Study and analysis of intrusion detection system using random forest and linear regression

Sathish P. Kumar, Arun Raaza

Abstract


The cyber security is the challenging job in present network system. There are number of existing Intrusion Detection Systems are available to overcome the issues, in this paper we proposed the linear regression and random forest technique is used. The latest UNSW-NB15 dataset is used for analyzing the proposed methods. Selecting significant features and removing irrelevant features by using proposed learning methods as well as identifying the best method by evaluating the results obtained.

Full Text:

PDF

References


. Antonia Nisioti, Alexios Mylonas, Paul D. Yoo and Vasilios Katos, “From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods” , IEEE Communications Surveys & Tutorials, Vol. 20, No. 4, Fourth Quarter 2018.

An Improved intrusion detection Algorithm Based on GA and SVM PEIYING TAO, ZHE SUN, AND ZHIXIN SUN, IEEE ACCESS Volume 6, 2018, PP 13624 to 13631.

. HAST-IDS Learning Hierarchical Spatial- Temporal Features using Deep Neural Networks to Improve Intrusion Detection IEEE Access 2017 Volume 6, 2018 pp No: 1792 to 1806.

David J. Weller-Fahy, Member, IEEE, Brett J. Borghetti, and Angela A. Sodemann, Member, IEEE,” A Survey of Distance and Similarity Measures Used Within Network Intrusion Anomaly Detection”, IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. 17, NO. 1, FIRST QUARTER 2015.

R.Heady, G.Luger, A.Maccabe, M.Servilla. “The architecture of a network level intrusion detection system”. Tech.rep., Computer Science Department, University of New Mexico, New Mexico, 1990.

https://www.unsw.adfa.edu.au/unsw-canberra-cyber/cybersecurity/ADFA-NB15-Datasets/

. G.V.Nadiammai, M.Hemalatha, “Effective approach toward intrusion detection system using data mining techniques”,Egyptian Informatics Journal 2014 No.15, pp37-50.

F.Amiri, M.Rezaei Yousefi, C. Lucas, A. Sha kery and N.Yazdani, “Mutual information-based feature selection for intrusion detection systems”, J. Netw. Comput. Appl., vol.34, no. 4, pp. 1184-1199, 2011.[9] Zargari S. and Voorhis D., “Feature Selection in the Corrected KDD-dataset”, 2012 Third International Conference on Emerging Intelligent Data and Web Technolgies, Bucharest, 2012, pp. 174-180.

Y.Kalpana, S.Purushothaman, S.Rajeswari, “Internation Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 9 NO.27(2014).




DOI: http://dx.doi.org/10.21533/pen.v6i1.289

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Sathish S

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN: 2303-4521

Digital Object Identifier DOI: 10.21533/pen

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License