Skip to main content

A Survey on Intrusion Detection System Using Machine Learning Algorithms

  • Conference paper
  • First Online:
Innovative Data Communication Technologies and Application (ICIDCA 2019)

Abstract

IDS play significant role in the computer network and system. Now a days, research on the intrusion detection that has been use of machine learning applications. This paper proposes novel deep learning technique to empower IDS functioning within current system. The system shows a merging of deep learning and machine learning, capable of accurate analyzing an inclusive range of network traffic. The new approach proposes NDAE for un-supervised feature learning. Moreover, additionally proposes novel deep learning classification display built utilizing stacked autoencoder. Our proposed classifier has been executed in GPU and assessed utilizing the measure using ‘KDD’ Cup ‘99’ and ‘NSL-KDD’ datasets. The performance evaluated network intrusion detection analysis datasets, particularly KDD Cup 99 and NSL-KDD dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dong, B., Wang, X.: Comparison deep leaning method to traditional methods using for network intrusion detection. In: Proceedings of the 8th IEEE International Conference on Communication Software and Networks, Beijing, China, pp. 581–585, June 2016

    Google Scholar 

  2. Zhao, R., Yan, R., Chen, Z., Mao, K., Wang, P., Gao, R.X.: Deep learning and its applications to machine health monitoring: a survey. Submitted to IEEE Trans. Neural Netw. Learn. Syst. (2016). http://arxiv.org/abs/1612.07640

  3. Lee, H., Kim, Y., Kim, C.O.: A deep learning model for robust wafer fault monitoring with sensor measurement noise. IEEE Trans. Semicond. Manuf. 30(1), 23–31 (2017)

    Article  Google Scholar 

  4. You, L., Li, Y., Wang, Y., Zhang, J., Yang, Y.: A deep learning based RNNs model for automatic security audit of short messages. In: Proceedings of the 16th International Symposium on Communications and Information Technologies, Qingdao, China, pp. 225–229, September 2016

    Google Scholar 

  5. Polishetty, R., Roopaei, M., Rad, P.: A next-generation secure cloud based deep learning license plate recognition for smart cities. In: Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, Anaheim, CA, USA, pp. 286–293, December 2016

    Google Scholar 

  6. Alrawashdeh, K., Purdy, C.: Toward an online anomaly intrusion detection system based on deep learning. In: Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, Anaheim, CA, USA, pp. 195–200, December 2016

    Google Scholar 

  7. Javaid, A., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies, pp. 21–26 (2016). http://dx.doi.org/10.4108/eai.3-12-2015.2262516

  8. Potluri, S., Diedrich, C.: Accelerated deep neural networks for enhanced intrusion detection system. In: Proceedings of the IEEE 21st International Conference on Emerging Technologies and Factory Automation, Berlin, Germany, pp. 1–8, September 2016

    Google Scholar 

  9. Garcia Cordero, C., Hauke, S., Muhlhauser, M., Fischer, M.: Analyzing flow-based anomaly intrusion detection using replicator neural networks. In: Proceedings of the 14th Annual Conference on Privacy, Security and Trust, Auckland, New Zealand, pp. 317–324, December 2016

    Google Scholar 

  10. Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M.: Deep learning approach for network intrusion detection in software defined networking. In: Proceedings of the International Conference on Wireless Networks and Mobile Communications, pp. 258–263, October 2016

    Google Scholar 

  11. Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 41–50 (2018)

    Article  Google Scholar 

  12. Aung, Y.Y., Min, M.M.: An analysis of random forest algorithm-based network intrusion detection system. In: Proceedings of the 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, pp. 127–132, June 2017

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shital Gulghane .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gulghane, S., Shingate, V., Bondgulwar, S., Awari, G., Sagar, P. (2020). A Survey on Intrusion Detection System Using Machine Learning Algorithms. In: Raj, J., Bashar, A., Ramson, S. (eds) Innovative Data Communication Technologies and Application. ICIDCA 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 46. Springer, Cham. https://doi.org/10.1007/978-3-030-38040-3_76

Download citation

Publish with us

Policies and ethics