A novel Approach Using “Supervised and Unsupervised learning” to prevent the Adequacy of Intrusion Detection Systems

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Countering digital dangers, particularly assault detection, is a testing region of research in the field of data affirmation. Intruders utilize polymorphic instruments to disguise the assault payload and dodge the detection methods. Many supervised and unsupervised learning comes closer from the field of machine learning and example acknowledgments have been utilized to expand the adequacy of intrusion detection systems (IDSs). Supervised learning approaches utilize just marked examples to prepare a classifier, however getting adequate named tests is lumbering, and requires the endeavors of area specialists. Notwithstanding, un-marked examples can without much of a stretch be acquired in some genuine issues. Contrasted with super-vised learning approaches, semi-supervised learning (SSL) addresses this issue by considering expansive number of unlabeled examples together with the marked examples to fabricate a superior classifier. In today’s age security is a big issue and every day when we are on the internet we are exposed to a huge number of threats where our personal information can be leaked. The information security and the Intrusion Detection System (IDS) play a critical role in the internet. IDS isan essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality, and system availability against possible threats. In this paper, we are proposing a modified Elitist approach where the value of fitness is multiplied by the times a variable which is determined on the basis of the value of Kappa (K).

     

     


  • Keywords


    Cyber Threats, Supervised & Unsupervised Learning, Machine Learning, Pattern Recognition, Intrusion Detection Systems (IDS).

  • References


      [1] Kabir, E., Hu, J., Wang, H., &Zhuo, G. (2017). A novel statistical technique for intrusion detection systems. Future Generation Computer Systems.

      [2] Hamed, T., Dara, R., & Kremer, S. C. (2018). Network intrusion detection system based on recursive feature addition and bigram technique. Computers & Security, 73, 137-155.

      [3] Verma, A., &Ranga, V. (2018). Statistical analysis of CIDDS-001 dataset for Network Intrusion Detection Systems using Distance-based Machine Learning. Procedia Computer Science, 125, 709-716.

      [4]

      479

      International Journal of Engineering & Technology

      Farnaaz, N., &Jabbar, M. A. (2016). Random Forest Modeling for Network Intrusion Detection System. Procedia Computer Science, 89, 213-217.

      [5] Gautam, S. K., & Om, H. (2016). Computational neural network regression model for Host based Intrusion Detection System. Perspectives in Science, 8, 93-95.

      [6] Chung, C. J., Khatkar, P., Xing, T., Lee, J., & Huang, D. (2013). NICE: Network intrusion detection and countermeasure selection in virtual network systems. IEEE transactions on dependable and secure computing, 10(4), 198-211.

      [7] Creech, G., & Hu, J. (2014). A semantic approach to host-based intrusion detection systems using contiguous and discontinuous system call patterns. IEEE Transactions on Computers, 63(4), 807-819.

      [8] Gai, K., Qiu, M., Tao, L., & Zhu, Y. (2016). Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks, 9(16), 3049-3058.

      [9] Mitchell, R., & Chen, R. (2015). Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. IEEE Transactions on Dependable and Secure Computing, 12(1), 16-30.

      [10] Ashfaq, R. A. R., Wang, X. Z., Huang, J. Z., Abbas, H., & He, Y. L. (2017). Fuzziness based semi-supervised learning approach for intrusion detection system. Information Sciences, 378, 484-497.

      [11] Keshtgary, M., &Rikhtegar, N. (2018). Intrusion Detection based on a Novel Hybrid Learning Approach. Journal of AI and Data Mining, 6(1), 157-162.

      [12] Goyal, A., & Kumar, C. (2008). GA-NIDS: a genetic algorithm based network intrusion detection system. Northwestern university.


 

View

Download

Article ID: 19362
 
DOI: 10.14419/ijet.v7i3.34.19362




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.