Skip to main content

Security Mechanism for Detection Coverage of Machine Learning-Based IDS

  • Conference paper
  • First Online:
Recent Trends in Communication and Intelligent Systems

Part of the book series: Algorithms for Intelligent Systems ((AIS))

  • 187 Accesses

Abstract

Intrusion is described as a set of activities aimed at circumventing computer and networking system security mechanisms. The ability of organizations to detect infiltration quickly and unambiguously is critical. The complexities and intricacies of weird behavior can easily unsettle the strategy by accurately portraying basic classes of intrusion. Any research project that aims for fully autonomous learning should include a process that is solely responsible for defining the type of each variable is defined as a set of activities aimed at bypassing the security mechanism of the computer and networking systems. Perceiving intrusion rapidly and unequivocally is imperative to the capable activity of sufficient PC organizations. Exactly portraying basic classes of intrusion exceptionally energizes their conspicuous verification; in any case, the subtleties and intricacies of bizarre action can without a very remarkable stretch baffle the strategy. Any research effort that intends the learning to be fully autonomous should, therefore, contain a mechanism with the sole responsibility of determining the type of each variable. Following that, the learning algorithm will resume its typical functioning operation. This way, learning can be completely automated, reducing the need for users to write assignments. The goal of this study is to discover a well-defined form of assignment mechanism. Following that, an improved k-NN classifier with automatic feature prediction and a proposed weighted Gower measure is proposed with the goal of effectively rendering mixed data. The suggested solution uses Python software to calculate precision, accuracy, and recall.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. F. Yuan, X. Xia, J. Shi, H. Li, G. Li, Non-linear dimensionality reduction and Gaussian process based classification method for smoke detection. IEEE Access (2017)

    Google Scholar 

  2. Z. Yang, J. Peltonen, S. Kaski, Optimization equivalence of divergences improves neighbour embedding, in Proceedings of ACM International Conference on Machine Learning (2014), pp. 460–468

    Google Scholar 

  3. L. Yang, B. Liu, H. Lin, Y. Lin, Combining local and global information for product feature extraction in opinion documents. Inf. Process. Lett. 116(10), 623–627 (2016)

    Article  Google Scholar 

  4. Y. Yang, K. McLaughlin, T. Littler, S. Sezer, H. Wang, Rule based intrusion detection system for SCADA networks, in Proceedings of IET International Conference on Renewable Power Generation Conference (2013), pp. 01–05

    Google Scholar 

  5. K.K. Vasan, B. Surendiran, Dimensionality reduction using principal component analysis for network intrusion detection. Perspect. Sci. 8(5), 510–512 (2016)

    Google Scholar 

  6. D.S. Terzi, R. Terzi, S. Sagiroglu, Big data analytics for network anomaly detection from netflow data, in Proceedings of IEEE International Conference on Computer Science and Engineering (2017), pp. 592–597

    Google Scholar 

  7. B. Subba, S. Biswas, S. Karmakar, Enhancing performance of anomaly based intrusion detection systems through dimensionality reduction using principal component analysis, in Proceedings of IEEE International Conference on Advanced Networks and Telecommunications Systems (2016), pp. 1–6

    Google Scholar 

  8. K.P. Seng, L.-M. Ang, Big feature data analytics: split and combine linear discriminant analysis (SC-LDA) for integration towards decision making analytics. IEEE Access (2017)

    Google Scholar 

  9. X. Hu, Z. Jiang, X. Guo, Y. Zhou, Person re-Identification by deep learning muti-part information complementary, in Proceedings of 25th IEEE International Conference on Image Processing (ICIP) (2018), pp. 848–852

    Google Scholar 

  10. W. Haoxiang, S. Smys, Big data analysis and perturbation using data mining algorithm. J. Soft Comput. Paradigm (JSCP) 3(01), 19–28 (2021)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kundaliya, A., Juyal, P., Sharma, N. (2022). Security Mechanism for Detection Coverage of Machine Learning-Based IDS. In: Pundir, A.K.S., Yadav, N., Sharma, H., Das, S. (eds) Recent Trends in Communication and Intelligent Systems. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-1324-2_30

Download citation

Publish with us

Policies and ethics