Performance assessment of ML techniques for detecting intrusions in the network

0Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

It has become crucial for the organizations, military and personal computer users to make the network security. Day by day, security has become a major issue with the increase of internet usage. The improvement in the security technology can be much understood from the security history. Network security is an immense field and it is in development stage. An immense amount of data is being generated every second due to technological advancement and reforms. Social networking and cloud computing are generating a huge amount of data every second. Every minute data is being captured in the computing world from the click of the mouse to video people tend to watch generating an immediate recommendation. Everything a user is doing on the internet is being captured in different ways for multiple intents. Now it all ends up monitoring the system and network and, securing lines and servers. This mechanism is called Intrusion Detection System(IDS). Hacker uses multiple numbers of ways to attack the system which can be detected through a number of algorithm and techniques. A comprehensive survey of some major techniques of machine learning implemented for detecting intrusions. Classification techniques are SVM, Random Forest algorithm, Extreme learning machine, and Decision Tree. NSL-KDD is the dataset used to get the higher rate of detection. The Result Analysis shows that, in terms of accuracy, this paper accomplishes better results when compared to any other related methods.

Cite

CITATION STYLE

APA

Haritha, K., & Rao, C. M. (2019). Performance assessment of ML techniques for detecting intrusions in the network. International Journal of Innovative Technology and Exploring Engineering, 8(12), 4095–4100. https://doi.org/10.35940/ijitee.L3640.1081219

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free