Skip to main content

A Review on Intrusion Detection System Using a Machine Learning Algorithms

  • Conference paper
  • First Online:
Proceedings of International Conference on Emerging Technologies and Intelligent Systems (ICETIS 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 322))

  • 790 Accesses

Abstract

Intrusion detection has achievement a comprehensive interest and become a substantial scope for various researches and still being the subject of common concern by researchers. The intrusion detection researches face a complicated problem even after many years of research. Because of the huge number of false warnings throughout detecting anonymous attack patterns residue a vague problem. There are a numerous research trying to expose the possible solutions to this problem. Anomaly detection is the main issue of intrusion detection in which alarms of normal actions show a presence of destined or unintentional prompted attacks, faults, defects, and others. These papers represent an attentive literature review of machine learning approaches for intrusion detection, specifically Random Forest and Support Vector Machines that are used. Founded on the reference number and the significance of the growing method, papers describe every method specified, read, and shortened.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ngu AH, Gutierrez M, Metsis V, Nepal S, Sheng QZ (2017) Iot middleware: a survey on issues and enabling technologies. IEEE Internet Things J 4(1):1–20

    Google Scholar 

  2. Jameel SM, Hashmani MA, Alhussain H, Budiman A, Rehman M (2020) A critical review on adverse effects of concept drift over machine learning classification models. (IJACSA) Int J Adv Comput Sci Appl 11(1)

    Google Scholar 

  3. Shibahara T, Yagi T, Akiyama M, Chiba D, Yada T (2016) Efficient dynamic malware analysis based on network behavior using deep learning. In: Global communications conference (GLOBECOM). IEEE, pp 1–7

    Google Scholar 

  4. Karatas G (2016) Genetic algorithm for intrusion detection system. In: 24th signal processing and communication application conference (SIU). IEEE, pp 1341–1344

    Google Scholar 

  5. Imtiaz W, Khanum M, Mahboob T, Ghafoor HA, Sehar R (2015) A survey on unsupervised machine learning algorithms for automation, classification and maintenance. Int J Comput Appl (0975–8887) 119(13)

    Google Scholar 

  6. Kang M-J, Kang J-W (2016) Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6):e0155781

    Google Scholar 

  7. Tang TA, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M (2016) Deep learning approach for network intrusion detection in software defined networking. IEEE conference location: Fez, Morocco date of conference. https://doi.org/10.1109/WINCOM.2016.7777224, 26–29 Oct 2016

  8. Buczak A (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Sur Tutorials 18(2)

    Google Scholar 

  9. Niyaz Q, Sun W, Javaid AY, Alam M (2016) A deep learning approach for network intrusion detection system. College of Engineering University of Toledo BICT 2015, December 03–05, New York City, United States Copyright © ICST. https://doi.org/10.4108/eai.3-12-2015.2262516

  10. Karatas G, Demir O, Sahingoz OK (2018) Deep learning in intrusion detection systems. International congress on big data, deep learning and fighting cyber terrorism, Ankara, Turkey, 3–4 Dec 2018

    Google Scholar 

  11. Harmony A (2020) Search-based feature selection technique for cloud intrusion detection Widad Mirghani Makki, Maheyzah MD. Siraj, and Nurudeen Mahmud Ibrahim(&) Advances in intelligent systems and computing volume 1073© Springer Nature Switzerland AG 2020

    Google Scholar 

  12. Wang C, Zheng J, Li X (2017) Research on DDoS attacks detection based on RDF-SVM. In: 10th international conference on intelligent computation technology and automation

    Google Scholar 

  13. Balogun A (2015) Anomaly intrusion detection using an hybrid of decision tree and K-nearest neighbor a multidisciplinary journal publication of the Faculty of Science, Adeleke University, Ede, Nigeria

    Google Scholar 

  14. Yao H, Fu D, Zhang P, Li M, Liu Y (2019) MSML: a novel multilevel semi supervised machine learning framework for intrusion detection system. IEEE Internet Things J 6(2):1949–1959

    Article  Google Scholar 

  15. Kumar S, Pal J, Giri A, Raj A, Raj R, Mangayarkarasi R (2019) Intrusion detection system using random forest. researchgate.net/publication/332396674

    Google Scholar 

  16. Farnaaz N, Jabbar MA (2016) Random forest modeling for network intrusion detection system. Twelfth international multi-conference on information processing-2016 (IMCIP-2016)

    Google Scholar 

  17. Ugochukwu CJ, Bennett EO (2018) An intrusion detection system using machine learning algorithm. Int J Comput Sci Math Theory 4(1). ISSN: 2545-5699

    Google Scholar 

  18. Ling J, Wu C (2019) Feature selection and deep learning based approach for network intrusion detection. Advances in computer science research, volume 873rd international conference on mechatronics engineering and information technology (ICMEIT 2019)

    Google Scholar 

  19. Ren J, Guo J, Qian W, Yuan H, Hao X, Jingjing H (2019) Building an effective intrusion detection system by using hybrid data optimization based on machine learning algorithms. Secur Commun Netw I7130868:11

    Google Scholar 

  20. Li X, Chen W, Zhang Q, Wu L (2020) Building auto-encoder intrusion detection system based on random forest feature selection. Comput Secur 95. 101851xzzaza HM

    Google Scholar 

  21. Elijah AV, Abdullah A, JhanJhi NZ, Supramaniam M, Abdullateef B (2019) Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: an empirical study. (IJACSA) Int J Adv Comput Sci Appl 10(9)

    Google Scholar 

  22. Enache A-C, Patriciu VV (2014) Intrusions detection based on support vector machine optimized with swarm intelligence. In: 153–9th IEEE international symposium on applied computational intelligence and informatics, Timişoara, Romnia, May 15–17

    Google Scholar 

  23. Al Mehedi Hasan M, Nasser M, Pal B, Ahmad S (2014) Support vector machine and random forest modeling for intrusion detection system (IDS). J Intell Learn Syst Appl 6:45–52 Published Online February 2014

    Google Scholar 

  24. Patgiri R, Varshney U, Akutota T, Kunde R (2018) An investigation on intrusion detection system using machine learning. IEEE symposium series on computational intelligence SSCI

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sirag, H., Awadelkariem, S.D. (2022). A Review on Intrusion Detection System Using a Machine Learning Algorithms. In: Al-Emran, M., Al-Sharafi, M.A., Al-Kabi, M.N., Shaalan, K. (eds) Proceedings of International Conference on Emerging Technologies and Intelligent Systems. ICETIS 2021. Lecture Notes in Networks and Systems, vol 322. Springer, Cham. https://doi.org/10.1007/978-3-030-85990-9_24

Download citation

Publish with us

Policies and ethics