Abstract
Intrusion is described as a set of activities aimed at circumventing computer and networking system security mechanisms. The ability of organizations to detect infiltration quickly and unambiguously is critical. The complexities and intricacies of weird behavior can easily unsettle the strategy by accurately portraying basic classes of intrusion. Any research project that aims for fully autonomous learning should include a process that is solely responsible for defining the type of each variable is defined as a set of activities aimed at bypassing the security mechanism of the computer and networking systems. Perceiving intrusion rapidly and unequivocally is imperative to the capable activity of sufficient PC organizations. Exactly portraying basic classes of intrusion exceptionally energizes their conspicuous verification; in any case, the subtleties and intricacies of bizarre action can without a very remarkable stretch baffle the strategy. Any research effort that intends the learning to be fully autonomous should, therefore, contain a mechanism with the sole responsibility of determining the type of each variable. Following that, the learning algorithm will resume its typical functioning operation. This way, learning can be completely automated, reducing the need for users to write assignments. The goal of this study is to discover a well-defined form of assignment mechanism. Following that, an improved k-NN classifier with automatic feature prediction and a proposed weighted Gower measure is proposed with the goal of effectively rendering mixed data. The suggested solution uses Python software to calculate precision, accuracy, and recall.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
F. Yuan, X. Xia, J. Shi, H. Li, G. Li, Non-linear dimensionality reduction and Gaussian process based classification method for smoke detection. IEEE Access (2017)
Z. Yang, J. Peltonen, S. Kaski, Optimization equivalence of divergences improves neighbour embedding, in Proceedings of ACM International Conference on Machine Learning (2014), pp. 460–468
L. Yang, B. Liu, H. Lin, Y. Lin, Combining local and global information for product feature extraction in opinion documents. Inf. Process. Lett. 116(10), 623–627 (2016)
Y. Yang, K. McLaughlin, T. Littler, S. Sezer, H. Wang, Rule based intrusion detection system for SCADA networks, in Proceedings of IET International Conference on Renewable Power Generation Conference (2013), pp. 01–05
K.K. Vasan, B. Surendiran, Dimensionality reduction using principal component analysis for network intrusion detection. Perspect. Sci. 8(5), 510–512 (2016)
D.S. Terzi, R. Terzi, S. Sagiroglu, Big data analytics for network anomaly detection from netflow data, in Proceedings of IEEE International Conference on Computer Science and Engineering (2017), pp. 592–597
B. Subba, S. Biswas, S. Karmakar, Enhancing performance of anomaly based intrusion detection systems through dimensionality reduction using principal component analysis, in Proceedings of IEEE International Conference on Advanced Networks and Telecommunications Systems (2016), pp. 1–6
K.P. Seng, L.-M. Ang, Big feature data analytics: split and combine linear discriminant analysis (SC-LDA) for integration towards decision making analytics. IEEE Access (2017)
X. Hu, Z. Jiang, X. Guo, Y. Zhou, Person re-Identification by deep learning muti-part information complementary, in Proceedings of 25th IEEE International Conference on Image Processing (ICIP) (2018), pp. 848–852
W. Haoxiang, S. Smys, Big data analysis and perturbation using data mining algorithm. J. Soft Comput. Paradigm (JSCP) 3(01), 19–28 (2021)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kundaliya, A., Juyal, P., Sharma, N. (2022). Security Mechanism for Detection Coverage of Machine Learning-Based IDS. In: Pundir, A.K.S., Yadav, N., Sharma, H., Das, S. (eds) Recent Trends in Communication and Intelligent Systems. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-1324-2_30
Download citation
DOI: https://doi.org/10.1007/978-981-19-1324-2_30
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1323-5
Online ISBN: 978-981-19-1324-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)