Detecting intruders in the network using machine learning classifier

Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 6, Issue 2

Abstract

Rapid development in technology has raised the need for an effective intrusion detection system as the traditional intrusion detection method cannot compete against newly advanced intrusions. In the proposed work uses machine learning technique to detect both known and unknown attacks in the payload analysis of network traffic. As the majority of such systems, the proposal consists of two phases: a training phase and a detection phase. During the training phase the statistical model of the legitimate network usage is created through Bloom Filters and N-grams techniques. Subsequently, the results obtained by analyzing a dataset of attacks are compared with such model. This will allow a set of rules to be developed which will be able to detect whether the packets contain malware payloads. In the detection phase, the traffic is to analyze compared with the model created in the training phase and the results obtained when applying rules.

Authors and Affiliations

Nivedita S, Revathi. M. P

Keywords

Related Articles

IMPLEMENTATION OF HIGHLY SECURED H.264/AVC BIT-STREAMS USING CORRELATED MOTION (CM) ESTIMATION FOR HIGH VIDEO QUALITY OF SERVICE (QOS)

Quality of Service (QoS) is the important criteria in the video processing in H.264/AVC Bit-streams. In this paper, the encryption based bit streams transmitted to improve the security of the bit strea...

A SURVEY ON UNIFIED COMMUNICATION

In recent years, unified communication is becoming a critical part in enterprise communication. Voice, messaging, conferencing, presence and availability, and directories have all become fundamental requirements...

MRF PRETREADS SERVICE MANAGEMENT AND APPLICATION

The project is entitled “MRF Pretreds Service Management and Application” Is Done For The Company Named “MRF Pretreads” which is an effective tyre service management. The project work is done...

IMPROVING SECURITY AND DEDUPLICATION FOR OUTSOURCED DATABASE IN CLOUD COMPUTING

To improve the security of data by using Elliptic Curve Cryptography (ECC) Algorithm. The duplicated data will be detected and avoid with a Secure Hash Algorithm (SHA). In many case when the dishonest Cloud Service Provi...

ROLE OF HUMAN RESOURCES DEPARTMENT IN CORPORATE GOVERNANCE/ CORPORATE SOCIAL RESPONSIBILITY

The terms “Corporate governance” is a new buzzword of the 21P st P century. In fact the word “governance” is used for addressing all the issues. Generally the word “governance” is used for governing the country or a stat...

Download PDF file
  • EP ID EP365572
  • DOI -
  • Views 121
  • Downloads 0

How To Cite

Nivedita S, Revathi. M. P (2016). Detecting intruders in the network using machine learning classifier. Elysium Journal of Engineering Research and Management, 6(2), -. https://europub.co.uk/articles/-A-365572