CFP last date
20 January 2025
Reseach Article

A Review of Intrusion Detection Technique using Various Technique of Machine Learning and Feature Optimization Technique

by Sunita Patel, Jyoti Sondhi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 93 - Number 14
Year of Publication: 2014
Authors: Sunita Patel, Jyoti Sondhi
10.5120/16286-6185

Sunita Patel, Jyoti Sondhi . A Review of Intrusion Detection Technique using Various Technique of Machine Learning and Feature Optimization Technique. International Journal of Computer Applications. 93, 14 ( May 2014), 43-47. DOI=10.5120/16286-6185

@article{ 10.5120/16286-6185,
author = { Sunita Patel, Jyoti Sondhi },
title = { A Review of Intrusion Detection Technique using Various Technique of Machine Learning and Feature Optimization Technique },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 93 },
number = { 14 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 43-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume93/number14/16286-6185/ },
doi = { 10.5120/16286-6185 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:15:46.217668+05:30
%A Sunita Patel
%A Jyoti Sondhi
%T A Review of Intrusion Detection Technique using Various Technique of Machine Learning and Feature Optimization Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 93
%N 14
%P 43-47
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cyber' terrorism has recently been said to be the biggest threat to our modern society. Every day a new cyber-scare story makes the headlines. The national government recognizes the importance of cyber security, as several officials have made clear in the past few years "Cyber security is among the most serious economic and national security challenges we will face in the 21st Century, we face a long-term challenge in cyberspace from foreign intelligence agencies and militaries, criminals, and others, and, this struggle will wreak serious damage on the economic health and national security. for the prevention and detection of cyber terrorism used intrusion detection system, intrusion detection system detect illegal behaviour of network over data. in current research trend performance of intrusion detection system is important issue. Now various authors' used machine learning and feature optimization technique for intrusion detection system. Machine learning technique is collection of all learning algorithm such as classification, clustering and regression. for the improvement of machine learning technique used feature optimization technique. In this paper presents review of intrusion detection technique using machine learning and feature optimization process.

References
  1. P. Jongsuebsuk , N. Wattanapongsakorn, C. Charnsripinyo "Network Intrusion Detection With Fuzzy Genetic Algorithm For Unknown Attacks" IEEE, (Icoin) 2013. Pp 1-5.
  2. S. Devaraju , Dr. S. Ramakrishnan "Performance Analysis Of Intrusion Detection System is Using Various Neural Network Classifiers" In IEEE International Conference On Recent Trends In Information Technology, Icrtit 2011. Pp 1033-1038.
  3. Li Liu, Pengyuan Wan, Yingmei Wang, Songtao Liu "Clustering And Hybrid Genetic Algorithm Based Intrusion Detection Strategy " Telkomnika Indonesian Journal Of Electrical Engineering Vol. 12, 2014. Pp 762-770.
  4. V. Venkatachalam and S. Selvan "Intrusion Detection Using An Improved Competitive Learning Lamstar Neural Network" In Ijcsns International Journal Of Computer Science And Network Security, Vol. 7, 2007. Pp 255-264.
  5. Gary Stein, Bing Chen, Annie S. Wu, Kien A. Hua "Decision Tree Classifier For Network Intrusion Detection With Ga-Based Feature Selection" 2011. Pp 1-6.
  6. Mohammad A. Faysel , Syed S. Haque "Towards Cyber Defense: Research In Intrusion Detection And Intrusion Prevention Systems" Ijcsns International Journal Of Computer Science And Network Security, Vol. 10, 2010. Pp 316-325.
  7. Shafigh Parsazad , Ehsan Saboori , Amin Allahyar "Fast Feature Reduction In Intrusion Detection Datasets" Mipro 2012, Pp 1023-1029.
  8. Abebe Tesfahun, D. Lalitha Bhaskari "Intrusion Detection Using Random Forests Classifier With Smote And Feature Reduction" International Conference On Cloud & Ubiquitous Computing & Emerging Technologies, 2013. Pp 127-133.
  9. Zorana Bankovic , Dusan Stepanovic, Slobodan Bojanic, Octavio Nieto-Taladriz "Improving Network Security Using Genetic Algorithm Approach" Computers And Electrical Engineering, 2007. Pp 1-14.
  10. Hachmi Fatma , Limam Mohamed "A Two-Stage Technique To Improve Intrusion Detection Systems Based On Data Mining Algorithms" IEEE, 2013. Pp 1-6.
  11. Tansel Ozyer , Reda Alhajj , Ken Barker "Intrusion Detection By Integrating Boosting Genetic Fuzzy Classi?er And Data Mining Criteria For Rule Pre-Screening" Journal Of Network and Computer Applications 2007. Pp 99-113.
  12. Dewan Md. Farid, Jerome Darmont, Nouria Harbi, Nguyen Huu Hoa, Mohammad Zahidur Rahman "Adaptive Network Intrusion Detection Learning: Attribute Selection And Classification" 2008. Pp 1-5.
  13. Morteza Amini, Rasool Jalili, Hamid Reza Shahriari "Rt-Unnid: A Practical Solution To Real-Time Network-Based Intrusion Detection Using Unsupervised Neural Networks" Computers & Security, 2006. Pp 459-468.
  14. Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi "A Software Implementation Of A Genetic Algorithm Based Approach To Network Intrusion Detection" IEEE, 2005. Pp 250-258.
  15. Ajith Abraham, Ravi Jain, Johnson Thomas, Sang Yong Han "D-Scids: Distributed Soft Computing Intrusion Detection System" Journal Of Network And Computer Applications, 2005. Pp 1-19.
  16. Anish Das And S. Siva Sathya "A Fuzzy Based Divide And Conquer Algorithm For Feature Selection In Kdd Intrusion Detection Dataset" International Journal Of Computer Science And Informatics, Vol-2, 2012. Pp 46-50.
  17. Srilatha Chebrolu , Ajith Abraham , Johnson P. Thomas "Feature Deduction And Ensemble Design Of Intrusion Detection Systems" Computers & Security, 2005. Pp 295-307.
  18. V. Bapuji , R. Naveen Kuma ,2 Dr. A. Govardhan , S. S. V. N. Sarma "Soft Computing And Artificial Intelligence Techniques For Intrusion Detection System" Network And Complex Systems, Vol-2, 2012. Pp 24-33.
  19. Ren Hui Gong, Mohammad Zulkernine And Purang Abolmaesumi "A Software Implementation Of A Genetic Algorithm Based Approach To Network Intrusion Detection" In IEEE 2005.
  20. Jonatan Gomez and Dipankar Dasgupta "Evolving Fuzzy Classifiers for Intrusion Detection" In IEEE 2002.
  21. A. M. Chadrashekhar and K. Raghuveer " Intrusion detection technique by using K-means, Fuzzy Neural network and SVM classifier" (ICCCI), 2013. Pp 450-456.
Index Terms

Computer Science
Information Sciences

Keywords

KDDCUP Traffic features PCA.