Skip to main content
Top

2020 | OriginalPaper | Chapter

35. Machine Learning Based Intrusion Detection Techniques

Authors : Kishor Kumar Gulla, P. Viswanath, Suresh Babu Veluru, R. Raja Kumar

Published in: Handbook of Computer Networks and Cyber Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nowadays the usage of Internet has being increased exponentially due to the reason of keeping most sensitive data in on-line. It leads vulnerabilities on the data that is available in on-line like intruders can raise any kind of attacks. Therefore, intrusion detection helps a computing environment or computer system to deal with such kind of attacks. Intrusion detection is also an important supplement as well as component in the traditional computer security mechanism. It can be considered as a typical classification problem. Therefore to develop an effective intrusion detection method, the machine learning methods can be used. This chapter briefs the current state of the art in the intrusion detection domain using the supervised learning approaches of machine learning.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Axelsson, S. (2000). Intrusion detection systems: A survey and taxonomy. Axelsson, S. (2000). Intrusion detection systems: A survey and taxonomy.
2.
go back to reference Frank, J. (1994). Artificial intelligence and intrusion detection: Current and future directions. In Proceedings of the 17th National Computer Security Conference. Frank, J. (1994). Artificial intelligence and intrusion detection: Current and future directions. In Proceedings of the 17th National Computer Security Conference.
3.
go back to reference Gaddam, S. R., Phoha, V. V., & Balagani, K. S. (2007). K-Means+ID3: A novel method for supervised anomaly detection by cascading k-means clustering and ID3 decision tree learning methods. IEEE Transactions on Knowledge and Data Engineering, 19(3), 345–354.CrossRef Gaddam, S. R., Phoha, V. V., & Balagani, K. S. (2007). K-Means+ID3: A novel method for supervised anomaly detection by cascading k-means clustering and ID3 decision tree learning methods. IEEE Transactions on Knowledge and Data Engineering, 19(3), 345–354.CrossRef
4.
go back to reference Ilgun, K., & Kemmerer, A. (1995). State transition analysis: A rule-based intrusion detection approach. IEEE Transaction on Software Engineering, 21(3), 181–199.CrossRef Ilgun, K., & Kemmerer, A. (1995). State transition analysis: A rule-based intrusion detection approach. IEEE Transaction on Software Engineering, 21(3), 181–199.CrossRef
5.
go back to reference Kumar, G. K., Viswanath, P., & Rao, A. A. (2011). Intrusion detection using an ensemble of decision trees. In Indian International Conference on Artificial Intelligence (pp. 382–392). Kumar, G. K., Viswanath, P., & Rao, A. A. (2011). Intrusion detection using an ensemble of decision trees. In Indian International Conference on Artificial Intelligence (pp. 382–392).
6.
go back to reference Kumar, G. K., Viswanath, P., & Rao, A. A. (2015). Ensemble of soft decision trees using multiple approximate fuzzy-rough set based reducts. International Journal of Information Processing, 9(2), 36–46. Kumar, G. K., Viswanath, P., & Rao, A. A. (2015). Ensemble of soft decision trees using multiple approximate fuzzy-rough set based reducts. International Journal of Information Processing, 9(2), 36–46.
7.
go back to reference Kumar, G. K., Viswanath, P., & Rao, A. A. (2016). Ensemble of randomized soft decision trees for robust classification. Sadhana, 41(3), 273–282.MathSciNetMATH Kumar, G. K., Viswanath, P., & Rao, A. A. (2016). Ensemble of randomized soft decision trees for robust classification. Sadhana, 41(3), 273–282.MathSciNetMATH
8.
go back to reference Lee, W., & Stolfo, S. J. (1998). Data mining approaches for intrusion detection. In 7th USENIX Security Symposium. Lee, W., & Stolfo, S. J. (1998). Data mining approaches for intrusion detection. In 7th USENIX Security Symposium.
11.
go back to reference Lippman, R. P., Fried, D. J., Graf, I., & Zissman, M. A. (2000). Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings of DARPA Information Survivability Conference and Exosition (pp. 12–26). Lippman, R. P., Fried, D. J., Graf, I., & Zissman, M. A. (2000). Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings of DARPA Information Survivability Conference and Exosition (pp. 12–26).
12.
go back to reference Lunt, T., & Jagannathan, R. (1994). A prototype real-time intrusion-detection expert system. In Proceedings of 1988 IEEE Computer Society Symposium on Research in Security and Privacy (pp. 59–66). Washington: IEEE Computer Society Press. Lunt, T., & Jagannathan, R. (1994). A prototype real-time intrusion-detection expert system. In Proceedings of 1988 IEEE Computer Society Symposium on Research in Security and Privacy (pp. 59–66). Washington: IEEE Computer Society Press.
13.
go back to reference Luo, J. (1999). Integrating fuzzy logic with data mining methods for intrusion detection. Luo, J. (1999). Integrating fuzzy logic with data mining methods for intrusion detection.
14.
go back to reference Mukherjee, B., Heberlein, L., & Levitt, K. (1994). Network intrusion detection. Computer Networks, 8(3), 26–41. Mukherjee, B., Heberlein, L., & Levitt, K. (1994). Network intrusion detection. Computer Networks, 8(3), 26–41.
15.
go back to reference Smaha, S. (1998). Haystack: An intrusion detection system. In Proceedings of the Fourth Aerospace Computer Security Applications Conference (pp. 37–44). Smaha, S. (1998). Haystack: An intrusion detection system. In Proceedings of the Fourth Aerospace Computer Security Applications Conference (pp. 37–44).
16.
go back to reference Zhou, L., & Jiang, F. (2011). A rough set based decision tree algorithm and its application in intrusion detection. In 4th International Conference on Pattern Recognition and Machine Intelligence (pp. 333–338). Berlin: Springer.CrossRef Zhou, L., & Jiang, F. (2011). A rough set based decision tree algorithm and its application in intrusion detection. In 4th International Conference on Pattern Recognition and Machine Intelligence (pp. 333–338). Berlin: Springer.CrossRef
Metadata
Title
Machine Learning Based Intrusion Detection Techniques
Authors
Kishor Kumar Gulla
P. Viswanath
Suresh Babu Veluru
R. Raja Kumar
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-22277-2_35

Premium Partner