Intrusion Detection System Using Machine Learning

The use of computers and the internet has spread rapidly over the course of the past few decades. Every day, more and more people are coming to rely heavily on the internet. When it comes to the field of information security, the subject of security is one that is becoming an increasingly important...

Full description

Saved in:
Bibliographic Details
Published inInternational Conference on Computer Communication and Informatics (Online) pp. 1 - 4
Main Authors Kiran, Ajmeera, Prakash, S. Wilson, Kumar, B Anand, Likhitha, Sameeratmaja, Tammana, Charan, Ungarala Satya Surya Ram
Format Conference Proceeding
LanguageEnglish
Published IEEE 23.01.2023
Subjects
Online AccessGet full text
ISSN2473-7577
DOI10.1109/ICCCI56745.2023.10128363

Cover

Abstract The use of computers and the internet has spread rapidly over the course of the past few decades. Every day, more and more people are coming to rely heavily on the internet. When it comes to the field of information security, the subject of security is one that is becoming an increasingly important focus. It is vital to design a powerful intrusion detection system in order to prevent computer hackers and other intruders from effectively getting into computer networks or systems. This can be accomplished by: (IDS). The danger and attack detection capabilities of the computer system are built into the intrusion detection system. Abuse has occurred and can be used to identify invasions when there is a deviation between a preset pattern of intrusion and an observed pattern of intrusion. An intrusion detection system (IDS) is a piece of hardware (or software) that is used to generate reports for a Management Station as well as monitor network and/or system activities for unethical behaviour or policy violations. In the current study, an approach known as machine learning is suggested as a possible paradigm for the development of a network intrusion detection system. The results of the experiment show that the strategy that was suggested improves the capability of intrusion detection.
AbstractList The use of computers and the internet has spread rapidly over the course of the past few decades. Every day, more and more people are coming to rely heavily on the internet. When it comes to the field of information security, the subject of security is one that is becoming an increasingly important focus. It is vital to design a powerful intrusion detection system in order to prevent computer hackers and other intruders from effectively getting into computer networks or systems. This can be accomplished by: (IDS). The danger and attack detection capabilities of the computer system are built into the intrusion detection system. Abuse has occurred and can be used to identify invasions when there is a deviation between a preset pattern of intrusion and an observed pattern of intrusion. An intrusion detection system (IDS) is a piece of hardware (or software) that is used to generate reports for a Management Station as well as monitor network and/or system activities for unethical behaviour or policy violations. In the current study, an approach known as machine learning is suggested as a possible paradigm for the development of a network intrusion detection system. The results of the experiment show that the strategy that was suggested improves the capability of intrusion detection.
Author Kiran, Ajmeera
Kumar, B Anand
Sameeratmaja, Tammana
Likhitha
Charan, Ungarala Satya Surya Ram
Prakash, S. Wilson
Author_xml – sequence: 1
  givenname: Ajmeera
  surname: Kiran
  fullname: Kiran, Ajmeera
  email: kiranphd.jntuh@gmail.com
  organization: MLR Institute of Technology,Department of Computer Science and Engineering,Hyderabad,India
– sequence: 2
  givenname: S. Wilson
  surname: Prakash
  fullname: Prakash, S. Wilson
  email: wprakash.s@gmail.com
  organization: Kalasalingam Academy of Research and Education,Department of Computer Science and Engineering
– sequence: 3
  givenname: B Anand
  surname: Kumar
  fullname: Kumar, B Anand
  email: anandbiyani.b@mlrinstitutions.ac.in
  organization: MLR Institute of Technology,Department of Computer Science and Engineering,Hyderabad,India
– sequence: 4
  surname: Likhitha
  fullname: Likhitha
  email: likhita.v@gmail.com
  organization: MLR Institute of Technology,Department of Computer Science and Engineering,Hyderabad,India
– sequence: 5
  givenname: Tammana
  surname: Sameeratmaja
  fullname: Sameeratmaja, Tammana
  email: sameera.tammana@gmail.com
  organization: MLR Institute of Technology,Department of Computer Science and Engineering,Hyderabad,India
– sequence: 6
  givenname: Ungarala Satya Surya Ram
  surname: Charan
  fullname: Charan, Ungarala Satya Surya Ram
  email: ramc06766@gmail.com
  organization: MLR Institute of Technology,Department of Computer Science and Engineering,Hyderabad,India
BookMark eNo1j81OwzAQhA0CiVLyBhzyAineXTsbH1H4ixTEAXqunGQDRtRFcTj07SkCTjP6RvqkOVcncRdFqRz0CkC7q6au68aWbOwKNdIKNGBFJR2pzLGryGoyFQIfqwUapoIt85nKUnrXWhMClM4uFDRxnr5S2MX8Rmbp55_2vE-zbPN1CvE1f_T9W4iSt-KneAAX6nT0H0myv1yq9d3tS_1QtE_3TX3dFgHAzQU51sgoVtiOYrAHT93QdbrznquRe2uGvjqMBLYruxK90wYd-pHN6AZPS3X56w0isvmcwtZP-83_S_oGMMFINg
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCCI56745.2023.10128363
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore (IEEE/IET Electronic Library - IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore (IEEE/IET Electronic Library - IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9798350348217
EISSN 2473-7577
EndPage 4
ExternalDocumentID 10128363
Genre orig-research
GroupedDBID 6IE
6IL
6IN
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i119t-3970272e5e75fe42c1a3bdbb0baa78f7c54dc8e75315b6b62a904292af74f9da3
IEDL.DBID RIE
IngestDate Wed Aug 27 07:38:46 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-3970272e5e75fe42c1a3bdbb0baa78f7c54dc8e75315b6b62a904292af74f9da3
PageCount 4
ParticipantIDs ieee_primary_10128363
PublicationCentury 2000
PublicationDate 2023-Jan.-23
PublicationDateYYYYMMDD 2023-01-23
PublicationDate_xml – month: 01
  year: 2023
  text: 2023-Jan.-23
  day: 23
PublicationDecade 2020
PublicationTitle International Conference on Computer Communication and Informatics (Online)
PublicationTitleAbbrev ICCCI
PublicationYear 2023
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003211695
Score 2.082703
Snippet The use of computers and the internet has spread rapidly over the course of the past few decades. Every day, more and more people are coming to rely heavily on...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Computers
Hardware
Host
Host Intrusion Detection System
Intrusion detection
Intrusion Detection System
Intrusion Prevention System
Machine learning
Network
Network intrusion detection
Network Intrusion Detection System
Software
Support vector machine
Support vector machines
Title Intrusion Detection System Using Machine Learning
URI https://ieeexplore.ieee.org/document/10128363
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV05a8MwFBZNpk7pkdIbDV3t2NZlzW5DXGjo0EC2oLOUgtPBWfrr-yTbKS0UugkbgaSH_A5_3_cQuityLzi1eWK4zxJawndQGgEjaTNrnLSiU_tc8sWKPq7ZuierRy6Mcy6Cz1wahvFfvt2aXSiVzYIWVUk4GaGRKHlH1toXVAikMlyyAa2TyVldVVXNuKAsDU3C02H6j0Yq0Y_MJ2g5rKCDj7ynu1an5vOXOOO_l3iEpt-UPfy8d0bH6MA1J2gy9GzA_RU-RXndBJoFWAPfuzbisBrcyZbjCB_ATxFe6XCvvPo6Rav5w0u1SPq2Cclbnss2gQgDcs3CMSeYd7QwuSLaap1ppUTphWHUmhJekpxprnmhZPBKhfKCemkVOUPjZtu4czhJuNHMQBDCuKTe-hLSN4i_mFHOU5uRCzQNR7D56JQxNsPuL_94foUOgyVCCaMg12gMG3Y34NRbfRuN-QXA758j
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV05T8MwGLWgDDCVo4gbD6xJk_iK50DVQFsxtFK3yidCSGmHdOHXYztJEUhIbFYiWbY_Od-R994HwEOWWkaxTiNFbRLh3H0HuWJuxHWileGaNWqfMzpe4OclWbZk9cCFMcYE8JmJ_TD8y9drtfWlsqHXosoRRfvggGCMSUPX2pVUkEtmKCcdXifhw7IoipJQhkns24TH3QQ_WqkETzLqg1m3hgZA8hFvaxmrz1_yjP9e5DEYfJP24OvOHZ2APVOdgn7XtQG2l_gMpGXliRbOHvDR1AGJVcFGuBwGAAGcBoClga326tsALEZP82IctY0Tovc05XXkYgyXbWaGGEaswZlKBZJaykQKwXLLFMFa5e4lSomkkmaCe7-UCcuw5Vqgc9Cr1pW5cCfp7jRRLgwhlGOrbe4SOBeBESWMxTpBl2Dgj2C1abQxVt3ur_54fg8Ox_PpZDUpZy_X4MhbxRc0MnQDem7z5ta5-FreBcN-AUq8onA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Computer+Communication+and+Informatics+%28Online%29&rft.atitle=Intrusion+Detection+System+Using+Machine+Learning&rft.au=Kiran%2C+Ajmeera&rft.au=Prakash%2C+S.+Wilson&rft.au=Kumar%2C+B+Anand&rft.au=Likhitha&rft.date=2023-01-23&rft.pub=IEEE&rft.eissn=2473-7577&rft.spage=1&rft.epage=4&rft_id=info:doi/10.1109%2FICCCI56745.2023.10128363&rft.externalDocID=10128363