Review on Network Intrusion Detection Techniques using Machine Learning

K. Shashank, Mamatha Balachandra

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The security given to a network from unapproved access and dangers is broadly called as network security. It is the obligation of network managers to embrace preventive measures to shield their networks from potential security dangers. Computer networks that are associated with consistent data transactions inside the administration or business require security. The exponential development in the information that streams inside network, the quantity of individuals active on network, makes it essential to have a productive system that disallows outsiders to attack and access secret information. Consistently developing digital attacks should be checked to defend classified information. Machine learning methods which have a critical part in distinguishing the attacks are for the most part utilized as a part of the advancement of Intrusion Detection Systems. Because of colossal increment in network activity and diverse sorts of attacks, checking every single parcel in the system movement is tedious and computationally expensive.

Original languageEnglish
Title of host publication2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages104-109
Number of pages6
ISBN (Electronic)9781538653234
DOIs
Publication statusPublished - 25-03-2019
Event2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Mangalore, India
Duration: 13-08-201814-08-2018

Publication series

Name2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings

Conference

Conference2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018
CountryIndia
CityMangalore
Period13-08-1814-08-18

Fingerprint

Network security
Intrusion detection
Computer networks
Learning systems
Managers
Industry

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering
  • Computer Networks and Communications
  • Artificial Intelligence
  • Hardware and Architecture

Cite this

Shashank, K., & Balachandra, M. (2019). Review on Network Intrusion Detection Techniques using Machine Learning. In 2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings (pp. 104-109). [8673974] (2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/DISCOVER.2018.8673974
Shashank, K. ; Balachandra, Mamatha. / Review on Network Intrusion Detection Techniques using Machine Learning. 2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2019. pp. 104-109 (2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings).
@inproceedings{1d67ae61e79a413f98df284850d44a75,
title = "Review on Network Intrusion Detection Techniques using Machine Learning",
abstract = "The security given to a network from unapproved access and dangers is broadly called as network security. It is the obligation of network managers to embrace preventive measures to shield their networks from potential security dangers. Computer networks that are associated with consistent data transactions inside the administration or business require security. The exponential development in the information that streams inside network, the quantity of individuals active on network, makes it essential to have a productive system that disallows outsiders to attack and access secret information. Consistently developing digital attacks should be checked to defend classified information. Machine learning methods which have a critical part in distinguishing the attacks are for the most part utilized as a part of the advancement of Intrusion Detection Systems. Because of colossal increment in network activity and diverse sorts of attacks, checking every single parcel in the system movement is tedious and computationally expensive.",
author = "K. Shashank and Mamatha Balachandra",
year = "2019",
month = "3",
day = "25",
doi = "10.1109/DISCOVER.2018.8673974",
language = "English",
series = "2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "104--109",
booktitle = "2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings",
address = "United States",

}

Shashank, K & Balachandra, M 2019, Review on Network Intrusion Detection Techniques using Machine Learning. in 2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings., 8673974, 2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings, Institute of Electrical and Electronics Engineers Inc., pp. 104-109, 2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018, Mangalore, India, 13-08-18. https://doi.org/10.1109/DISCOVER.2018.8673974

Review on Network Intrusion Detection Techniques using Machine Learning. / Shashank, K.; Balachandra, Mamatha.

2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2019. p. 104-109 8673974 (2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Review on Network Intrusion Detection Techniques using Machine Learning

AU - Shashank, K.

AU - Balachandra, Mamatha

PY - 2019/3/25

Y1 - 2019/3/25

N2 - The security given to a network from unapproved access and dangers is broadly called as network security. It is the obligation of network managers to embrace preventive measures to shield their networks from potential security dangers. Computer networks that are associated with consistent data transactions inside the administration or business require security. The exponential development in the information that streams inside network, the quantity of individuals active on network, makes it essential to have a productive system that disallows outsiders to attack and access secret information. Consistently developing digital attacks should be checked to defend classified information. Machine learning methods which have a critical part in distinguishing the attacks are for the most part utilized as a part of the advancement of Intrusion Detection Systems. Because of colossal increment in network activity and diverse sorts of attacks, checking every single parcel in the system movement is tedious and computationally expensive.

AB - The security given to a network from unapproved access and dangers is broadly called as network security. It is the obligation of network managers to embrace preventive measures to shield their networks from potential security dangers. Computer networks that are associated with consistent data transactions inside the administration or business require security. The exponential development in the information that streams inside network, the quantity of individuals active on network, makes it essential to have a productive system that disallows outsiders to attack and access secret information. Consistently developing digital attacks should be checked to defend classified information. Machine learning methods which have a critical part in distinguishing the attacks are for the most part utilized as a part of the advancement of Intrusion Detection Systems. Because of colossal increment in network activity and diverse sorts of attacks, checking every single parcel in the system movement is tedious and computationally expensive.

UR - http://www.scopus.com/inward/record.url?scp=85064224563&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85064224563&partnerID=8YFLogxK

U2 - 10.1109/DISCOVER.2018.8673974

DO - 10.1109/DISCOVER.2018.8673974

M3 - Conference contribution

T3 - 2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings

SP - 104

EP - 109

BT - 2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Shashank K, Balachandra M. Review on Network Intrusion Detection Techniques using Machine Learning. In 2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc. 2019. p. 104-109. 8673974. (2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings). https://doi.org/10.1109/DISCOVER.2018.8673974