Intrusion Detection System Using Machine Learning
The use of computers and the internet has spread rapidly over the course of the past few decades. Every day, more and more people are coming to rely heavily on the internet. When it comes to the field of information security, the subject of security is one that is becoming an increasingly important...
Saved in:
| Published in | International Conference on Computer Communication and Informatics (Online) pp. 1 - 4 |
|---|---|
| Main Authors | , , , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
23.01.2023
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2473-7577 |
| DOI | 10.1109/ICCCI56745.2023.10128363 |
Cover
| Abstract | The use of computers and the internet has spread rapidly over the course of the past few decades. Every day, more and more people are coming to rely heavily on the internet. When it comes to the field of information security, the subject of security is one that is becoming an increasingly important focus. It is vital to design a powerful intrusion detection system in order to prevent computer hackers and other intruders from effectively getting into computer networks or systems. This can be accomplished by: (IDS). The danger and attack detection capabilities of the computer system are built into the intrusion detection system. Abuse has occurred and can be used to identify invasions when there is a deviation between a preset pattern of intrusion and an observed pattern of intrusion. An intrusion detection system (IDS) is a piece of hardware (or software) that is used to generate reports for a Management Station as well as monitor network and/or system activities for unethical behaviour or policy violations. In the current study, an approach known as machine learning is suggested as a possible paradigm for the development of a network intrusion detection system. The results of the experiment show that the strategy that was suggested improves the capability of intrusion detection. |
|---|---|
| AbstractList | The use of computers and the internet has spread rapidly over the course of the past few decades. Every day, more and more people are coming to rely heavily on the internet. When it comes to the field of information security, the subject of security is one that is becoming an increasingly important focus. It is vital to design a powerful intrusion detection system in order to prevent computer hackers and other intruders from effectively getting into computer networks or systems. This can be accomplished by: (IDS). The danger and attack detection capabilities of the computer system are built into the intrusion detection system. Abuse has occurred and can be used to identify invasions when there is a deviation between a preset pattern of intrusion and an observed pattern of intrusion. An intrusion detection system (IDS) is a piece of hardware (or software) that is used to generate reports for a Management Station as well as monitor network and/or system activities for unethical behaviour or policy violations. In the current study, an approach known as machine learning is suggested as a possible paradigm for the development of a network intrusion detection system. The results of the experiment show that the strategy that was suggested improves the capability of intrusion detection. |
| Author | Kiran, Ajmeera Kumar, B Anand Sameeratmaja, Tammana Likhitha Charan, Ungarala Satya Surya Ram Prakash, S. Wilson |
| Author_xml | – sequence: 1 givenname: Ajmeera surname: Kiran fullname: Kiran, Ajmeera email: kiranphd.jntuh@gmail.com organization: MLR Institute of Technology,Department of Computer Science and Engineering,Hyderabad,India – sequence: 2 givenname: S. Wilson surname: Prakash fullname: Prakash, S. Wilson email: wprakash.s@gmail.com organization: Kalasalingam Academy of Research and Education,Department of Computer Science and Engineering – sequence: 3 givenname: B Anand surname: Kumar fullname: Kumar, B Anand email: anandbiyani.b@mlrinstitutions.ac.in organization: MLR Institute of Technology,Department of Computer Science and Engineering,Hyderabad,India – sequence: 4 surname: Likhitha fullname: Likhitha email: likhita.v@gmail.com organization: MLR Institute of Technology,Department of Computer Science and Engineering,Hyderabad,India – sequence: 5 givenname: Tammana surname: Sameeratmaja fullname: Sameeratmaja, Tammana email: sameera.tammana@gmail.com organization: MLR Institute of Technology,Department of Computer Science and Engineering,Hyderabad,India – sequence: 6 givenname: Ungarala Satya Surya Ram surname: Charan fullname: Charan, Ungarala Satya Surya Ram email: ramc06766@gmail.com organization: MLR Institute of Technology,Department of Computer Science and Engineering,Hyderabad,India |
| BookMark | eNo1j81OwzAQhA0CiVLyBhzyAineXTsbH1H4ixTEAXqunGQDRtRFcTj07SkCTjP6RvqkOVcncRdFqRz0CkC7q6au68aWbOwKNdIKNGBFJR2pzLGryGoyFQIfqwUapoIt85nKUnrXWhMClM4uFDRxnr5S2MX8Rmbp55_2vE-zbPN1CvE1f_T9W4iSt-KneAAX6nT0H0myv1yq9d3tS_1QtE_3TX3dFgHAzQU51sgoVtiOYrAHT93QdbrznquRe2uGvjqMBLYruxK90wYd-pHN6AZPS3X56w0isvmcwtZP-83_S_oGMMFINg |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICCCI56745.2023.10128363 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Xplore (IEEE/IET Electronic Library - IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore (IEEE/IET Electronic Library - IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9798350348217 |
| EISSN | 2473-7577 |
| EndPage | 4 |
| ExternalDocumentID | 10128363 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK OCL RIE RIL |
| ID | FETCH-LOGICAL-i119t-3970272e5e75fe42c1a3bdbb0baa78f7c54dc8e75315b6b62a904292af74f9da3 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 27 07:38:46 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i119t-3970272e5e75fe42c1a3bdbb0baa78f7c54dc8e75315b6b62a904292af74f9da3 |
| PageCount | 4 |
| ParticipantIDs | ieee_primary_10128363 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-Jan.-23 |
| PublicationDateYYYYMMDD | 2023-01-23 |
| PublicationDate_xml | – month: 01 year: 2023 text: 2023-Jan.-23 day: 23 |
| PublicationDecade | 2020 |
| PublicationTitle | International Conference on Computer Communication and Informatics (Online) |
| PublicationTitleAbbrev | ICCCI |
| PublicationYear | 2023 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0003211695 |
| Score | 2.082703 |
| Snippet | The use of computers and the internet has spread rapidly over the course of the past few decades. Every day, more and more people are coming to rely heavily on... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Computers Hardware Host Host Intrusion Detection System Intrusion detection Intrusion Detection System Intrusion Prevention System Machine learning Network Network intrusion detection Network Intrusion Detection System Software Support vector machine Support vector machines |
| Title | Intrusion Detection System Using Machine Learning |
| URI | https://ieeexplore.ieee.org/document/10128363 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV05a8MwFBZNpk7pkdIbDV3t2NZlzW5DXGjo0EC2oLOUgtPBWfrr-yTbKS0UugkbgaSH_A5_3_cQuityLzi1eWK4zxJawndQGgEjaTNrnLSiU_tc8sWKPq7ZuierRy6Mcy6Cz1wahvFfvt2aXSiVzYIWVUk4GaGRKHlH1toXVAikMlyyAa2TyVldVVXNuKAsDU3C02H6j0Yq0Y_MJ2g5rKCDj7ynu1an5vOXOOO_l3iEpt-UPfy8d0bH6MA1J2gy9GzA_RU-RXndBJoFWAPfuzbisBrcyZbjCB_ATxFe6XCvvPo6Rav5w0u1SPq2Cclbnss2gQgDcs3CMSeYd7QwuSLaap1ppUTphWHUmhJekpxprnmhZPBKhfKCemkVOUPjZtu4czhJuNHMQBDCuKTe-hLSN4i_mFHOU5uRCzQNR7D56JQxNsPuL_94foUOgyVCCaMg12gMG3Y34NRbfRuN-QXA758j |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV05T8MwGLWgDDCVo4gbD6xJk_iK50DVQFsxtFK3yidCSGmHdOHXYztJEUhIbFYiWbY_Od-R994HwEOWWkaxTiNFbRLh3H0HuWJuxHWileGaNWqfMzpe4OclWbZk9cCFMcYE8JmJ_TD8y9drtfWlsqHXosoRRfvggGCMSUPX2pVUkEtmKCcdXifhw7IoipJQhkns24TH3QQ_WqkETzLqg1m3hgZA8hFvaxmrz1_yjP9e5DEYfJP24OvOHZ2APVOdgn7XtQG2l_gMpGXliRbOHvDR1AGJVcFGuBwGAAGcBoClga326tsALEZP82IctY0Tovc05XXkYgyXbWaGGEaswZlKBZJaykQKwXLLFMFa5e4lSomkkmaCe7-UCcuw5Vqgc9Cr1pW5cCfp7jRRLgwhlGOrbe4SOBeBESWMxTpBl2Dgj2C1abQxVt3ur_54fg8Ox_PpZDUpZy_X4MhbxRc0MnQDem7z5ta5-FreBcN-AUq8onA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Computer+Communication+and+Informatics+%28Online%29&rft.atitle=Intrusion+Detection+System+Using+Machine+Learning&rft.au=Kiran%2C+Ajmeera&rft.au=Prakash%2C+S.+Wilson&rft.au=Kumar%2C+B+Anand&rft.au=Likhitha&rft.date=2023-01-23&rft.pub=IEEE&rft.eissn=2473-7577&rft.spage=1&rft.epage=4&rft_id=info:doi/10.1109%2FICCCI56745.2023.10128363&rft.externalDocID=10128363 |