lays on selecting of the best IDS at a certain time. In our scenario, we assume that each IDS has its own favorite types of attacks to detect. In this paper is investigated for intrusion detection system (IDS) and its performance has been evaluated on the normal and abnormal intrusion datasets (KDDCUP99). New technique of k-NN algorithm using NA (Network Anomaly) rules for intrusion detection system is experimented. The research work compares accuracy, detection rate, false alarm rate and accuracy of other attacks under different proportion of normal information. Comparison between Naive Bayes classifier, SVM and NA-kNN for same training data set and testing data set has carried out. Experimental results show that for Probe, U2R, and R2L, NA-kNN gives better result. Overall correct count to detect correct attacks is larger in NA-kNN than other classifier algorithms.Abstract
How to Cite
Downloads
Similar Articles
- L. Amudavalli, K. Muthuramalingam, Energy-efficient location-based routing protocol for wireless sensor networks using teaching-learning soccer league optimization (TLSLO) , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Aman Bora, Ajay Kumar, Akhilesh Dwivedi, Exploring effective methods of conflict resolution: Strategies and challenges for sustainable peace , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- Ravindra K. Kushwaha, Sonia Patel, Sarfaraz Ahmad, Indian education through a G20 lens-Ensuring continuity of sustainable development , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- D. Jayadurga, A. Chandrabose, Expanding the quantity of virtual machines utilized within an open-source cloud infrastructure , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- S. Jerinrechal, I. Antonitte Vinoline, A Deterministic Inventory Model with Automation-Enabled Processes for Defective Item Management , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- Vijay Kumar, Priya Thapliyal, Rajesh Rayal, Baljeet Singh Saharan, Arun Kumar, Shweta Sahni, The Molecular Profiling and HCV RNA Quantification to Study the Distribution of Different HCV Genotypes in Accordance to Geographical Condition , The Scientific Temper: Vol. 12 No. 1&2 (2021): The Scientific Temper
- Gourav Kalra, Arun Kumar Gupta, Multi-response Optimization of Machining Parameters in Inconel 718 End Milling Process Through RSM-MOGA , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- V. Mahalakshmi, M. Manimekalai, Location Specific Paddy Yield Prediction using Monte Carlo Simulation incorporated Long Short-Term Memory , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- T. Malathi, T. Dheepak, Enhanced regression method for weather forecasting , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Nandini S, Nagabushanam M, Nandeesh G S, Sundaresha M P, Pramodkumar S, Segmentation of Brain Tumor from Magnetic Resonance Imaging using Handcrafted Features with BOA-based Transformer , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
<< < 16 17 18 19 20 21 22 23 24 25 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Sruthy M.S, R. Suganya, An efficient key establishment for pervasive healthcare monitoring , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Mufeeda V. K., R. Suganya, Novel deep learning assisted plant leaf classification system using optimized threshold-based CNN , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper

