SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Asian Journal of Applied Science and Technology (AJAST)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018
315 | P a g e Online ISSN: 2456-883X Website: www.ajast.net
Analysis of Artificial Intelligence Techniques for Network Intrusion Detection and
Intrusion Prevention for Enhanced User Privacy
Dr. Vinod Varma Vegesna
Sr. IT Security Risk Analyst, The Auto Club Group, United States of America. Email: vinodvarmava@gmail.com
Article Received: 30 July 2018 Article Accepted: 29 October 2018 Article Published: 30 December 2018
1. INTRODUCTION
Intrusion Detection Systems are classified as Network IDS or Host IDS. The former intrusion detection evaluates
internet traffic to identify non-licensed, unauthorized, as well as inexplicable network behavior. The Network
IDS intercepts internet data packets utilizing span ports or connection taps to identify and flag suspicious behavior.
It will not interfere with network activity as well as operates in the background. A server intrusion detection system
(IDS) is hardware and strives to identify suspicious operations or irregular behavior mostly on a particular device
[1-4]. It normally involves an agent working on every framework, noticing but also notifying the local OS. To
monitor suspicious access, the system for intrusion detection employs predetermined signatures based on threat
attributes. The HIDS furthermore appears to be playing a supplementary role. An intrusion detection could also be
classified as either active or passive. Passive intrusion detection systems hardly monitor and analyze as well as alert
the system administrators to suspicious behavior. This is now the admin’s obligation to take the appropriate
measures.
An active Intrusion Detection System, on the contrary hand, serves as an Intrusion Prevention System (IPS) [5]. It
strives to avoid and address disputes engendered by intruding by performing the necessary activities following
identification via checking. IDSs are also classified depending on their recognition logic, such as signature-based or
anomaly-based intrusion prevention. A signature-based intrusion detection system works by detecting suspicious
behavior by making comparisons of its features to a database of well-known signature attacks. The only
disadvantage is that due to signature-based intrusion detection systems depend heavily on earlier known data, users
are vulnerable to relatively new threats. Regardless of whether the threats are modified, the delay in the notification
process allows malicious programs to access the system completely unnoticed. An anomaly-based intrusion
detection system compares the attributes to a benchmark. The benchmark determines how suspicious the action is
suspect and false-positive are indeed a major issue.
The Mirai botnet threat on the DNS Server provider impacted Internet-of-Things (IoT) systems, causing numerous
major online organizations including Spotify, Twitter, and Netflix to go offline. Invaders can remotely disable the
security system but also its different versions, for instance, by using a spurious source IP address. It has additionally
ABSTRACT
With the rapid advancement of computer technology during the last couple of decades. Computer systems are commonly used in manufacturing,
corporate, as well as other aspects of human living. As a result, constructing dependable infrastructures is a major challenge for IT managers. On the
contrary side, this same rapid advancement of technology has created numerous difficulties in building reliable networks which are challenging tasks.
There seem to be numerous varieties of attacks that affect the accessibility, authenticity, as well as secrecy of communications systems. In this paper,
an in-depth and all-inclusive description of artificial intelligence methods used for the detection of network intrusions is discussed in detail.
Keywords: Artificial intelligence, Network intrusion detection, Denial of service attack.
Asian Journal of Applied Science and Technology (AJAST)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018
316 | P a g e Online ISSN: 2456-883X Website: www.ajast.net
overlooked a significant amount of DDoS and DoS attempts. To address the shortcomings of conventional security
protocols, an enhanced security mechanism known as the Intrusion Detection System (IDS) was developed. The
inbound and outbound traffic is monitored for suspicious software by IDS. IDS can be categorized based on how it
is implemented or the approach it uses to detect unusual behavior.
IDS could be installed at stations to safeguard those from threat (Host-based IDS) as well as at the platform's
entrance point to oversee packets that come and go for inappropriate activity in order to safeguard the entire
infrastructure (Network-based IDS) (NIDS). As a matter of fact, a number of different methods, such as genetic,
statistical mechanics, quantitative, and machine-learning methodologies, were employed to create an algorithm
capable of detecting irregularities. An Intrusion Detection System is a collection of tools, methodologies, and
resources intended to detect, evaluate, and notify unauthorized or unregulated network connections.
The intrusion prevention component of the name is confusing because an IDS somehow doesn't detect malicious
activities [6-11]. It works by detecting traffic activity that could or could not be an invasion. An intrusion detection
system (IDS) is a powerful technology that could also decode as well as perceive traffic on the network and/or host
operations. This information could include data packet assessment, the components of the gateway, and proxy
server, as well as device application logs, local application logs, connectivity calls, internet data, etc. Besides that,
an IDS frequently stores a database of well-known attack patterns and therefore can make comparisons of activity
patterns, traffic, or behavior seen in the information it is tracking against such signatures to detect whenever a tight
match in between signatures as well as recent or recent behavior happens [12]. At that juncture, the IDS could
indeed issue alarm systems or notifications as well as perform multiple required actions such as closing down
Internet access or particular data centers, trying to launch backtraces, as well as making other influential attempts to
recognize intruders but also gather the evidence of with their questionable activities.
Among the most frequent and dangerous threats is the denial of service (DOS). DOS attacks are intended to
remotely disable numerous infrastructures for end customers. It consumes network capacity as well as loads this
same framework with unwanted queries. As a result, DOS serves as a broad umbrella including all varieties of
attacks aimed at consuming the network and computer assets. Yahoo became the initial target of a DOS attack in
2000 (Figure 1), but also DOS documented the first community invasion on the same date. DOS attacks are
currently targeting web applications as well as websites on social media. From some other point of view, remote to
local (R2L) threats are also a general concept including all sorts of threats that are intended to even have local right
authorizations since some network components, such as file servers, are just available for locally located clients.
There are multiple categories of R2L breaches, such as SPY and PHF, that intend to plan unauthorized use of
network resources.
In terms of gaining unauthorized entry to computer and network resource management, User to Root (U2R)
breaches seek to change the suspect's appropriate access from regular user to root user, who seems to have full
access to the internet and networking devices. The greatest difficulty would be that intruders are constantly
innovating their own tools and methods for extracting any type of vulnerability. As a result, detecting all forms of
attacks using a single standard alternative is incredibly difficult. As a result, IDS have become a crucial component
of network safety. It is used to continuously monitor traffic and produce notifications whenever threats are
Asian Journal of Applied Science and Technology (AJAST)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018
317 | P a g e Online ISSN: 2456-883X Website: www.ajast.net
detected. IDS may be used to keep track of a particular device (host-based intrusion detection system) or even all
traffic patterns (network - intrusion detection system) is the most popular type.
There seem to be two kinds of IDS in summary (anomaly base or misuse base). An anomalous intrusion detection
system is used to recognize threats using previously documented acceptable behavior. As a result, it relates actual
current data packets to previously documented regular traffic; the above category of intrusion detection is
extensively utilized because it can identify new categories of security breaches. However, from some other point of
view, it records the maximum standard of false positive alarms, implying that a significant number of the regular
data packet are misidentified as attack packets.
Fig. 1: Denial of service attack (DOS)
Nevertheless, a misappropriation intrusion detection system is employed to identify threats using a database of
attack patterns. It does not generate false alarms, however, it is exposed to fresh types of attacks (new signatures).
2. IMPORTANT WORKS TO THE KDD DATASET
This part comprises works that are associated with employing the KDD data set to incorporate machine learning
techniques. It moreover provides a short introduction to the different machine learning techniques as well as
demonstrates how and why the KDD dataset can be used to test and evaluate different types of machine learning
techniques. The classifier selection model carried out a comprehensive examination of both the intrusion detection
system and the KDD dataset. For attack detection systems, the KDD dataset is used as a standard business dataset.
It was noted that such an SVM algorithm necessitates a significant time for training, which limits its functionality.
2.1. KDD Dataset Preprocessing and Investigation
The KDD dataset provided a thorough comprehension of many attack behaviors while also being extensively
utilized in numerous places for evaluating and testing intrusion prevention methodologies. The KDD dataset had
first been made available to the public in 1999 by MIT Lincoln labs at the University of California. This has
4898431 instances and 41 attributes. The KDD dataset must have been sourced into SQL Server 2008 in order to
Asian Journal of Applied Science and Technology (AJAST)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018
318 | P a g e Online ISSN: 2456-883X Website: www.ajast.net
configure multiple mathematical measured values, such as allocation of instance records, threat forms, as well as
occurrence proportions. The stages inside the KDD procedure are shown in Figure 2.
Fig. 2: Process levels in a typical KDD process
2.2. Machine learning techniques
A. Pattern classification
Pattern recognition is indeed the intervention of taking original information as well as performing activities on data
types. To overcome different pattern recognition difficulties, both supervised and unsupervised learning models
may be employed [13-15]. This is centered on employing the training information to generate a feature, where
every other training data includes a couple of input vectors as well as output vectors (i.e. the class label). To start
creating classifiers, the training assignment would be to calculate the distance between two points between
input-output examples.
After the model is implemented, this could categorize unspecified illustrations into previously understood labels.
The process in a pattern classification technique is depicted in Figure 3. One machine learning technique may be
employed to solve intrusion prevention difficulties. Machine learning methods were employed to address these
issues in most of the existing research works conducted.
B. K-nearest neighbor
K-nearest neighbor (k-NN) (Figure 4) seems to be a simple as well as a conventional probabilistic methodology for
sample classification. This calculates the estimated intervals among numerous locations upon these input variables
before allocating the unidentifiable position towards the class of its K-nearest neighbors. k is an essential property
in the creation of a k-NN classification model, but also various k values result in various performance levels.
Asian Journal of Applied Science and Technology (AJAST)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018
319 | P a g e Online ISSN: 2456-883X Website: www.ajast.net
If k is very big, the neighbors in use for estimation will necessitate a long time to classify and therefore will affect
predictive performance. In contrast to the inductive learning method, k-NN is known as example-based learning.
As a result, it lacks the training phase and instead searches for instances of input variables as well as classifies new
incidents. As a result, k-NN trains the instances in-line and helps determine the k-nearest neighbor of the new
sample.
Fig. 3: Steps in pattern classification
C. Support vector machines
Support vector machines (SVM) map the input matrix into a feature space with higher dimensions before
determining the best partitioning hyper-plane in that space. Furthermore, the partitioning hyper-plane, which is
ascertained by support vectors instead of by the complete training samples, is exceedingly resistant to outliers. An
SVM classifier, in specific, is intended for classification tasks.
That would be, to isolate a collection of training vectors from two distinct categories. It is crucial to remember that
perhaps the support vectors are indeed the training sample size closest to the decision function. The SVM
furthermore includes a user-specified attribute known as the penalty factor. It enables individuals to trade off the
amount of incorrectly classified samples versus the size of a decision boundary. Figure 5 depicts the basic idea
behind SVM.
Data Collection
Feature Selection
Model Selection
Training Classification
Evaluation of Classifier
Start
End
Asian Journal of Applied Science and Technology (AJAST)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018
320 | P a g e Online ISSN: 2456-883X Website: www.ajast.net
Fig. 4: Schematic K-nearest neighbor (k-NN) Classification Methodology
Fig. 5: Functional Perception of SVM
START
Read value of K,
Type of Distance
(D), and Test Data
Find the K nearest neighbours (D)
to the Test Data
Set maximum label
class of K to test
data
END
DATA SVM
CLASS 1
CLASS 3
CLASS 2
CLASS 4
Asian Journal of Applied Science and Technology (AJAST)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018
321 | P a g e Online ISSN: 2456-883X Website: www.ajast.net
D. Artificial neural networks
The neural network is a collection of data processing elements created to resemble the neural connections inside the
brain. The multilayer perceptron (MLP) neural network structure is broadly utilized in numerous problems
involving pattern recognition. An MLP infrastructure is made up of three sections: an input layer with a collection
of sensory nodes as input neurons, a single or maybe more hidden layers of computing nodes, as well as an output
layer of computing nodes. Every connectivity does have a scalar weight that is modified during the training stage.
Furthermore, the back-propagation training method is frequently used to train an MLP, also referred to known as a
backpropagation neural network. To start with, random weights are allocated somewhere at the start of training.
This same methodology whereupon accomplishes weight tuning to determine which hidden layers description
would be most efficient at minimizing classification error. The framework of an artificial neural network is
depicted in Figure 6.
Fig. 6: The framework of an artificial neural network
E. Self-organizing maps
An unsupervised competitive learning algorithm trains a self-organizing map (SOM) that is a self-organization
procedure.
Fig. 7: Self-organizing maps
SOM aims to minimize the layer of complexity of visualization techniques. SOM, in other words, developments,
and groupings of high-dimensional input variables upon a low-dimensional visualized map, typically two
Output
Lattice
Weight
Input
X1
X2
Xn
Y1
Y2
Y3
NEURONS
Input
Value 1
Input
Value 2
Input
Value n
Output
Value 1
Output
Value 2
Output
Value 3
Asian Journal of Applied Science and Technology (AJAST)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018
322 | P a g e Online ISSN: 2456-883X Website: www.ajast.net
dimensions for visualization. This is typically composed of an input layer and a Kohonen layer that is a double
configuration of neurons that maps n-dimensional input to two dimensions. Kohonen's SOM assigns a fair
representation result for each of the input variables. The system locates the node that is nearest to every training
iteration as well as continues to move the winner node that is the neuron with the smallest route to the training
iteration. On a two-dimensional map, SOM maps comparable input vectors with identical or comparable output
variables (Figure 7). As a result, after training, the output would then self-organize into an ordered map, as well as
output units of equivalent weights would be positioned in an adjacent manner.
F. Decision trees
A decision tree (Figure 8) categorizes a dataset by making a series of decision making, with the decision process
influencing the subsequent decision. A tree framework emphasizes such a decision sequence. A sample is
categorized from root to a suitable end leaf node, with every end leaf node representing a categorization group.
Fig. 8: Architecture of a Decision tree
Every node has been assigned the features of the extracts, as well as the cost of every branch corresponds to the
features. CART is an established program for creating classification trees (Classification and Regressing Trees). A
classification tree is a tree structure with a spectrum of the distinct (representational) target class, although a tree
has a variety of sustained (arithmetic) attributes.
G. Naive bayes networks
We understand the mathematical correlations as well as the correlation among state variables in several instances.
Nevertheless, expressing the stochastic interactions between these variables may be challenging. In another phrase,
the background experience of the framework is merely the reality that one parameter may impact the other. To
execute arbitrary code this correlation structure or casual interdependences among a problem is an actually
stochastic process, a probability-based graph model known as Nave Bayesian Networks may be used (NB). The
framework offers a response to issues such as "What is the likelihood that this is a specific kind of attack provided
Asian Journal of Applied Science and Technology (AJAST)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018
323 | P a g e Online ISSN: 2456-883X Website: www.ajast.net
a few identified security events?" while using the probability density equation. A directed acyclic graph (DAG) is
commonly used to depict the framework of an NB, in which each uniquely identifies each of the state variables so
each connection embeds the impact among one node on the other.
3. SOFT COMPUTING APPLICATION FOR IDS
Even though most infringements could be detected by specific criteria that measure user behavior as well as audit
documents, numerous IDSs were developed by utilizing known threat as well as misappropriation structures
[16-19]. Misappropriation detection systems as well as anomalous detection systems seem to be the two types of
intrusion detection systems. Misappropriation-recognizing systems can monitor attacks using well-known potential
attacks. Abnormality monitoring systems utilize user data to identify anomalies; whatever difference from standard
usage patterns is regarded as an invasion. Figure 9 depicts the fundamental categorizations of intrusion detection
technologies.
Fig. 9: Intrusion Detection System Categories
To improve the effectiveness of IDS, software cybersecurity experts are attempting to apply computational
intelligence methodologies to IDS. Soft computing is the combination of research methods designed to simulate
and facilitate real-world solutions to issues that cannot be mathematical equations patterned or are far more difficult
to simulate.
Soft computing is a broad term for such a collection of tuning and processing methods that take advantage of
sensitivity for inaccuracy, lack of certainty, partial truth, and approximate solution to achieve robustness and small
expenses. The primary objective of IDS investigators would be to create intellectual, flexible, and premium
software competent mainly in real-time intrusion prevention.
To decrease human interference, numerous Artificial Intelligence (AI) methodologies were employed to
computerize the intrusion detection method. In a broad sense, the methodologies used in IDS are built on machine
learning. In summary, Artificial Neural Networks (ANNs) and Genetic Algorithms (GAs) are employed in the IDS
execution, with Data Analysis, Adaptive Control, and Probability-based Reasoning being added methodologies to
enhance that strategy.
Intrusion Detection
System
Analysis Method Source of Data
Misuse IDS Anomaly IDS Host-based IDS
Network-based
IDS
Asian Journal of Applied Science and Technology (AJAST)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018
324 | P a g e Online ISSN: 2456-883X Website: www.ajast.net
3.1. Artificial Neural Networks
Artificial Neural Networks (ANN), also known as Neural Networks (NN), are computational models derived from
biological neural networks (neurons) that allocate different qualities to interconnection among both components
inside the neural network in the same way that circuit probabilities for neurons have been developed at conjunction
with the local in accordance with their frequency of activation. The greater the frequency with which a neighboring
nerve cell activates, the greater the electric fields there at neural connections of the receptors which respond toward
this configuration. Components in neurons that takes inputs from neighboring components have greater weight. It is
made up of an interconnection of interconnected neurons that process information using only a connectionist
approach to data processing.
Often these ANNs are adaptive systems that modify their framework depending on external or inner data that
moves through the system during the process of learning. Neurons, more in realistic terms, are quasi-statistical
information methods. They have the ability to identify patterns in the information or even to model complex
relationships among inputs and outputs. The neural network models encounter, while complex and still a little
intriguing could be used to address a variety of classifications and predictions, including vulnerability scanning.
The concept of using computational methods, especially ANN, inside the implementation of intrusion detection
systems is to incorporate an intelligent system in the technology that enables the creation of revealing dormant
patterns in normal and unusual connection audit logs and generalizing the trends to fresh (and distinguishable)
connection records of the identical category. The brilliance of neural network models in vulnerability scanning is
that they don't require annotations or perhaps even rules. Immediately begin trying to feed model parameters about
system or host-based occurrences to a neuron, and it'll take care of the rest. While some learning time will be
required, artificial neural networks are quite well adapted to quickly comprehending new structures of invasion.
The computational intelligence methodology has existed for a long time, and it seems probable that it will become
increasingly widely used or depended on in vulnerability scanning within the coming years as dependence on
signature verification declines.
Numerous forms of ANN can be used for categorization, estimation, cluster analysis, correlation, and other
purposes. A forward feed is the initial and undoubtedly most basic type of artificial neural system that was indeed
the ANN. In this system, data goes only across the input layers to the output units, passing across any hidden
neurons. In the backpropagation neural training algorithm there seem to be no iterations or branching in the
network that is frequently utilized in the classification task.
Cyber-attack identification is a classification task in the sense that both computer and network data are categorized
as invasion or regular use. A feed-forward ANN's capacity to comprehend intelligent dynamical input data is one of
its advantages for text categorization. The ANN understands fingerprint trends of computer security and regular
utilization operations from training data and then applies even these fingerprint trends to categorize operations in
test data as an attack or regular use. A forward feed that is one or more hidden units of processing elements but one
output unit of processing elements constitutes ANN. Computation units are interconnected across layers but not
among them. A feed-forward ANN with input variables, one hidden neuron of four processing elements, and one
Asian Journal of Applied Science and Technology (AJAST)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018
325 | P a g e Online ISSN: 2456-883X Website: www.ajast.net
output unit of two processing elements that are hyperlinked. Every input is linked to one of the hidden neurons, and
each hidden unit is linked to one of the output units. Every relationship is connected with a weighting factor.
3.2. Genetic Algorithm
The Genetic algorithm (GA) is a powerful search technique used to determine precisely or estimate solutions for
optimization and searching difficulties. General search algorithms include evolutionary algorithms. Evolutionary
algorithms are indeed a subclass of evolutionary computation also recognized as genetic algorithms that employ
biology methodologies including hereditary, genetic variation, selection, and crossover also called recombination.
A genetic algorithm's method usually starts with either a randomly chosen community of chromosomes. Such
genomes constitute a challenge that must be addressed. Various units of every chromosome are embedded as a bit
stream, character types, or numerals based on the original problem characteristics. Such locations, known as genes,
are transformed at random inside a distance during evolution.
A population refers to a group of genes throughout an evolutionary stage. Every chromosome's goodness is
determined by calculating using an iterative algorithm. During the assessment, the two basic operators crossover
and mutation are employed to replicate species regeneration as well as mutagenesis. The biggest and strongest
genes are prioritized in the shortlisting of genetic material for continued existence and pairing. To describe a
traditional evolutionary algorithm, two items must be characterized: (i) A biological depiction of the initial
solution; and (ii) A fitness value for assessing the computational domain.
The solution is commonly represented as an arrangement of the bit stream. Numerous categories and frameworks of
arrays may be used in the same way. The primary benefit of these biological characterizations would be that their
components have been conveniently associated due to their predefined length, which allows for simple crossover
probability. Arbitrary length characterizations can also be employed but the execution of crossover is much more
complicated in this particular instance. Genetic algorithms investigate tree-like characterizations, whereas
evolutionary programming investigates graph-form representations.
The fitness function has been defined over genetic depiction and is used to assess the effectiveness of the
characterized solution. The fitness function has always been impacted by the situation. In the knapsack problem, for
example, we would like to achieve the highest possible price for objects we are able to fit into a knapsack with a
degree of permanence. A sequence of bits could be used to symbolize a solution, with every bit representing objects
and the significance of the bit (0 or 1) representing whether or not that particular item is in the knapsack. Because
the length of items could exceed the carrying capacity of the knapsack when not that kind of interpretation is
accurate. If the interpretation is legitimate, the fitness of the solution is the average of the values of all items in the
knapsack, else it is 0, in certain cases.
A quantitative study was carried out in the form of a science-based publishing lookup for particular matter-related
terms to provide an overall picture of literary works trends. Every phrase was searched in conjunction with the
phrase "intrusion detection" to limit the outcomes to simply the relevant field. Due to its easiness and flexibility,
Google Scholar was frequently employed to conduct academic publication lookups. Contingent on the lookup
priorities, the total number of articles with the exception of references as well as patent applications has been
Asian Journal of Applied Science and Technology (AJAST)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018
326 | P a g e Online ISSN: 2456-883X Website: www.ajast.net
documented. The primary objective of such study findings is to offer an overview of current developments in an
understandable manner.
4. IMPLEMENTING AI-BASED INTRUSION DETECTION
Because of the volume of private information which moves across interconnections, anomaly detection has
emerged as a leading research as well as concern issue in the modern environment. A variety of Machine Learning
algorithms are available to detect anomalies. For intrusion detection systems, standard methods are commonly
used, however, a mix of various learning techniques should be employed. In recent times, fusion or ensemble
learning methods have also been employed.
These methodologies are utilized in conjunction with a classification model. The classifier determines to see if an
internal user belongs to a negative or positive linkage. Pattern Classification is a predominant machine learning
approach that may be employed for the intrusion detection system. Pattern classification could be accomplished
through both supervised and unsupervised methods. A training set of data is used to learn a feature that produces an
input and a result matrix in supervised learning. The feature builds a classification model that can convert
unidentified instances into established classifiers.
Neural networks (NNs) may be employed to create accounts of software behavior and endeavor to differentiate
between both abnormal and malicious software behavior. The primary objective of using NNs for Intrusion
Prevention is that they should be able to transfer insufficient information and distinguish between both suspicious
as well as secure connections. An ANN is made up of processing elements, and otherwise access points, and the
interconnection that links up them. The weight of any interaction between two units is employed to ascertain how
often each unit affects another. A neural network accomplishes a representation through one collection of values
designated to the input neurons to some other collection of values by allocating a stimulation towards each input
data and enabling the operations to continue to spread it through the system retrieved from the output nodes. As
demonstrated above, a traditional feed-forward multi-layer training algorithm principle may be employed to
generate a system for intrusion detection. Backpropagation networks are also employed satisfactorily in the
detection of network intrusions because they are in use for learning, which allows the IDS to construct and discover
profile information of unusual behaviors.
To transform the information transferred from and to the defendant all through telnet conversations, network
sniffing information should be first accessed. Alternatively, as the very first outcome, the overall amount of search
terms constitutes. The search terms are chosen from a which was before the line-up. Preferably, this number might
be proportional to the likelihood of such a threat during a session. Such search term numbers are then analyzed in
two forms by neural networks. Each neural network estimates the enhanced prior distribution of a threat in a
session, while the second attempts to categorize attack patterns to generate a threat identity.
At first, 58 search terms from a dataset of key phrases IDS which thus identify suspected behavior and well-known
threats were used. Search term collection was indeed accomplished for threat code download, threat preparedness,
the real break-in, in which an adventitious root shell was frequently formed, as well as threats carried out after
obtaining root access. In addition to the 58 established search terms, 31 new search terms have been appended. To
Asian Journal of Applied Science and Technology (AJAST)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018
327 | P a g e Online ISSN: 2456-883X Website: www.ajast.net
pick alike search terms and channel configuration again for identification neurons, a multi-layer perceptron neural
classification model was employed to perform a cross-validation of tenfold on the learning algorithm. Weight
intensity trimming was used to pick search terms for connections without hidden units and extraction of features.
With 30 keywords, high detection result was achieved, as well as a low false alarm rate, although, with very few or
even more search terms, the detection accuracy was lowered. A few keywords were assigned highly positive
weights as they were frequently discovered throughout threats, whereas others were assigned negative weights
since it was determined that they had been utilized frequently in regular sessions. As a result, many false alarms
have been avoided as a number of these search terms are also employed in regular sessions.
A genetic algorithm is a type of mathematical model that relies on evolution and natural selection. To transform the
issue into a particular domain pertaining to the framework, the genetic algorithm requires a copy of the gene
database schema and develops the gene using selection, rearrangement, and consensual operators. Simple internet
connectivity standards can be defined using a genetic algorithm. Such regulations will prevent the passing of
commonly identified malware activity. The above rules are generally contained as if-then statements. These
characterize the genetic traits in the chromosomes, to which preceding illustrations will indeed be implemented and
analyzed. An appropriate rule is prioritized, while an inaccurate rule is excluded from consideration. The optimal
set is again developed from this population. Crossover and mutation operators are used to drive transformation.
Due to the evaluation function's effectiveness, the succeeding population is biased toward regulations that
complement intrusion regulations.
Throughout this context, the Genetic Algorithm may be used to create simple network capacity. Such rules have
been developed primarily to distinguish between typical and abnormal internet traffic behavior. Such standards are
saved in that because if situation else activity format, ensuring that when the connectivity detects any abnormal
behavior characterized by the if rules, this could take the necessary steps. The data transmission utilized in this case
is a pre-classified data set that can distinguish between regular and abnormal behavior.
All the above rules serve as the gene foundation for the Genetic Algorithm. As a result, each gene has 57 genetic
traits. If an (unusual behavior) principle is discovered to be true, the respective gene will receive an additional; or
perhaps (normal behavior), a penalty would be applied. In addition, several wild cards are included in the chart and
thus are assigned a value of -1. Such wild cards symbolize a particular variety of values in a rule, that also
represents an internet block. Following this, the Genetic Algorithm begins with something like a random manner
with random selection rules. Crossover and mutation are then utilized to develop the community.
Fuzzy logic works best because once confronted with difficult issues. It is made up of a fuzzy assortment of
elements, the participation of which can range between 0 and 1. It lacks the sharp value found in Boolean sets, such
as 0 and 1. The elements' participation can be accurately encapsulated. Rough c-means categorize an item into
relatively low estimation, boundary, and negative region, whereas fuzzy c-means include a component over 0 to 1.
This also will split the information into two categories: lower estimation and boundary. The symbolic valued
attributes should be first converted to binary numbers valued attributes during the initial stage. The characteristics
were therefore sequentially scaled to every range. The test dataset would then be clustered, and fuzzy inference is
used to start generating sets of data that progressively refined rules. The very first step involves applying Data
Asian Journal of Applied Science and Technology (AJAST)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018
328 | P a g e Online ISSN: 2456-883X Website: www.ajast.net
Mining Techniques to a TCP data stream in order to obtain parameters that have not been specifically mentioned in
the packet. These variables are critical in distinguishing between ordinary and abnormal behavior. In a nutshell, it is
the creation of variables that are critical for providing fuzzy input data. The origin and destination IP addresses,
destination port, TCP control fragments, as well as other data, are derived. The IP source, IP destination, and
specific port fields are combined to form a cumulative key. After that, the identifier is employed to generate
numbers as well as other statistical approaches from data mining algorithms. Again when the extraction step is
finished, it generates fuzzy values utilizing the previous input data and calculates the range within which they will
fluctuate. Self-taught Learning (STL) is a deep learning method that comprises two categorization stages. Initially,
Unsupervised Feature Learning is used to understand a good feature depiction from a massive selection of
unlabeled data (UFL). This learned depiction is then implemented to data points and employed for the classification
problem in the second phase. Even though the unlabelled data and labeled data may originate from different
distribution functions, there should be some correlation between them.
5. DISCUSSIONS
The Internet is an important component of everyday life, and it can be widely employed in a wide range of sectors
like banking, information exchange, recreation, education, and personnel day-to-day actions, among others. This
same world wide web, in specific, has been employed as a significant component of commercial operations to
access the information. The Internet has provided a variety of methods for attempting to attack a software system.
Increasing numbers of businesses are becoming exposed to Internet threats and infringements. An invasion or
intrusion could be characterized as whatever collection of actions that attempt to undermine the security
requirements. Accessibility, Authenticity, Secrecy, Transparency, and Confidence are significant security
priorities. Probing, Denial of Service (DoS), User to root (U2R), and Remote to user (R2L) breaches are the four
types of invasions of privacy. An amount of anti-intrusion systems have been developed to prevent a huge amount
of Internet attacks. The research discovered that an intrusion detection system (IDS) is a member of six
anti-intrusion structures, which include preventative measures, pre-emption, deterrence, deflection, recognition,
and defensive measures. The ideal recognition of an invasion represents the most significant of such elements.
6. CONCLUSION
In recent years, one of the most concerning issues of this creation is the network invasion. This study observed that
both commercial and personal computers hold a significant amount of information, thereby the security and privacy
of these data are essential for users in networks that work with classified documents. Also, this paper briefly
explains four main machine-learning techniques including neural networks, genetic algorithms, and fuzzy logic,
how well these methodologies could be incorporated with IDS to enhance the identification of unusual as well as
harmful behavior, what rules are constructed to categorize network activities, and what criteria these categories are
centered.
References
[1] Ahmed, M., Naser Mahmood, A., Hu, J. A survey of network anomaly detection techniques. Journal of Network
and Computer Applications. 2016; 60: 19–31.
Asian Journal of Applied Science and Technology (AJAST)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018
329 | P a g e Online ISSN: 2456-883X Website: www.ajast.net
[2] D. (Daphne) Yao, X. Shu, L. Cheng, S. J. Stolfo, E. Bertino and R. Sandhu, "Anomaly Detection as a Service:
Challenges Advances and Opportunities", Synth. Lect. Inf. Secur. Privacy Trust, vol. 9, no. 3, pp. 1-173, Oct. 2017.
[3] Anil Lamba, “Uses of different cyber security service to prevent attack on smart home infrastructure",
International Journal for Technological Research in Engineering, vol. 1, iss. 11, pp. 5809-5813, 2014.
[4] Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K. Network Anomaly Detection: Methods, Systems and Tools.
IEEE Communications Surveys & Tutorials. 2014; 16(1): 303–336.
[5] M. Solanki and V. Dhamdhere, "Intrusion Detection Technique using Data Mining Approach: Survey", Int. J.
Innov. Res. Comput. Commun. Eng. (An ISO, vol. 3297, no. 11, 2014.
[6] Anil Lamba, “A study paper on security related issue before adopting cloud computing service model”,
International Journal for Technological Research in Engineering, vol. 3, iss. 4, pp. 5837-5840, 2015.
[7] K. Nian, H. Zhang, A. Tayal, T. Coleman and Y. Li, "Auto insurance fraud detection using unsupervised
spectral ranking for anomaly", J. Financ. Data Sci., vol. 2, no. 1, pp. 58-75, Mar. 2016.
[8] Dartigue, C., Jang, H.I., Zeng, W. A new data-mining based approach for network intrusion detection. In
Seventh Annual Communication Networks and Services Research Conference. 2009; 372–377.
[9] Anil Lamba, “Mitigating zero-day attacks in IoT using a strategic framework", International Journal for
Technological Research in Engineering, vol. 4, iss. 1, pp.5711-5714, 2016.
[10] R. Kaur and S. Singh, "A survey of data mining and social network analysis based anomaly detection
techniques", Egypt. Informatics J., vol. 17, no. 2, pp. 199-216, Jul. 2016.
[11] N. Görnitz Nicogoernitz, K. Rieck Konradrieck and U. Brefeld, Toward Supervised Anomaly Detection
Marius Kloft, 2013.
[12] Anil Lamba, “Identifying & mitigating cyber security threats in vehicular technologies", International Journal
for Technological Research in Engineering, vol. 3, iss. 7, pp. 5703-5706, 2016.
[13] Kumar, K., Batth, J.S. Network Intrusion Detection with Feature Selection Techniques using
Machine-Learning Algorithms. International Journal of Computer Applications. 2016; 150(12): 1–13.
[14] Kurose, J.F., Ross, K.W. Computer Networking: A Top-Down Approach (6th Edition). Pearson, 2012.
[15] C. C. Aggarwal, "Supervised Outlier Detection" in Outlier Analysis, New York, NY: Springer New York, pp.
169-198, 2013.
[16] Mahesh, B. Machine Learning Algorithms – A Review. International Journal of Science and Research on
classification algorithms. International journal of advanced research in computer and communication engineering.
2015; 4(6): 446–452.
[17] Pal Singh, A., Deep Singh, M. Analysis of Host-Based and Network-Based Intrusion Detection System.
International Journal of Computer Network and Information Security, 2014; 6(8): 41–47.
Asian Journal of Applied Science and Technology (AJAST)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018
330 | P a g e Online ISSN: 2456-883X Website: www.ajast.net
[18] Anil Lamba, “A role of data mining analysis to identify suspicious activity alert system”, International Journal
for Technological Research in Engineering, vol. 2, iss. 3, pp. 5814-5825, 2014.
[19] A. Zimek and E. Schubert, "Outlier Detection" in Encyclopedia of Database Systems, New York, NY:Springer
New York, pp. 1-5, 2017.

Más contenido relacionado

Similar a Analysis of Artificial Intelligence Techniques for Network Intrusion Detection and Intrusion Prevention for Enhanced User Privacy

An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsIRJET Journal
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIRJET Journal
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsAlison Hall
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013ijcsbi
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTIJMIT JOURNAL
 
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...ijtsrd
 
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 DatasetAugment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 DatasetIRJET Journal
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)Netwax Lab
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detectioneditor1knowledgecuddle
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemEswar Publications
 

Similar a Analysis of Artificial Intelligence Techniques for Network Intrusion Detection and Intrusion Prevention for Enhanced User Privacy (20)

An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection Systems
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention Systems
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
 
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
idps
idpsidps
idps
 
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 DatasetAugment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detection
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
 
1776 1779
1776 17791776 1779
1776 1779
 

Más de IIJSRJournal

Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
 
Agriculture in Indian Economy and Contribution of Science and Technology
Agriculture in Indian Economy and Contribution of Science and Technology  Agriculture in Indian Economy and Contribution of Science and Technology
Agriculture in Indian Economy and Contribution of Science and Technology IIJSRJournal
 
The Effect of Kronecker Tensor Product Values on ECG Rates: A Study on Savitz...
The Effect of Kronecker Tensor Product Values on ECG Rates: A Study on Savitz...The Effect of Kronecker Tensor Product Values on ECG Rates: A Study on Savitz...
The Effect of Kronecker Tensor Product Values on ECG Rates: A Study on Savitz...IIJSRJournal
 
Basic Criteria for Building the Third Renaissance in Uzbekistan
Basic Criteria for Building the Third Renaissance in Uzbekistan Basic Criteria for Building the Third Renaissance in Uzbekistan
Basic Criteria for Building the Third Renaissance in Uzbekistan IIJSRJournal
 
Assessment of Neglected and Under-Utilized Crop Species of African Horned Mel...
Assessment of Neglected and Under-Utilized Crop Species of African Horned Mel...Assessment of Neglected and Under-Utilized Crop Species of African Horned Mel...
Assessment of Neglected and Under-Utilized Crop Species of African Horned Mel...IIJSRJournal
 
Prevalence of Trichomonas Vaginalis Infection Among Married Pregnant Women in...
Prevalence of Trichomonas Vaginalis Infection Among Married Pregnant Women in...Prevalence of Trichomonas Vaginalis Infection Among Married Pregnant Women in...
Prevalence of Trichomonas Vaginalis Infection Among Married Pregnant Women in...IIJSRJournal
 
Factors Influencing Professional Project Management Ethical Practices in Buil...
Factors Influencing Professional Project Management Ethical Practices in Buil...Factors Influencing Professional Project Management Ethical Practices in Buil...
Factors Influencing Professional Project Management Ethical Practices in Buil...IIJSRJournal
 
Assessment of Water Occupancy Rates of the Çamlıgöze Dam Lake between 2010-20...
Assessment of Water Occupancy Rates of the Çamlıgöze Dam Lake between 2010-20...Assessment of Water Occupancy Rates of the Çamlıgöze Dam Lake between 2010-20...
Assessment of Water Occupancy Rates of the Çamlıgöze Dam Lake between 2010-20...IIJSRJournal
 
Sustainability of Pod Yields of Groundnut through Crop Seasonal Rainfall, Len...
Sustainability of Pod Yields of Groundnut through Crop Seasonal Rainfall, Len...Sustainability of Pod Yields of Groundnut through Crop Seasonal Rainfall, Len...
Sustainability of Pod Yields of Groundnut through Crop Seasonal Rainfall, Len...IIJSRJournal
 
On the Modulation of Biocompatibility of Hydrogels with Collagen and Guar Gum...
On the Modulation of Biocompatibility of Hydrogels with Collagen and Guar Gum...On the Modulation of Biocompatibility of Hydrogels with Collagen and Guar Gum...
On the Modulation of Biocompatibility of Hydrogels with Collagen and Guar Gum...IIJSRJournal
 
Incorporation of Se (IV) Complexes based on Amino Acids in Biomatrixes in Hyd...
Incorporation of Se (IV) Complexes based on Amino Acids in Biomatrixes in Hyd...Incorporation of Se (IV) Complexes based on Amino Acids in Biomatrixes in Hyd...
Incorporation of Se (IV) Complexes based on Amino Acids in Biomatrixes in Hyd...IIJSRJournal
 
Machine Learning Based House Price Prediction Using Modified Extreme Boosting
Machine Learning Based House Price Prediction Using Modified Extreme Boosting Machine Learning Based House Price Prediction Using Modified Extreme Boosting
Machine Learning Based House Price Prediction Using Modified Extreme Boosting IIJSRJournal
 
Preliminary Evaluation on Vegetative of Rambutan (Nephelium lappaceum) in San...
Preliminary Evaluation on Vegetative of Rambutan (Nephelium lappaceum) in San...Preliminary Evaluation on Vegetative of Rambutan (Nephelium lappaceum) in San...
Preliminary Evaluation on Vegetative of Rambutan (Nephelium lappaceum) in San...IIJSRJournal
 
Analysis of Physicochemical and Microbiological Parameters of Wine Produced f...
Analysis of Physicochemical and Microbiological Parameters of Wine Produced f...Analysis of Physicochemical and Microbiological Parameters of Wine Produced f...
Analysis of Physicochemical and Microbiological Parameters of Wine Produced f...IIJSRJournal
 
Cohesive and Thermal Properties of Sodium Cyanide-Halide Mixed Crystals
Cohesive and Thermal Properties of Sodium Cyanide-Halide Mixed Crystals Cohesive and Thermal Properties of Sodium Cyanide-Halide Mixed Crystals
Cohesive and Thermal Properties of Sodium Cyanide-Halide Mixed Crystals IIJSRJournal
 
Discussion on Analysis of Effects of Short-Form Video Advertising on the Purc...
Discussion on Analysis of Effects of Short-Form Video Advertising on the Purc...Discussion on Analysis of Effects of Short-Form Video Advertising on the Purc...
Discussion on Analysis of Effects of Short-Form Video Advertising on the Purc...IIJSRJournal
 
Comparison of Glucose in Urine with Likening of Pigeons as Pets
Comparison of Glucose in Urine with Likening of Pigeons as Pets Comparison of Glucose in Urine with Likening of Pigeons as Pets
Comparison of Glucose in Urine with Likening of Pigeons as Pets IIJSRJournal
 
Non-unique Fixed Points of Self Mappings in Bi-metric Spaces
Non-unique Fixed Points of Self Mappings in Bi-metric Spaces Non-unique Fixed Points of Self Mappings in Bi-metric Spaces
Non-unique Fixed Points of Self Mappings in Bi-metric Spaces IIJSRJournal
 
Research on the Impact of Short-Form Video Advertising on Social Media on the...
Research on the Impact of Short-Form Video Advertising on Social Media on the...Research on the Impact of Short-Form Video Advertising on Social Media on the...
Research on the Impact of Short-Form Video Advertising on Social Media on the...IIJSRJournal
 
Can Perfume Allergy Cause Glycosuria?
Can Perfume Allergy Cause Glycosuria? Can Perfume Allergy Cause Glycosuria?
Can Perfume Allergy Cause Glycosuria? IIJSRJournal
 

Más de IIJSRJournal (20)

Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
Agriculture in Indian Economy and Contribution of Science and Technology
Agriculture in Indian Economy and Contribution of Science and Technology  Agriculture in Indian Economy and Contribution of Science and Technology
Agriculture in Indian Economy and Contribution of Science and Technology
 
The Effect of Kronecker Tensor Product Values on ECG Rates: A Study on Savitz...
The Effect of Kronecker Tensor Product Values on ECG Rates: A Study on Savitz...The Effect of Kronecker Tensor Product Values on ECG Rates: A Study on Savitz...
The Effect of Kronecker Tensor Product Values on ECG Rates: A Study on Savitz...
 
Basic Criteria for Building the Third Renaissance in Uzbekistan
Basic Criteria for Building the Third Renaissance in Uzbekistan Basic Criteria for Building the Third Renaissance in Uzbekistan
Basic Criteria for Building the Third Renaissance in Uzbekistan
 
Assessment of Neglected and Under-Utilized Crop Species of African Horned Mel...
Assessment of Neglected and Under-Utilized Crop Species of African Horned Mel...Assessment of Neglected and Under-Utilized Crop Species of African Horned Mel...
Assessment of Neglected and Under-Utilized Crop Species of African Horned Mel...
 
Prevalence of Trichomonas Vaginalis Infection Among Married Pregnant Women in...
Prevalence of Trichomonas Vaginalis Infection Among Married Pregnant Women in...Prevalence of Trichomonas Vaginalis Infection Among Married Pregnant Women in...
Prevalence of Trichomonas Vaginalis Infection Among Married Pregnant Women in...
 
Factors Influencing Professional Project Management Ethical Practices in Buil...
Factors Influencing Professional Project Management Ethical Practices in Buil...Factors Influencing Professional Project Management Ethical Practices in Buil...
Factors Influencing Professional Project Management Ethical Practices in Buil...
 
Assessment of Water Occupancy Rates of the Çamlıgöze Dam Lake between 2010-20...
Assessment of Water Occupancy Rates of the Çamlıgöze Dam Lake between 2010-20...Assessment of Water Occupancy Rates of the Çamlıgöze Dam Lake between 2010-20...
Assessment of Water Occupancy Rates of the Çamlıgöze Dam Lake between 2010-20...
 
Sustainability of Pod Yields of Groundnut through Crop Seasonal Rainfall, Len...
Sustainability of Pod Yields of Groundnut through Crop Seasonal Rainfall, Len...Sustainability of Pod Yields of Groundnut through Crop Seasonal Rainfall, Len...
Sustainability of Pod Yields of Groundnut through Crop Seasonal Rainfall, Len...
 
On the Modulation of Biocompatibility of Hydrogels with Collagen and Guar Gum...
On the Modulation of Biocompatibility of Hydrogels with Collagen and Guar Gum...On the Modulation of Biocompatibility of Hydrogels with Collagen and Guar Gum...
On the Modulation of Biocompatibility of Hydrogels with Collagen and Guar Gum...
 
Incorporation of Se (IV) Complexes based on Amino Acids in Biomatrixes in Hyd...
Incorporation of Se (IV) Complexes based on Amino Acids in Biomatrixes in Hyd...Incorporation of Se (IV) Complexes based on Amino Acids in Biomatrixes in Hyd...
Incorporation of Se (IV) Complexes based on Amino Acids in Biomatrixes in Hyd...
 
Machine Learning Based House Price Prediction Using Modified Extreme Boosting
Machine Learning Based House Price Prediction Using Modified Extreme Boosting Machine Learning Based House Price Prediction Using Modified Extreme Boosting
Machine Learning Based House Price Prediction Using Modified Extreme Boosting
 
Preliminary Evaluation on Vegetative of Rambutan (Nephelium lappaceum) in San...
Preliminary Evaluation on Vegetative of Rambutan (Nephelium lappaceum) in San...Preliminary Evaluation on Vegetative of Rambutan (Nephelium lappaceum) in San...
Preliminary Evaluation on Vegetative of Rambutan (Nephelium lappaceum) in San...
 
Analysis of Physicochemical and Microbiological Parameters of Wine Produced f...
Analysis of Physicochemical and Microbiological Parameters of Wine Produced f...Analysis of Physicochemical and Microbiological Parameters of Wine Produced f...
Analysis of Physicochemical and Microbiological Parameters of Wine Produced f...
 
Cohesive and Thermal Properties of Sodium Cyanide-Halide Mixed Crystals
Cohesive and Thermal Properties of Sodium Cyanide-Halide Mixed Crystals Cohesive and Thermal Properties of Sodium Cyanide-Halide Mixed Crystals
Cohesive and Thermal Properties of Sodium Cyanide-Halide Mixed Crystals
 
Discussion on Analysis of Effects of Short-Form Video Advertising on the Purc...
Discussion on Analysis of Effects of Short-Form Video Advertising on the Purc...Discussion on Analysis of Effects of Short-Form Video Advertising on the Purc...
Discussion on Analysis of Effects of Short-Form Video Advertising on the Purc...
 
Comparison of Glucose in Urine with Likening of Pigeons as Pets
Comparison of Glucose in Urine with Likening of Pigeons as Pets Comparison of Glucose in Urine with Likening of Pigeons as Pets
Comparison of Glucose in Urine with Likening of Pigeons as Pets
 
Non-unique Fixed Points of Self Mappings in Bi-metric Spaces
Non-unique Fixed Points of Self Mappings in Bi-metric Spaces Non-unique Fixed Points of Self Mappings in Bi-metric Spaces
Non-unique Fixed Points of Self Mappings in Bi-metric Spaces
 
Research on the Impact of Short-Form Video Advertising on Social Media on the...
Research on the Impact of Short-Form Video Advertising on Social Media on the...Research on the Impact of Short-Form Video Advertising on Social Media on the...
Research on the Impact of Short-Form Video Advertising on Social Media on the...
 
Can Perfume Allergy Cause Glycosuria?
Can Perfume Allergy Cause Glycosuria? Can Perfume Allergy Cause Glycosuria?
Can Perfume Allergy Cause Glycosuria?
 

Último

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Último (20)

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Analysis of Artificial Intelligence Techniques for Network Intrusion Detection and Intrusion Prevention for Enhanced User Privacy

  • 1. Asian Journal of Applied Science and Technology (AJAST) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018 315 | P a g e Online ISSN: 2456-883X Website: www.ajast.net Analysis of Artificial Intelligence Techniques for Network Intrusion Detection and Intrusion Prevention for Enhanced User Privacy Dr. Vinod Varma Vegesna Sr. IT Security Risk Analyst, The Auto Club Group, United States of America. Email: vinodvarmava@gmail.com Article Received: 30 July 2018 Article Accepted: 29 October 2018 Article Published: 30 December 2018 1. INTRODUCTION Intrusion Detection Systems are classified as Network IDS or Host IDS. The former intrusion detection evaluates internet traffic to identify non-licensed, unauthorized, as well as inexplicable network behavior. The Network IDS intercepts internet data packets utilizing span ports or connection taps to identify and flag suspicious behavior. It will not interfere with network activity as well as operates in the background. A server intrusion detection system (IDS) is hardware and strives to identify suspicious operations or irregular behavior mostly on a particular device [1-4]. It normally involves an agent working on every framework, noticing but also notifying the local OS. To monitor suspicious access, the system for intrusion detection employs predetermined signatures based on threat attributes. The HIDS furthermore appears to be playing a supplementary role. An intrusion detection could also be classified as either active or passive. Passive intrusion detection systems hardly monitor and analyze as well as alert the system administrators to suspicious behavior. This is now the admin’s obligation to take the appropriate measures. An active Intrusion Detection System, on the contrary hand, serves as an Intrusion Prevention System (IPS) [5]. It strives to avoid and address disputes engendered by intruding by performing the necessary activities following identification via checking. IDSs are also classified depending on their recognition logic, such as signature-based or anomaly-based intrusion prevention. A signature-based intrusion detection system works by detecting suspicious behavior by making comparisons of its features to a database of well-known signature attacks. The only disadvantage is that due to signature-based intrusion detection systems depend heavily on earlier known data, users are vulnerable to relatively new threats. Regardless of whether the threats are modified, the delay in the notification process allows malicious programs to access the system completely unnoticed. An anomaly-based intrusion detection system compares the attributes to a benchmark. The benchmark determines how suspicious the action is suspect and false-positive are indeed a major issue. The Mirai botnet threat on the DNS Server provider impacted Internet-of-Things (IoT) systems, causing numerous major online organizations including Spotify, Twitter, and Netflix to go offline. Invaders can remotely disable the security system but also its different versions, for instance, by using a spurious source IP address. It has additionally ABSTRACT With the rapid advancement of computer technology during the last couple of decades. Computer systems are commonly used in manufacturing, corporate, as well as other aspects of human living. As a result, constructing dependable infrastructures is a major challenge for IT managers. On the contrary side, this same rapid advancement of technology has created numerous difficulties in building reliable networks which are challenging tasks. There seem to be numerous varieties of attacks that affect the accessibility, authenticity, as well as secrecy of communications systems. In this paper, an in-depth and all-inclusive description of artificial intelligence methods used for the detection of network intrusions is discussed in detail. Keywords: Artificial intelligence, Network intrusion detection, Denial of service attack.
  • 2. Asian Journal of Applied Science and Technology (AJAST) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018 316 | P a g e Online ISSN: 2456-883X Website: www.ajast.net overlooked a significant amount of DDoS and DoS attempts. To address the shortcomings of conventional security protocols, an enhanced security mechanism known as the Intrusion Detection System (IDS) was developed. The inbound and outbound traffic is monitored for suspicious software by IDS. IDS can be categorized based on how it is implemented or the approach it uses to detect unusual behavior. IDS could be installed at stations to safeguard those from threat (Host-based IDS) as well as at the platform's entrance point to oversee packets that come and go for inappropriate activity in order to safeguard the entire infrastructure (Network-based IDS) (NIDS). As a matter of fact, a number of different methods, such as genetic, statistical mechanics, quantitative, and machine-learning methodologies, were employed to create an algorithm capable of detecting irregularities. An Intrusion Detection System is a collection of tools, methodologies, and resources intended to detect, evaluate, and notify unauthorized or unregulated network connections. The intrusion prevention component of the name is confusing because an IDS somehow doesn't detect malicious activities [6-11]. It works by detecting traffic activity that could or could not be an invasion. An intrusion detection system (IDS) is a powerful technology that could also decode as well as perceive traffic on the network and/or host operations. This information could include data packet assessment, the components of the gateway, and proxy server, as well as device application logs, local application logs, connectivity calls, internet data, etc. Besides that, an IDS frequently stores a database of well-known attack patterns and therefore can make comparisons of activity patterns, traffic, or behavior seen in the information it is tracking against such signatures to detect whenever a tight match in between signatures as well as recent or recent behavior happens [12]. At that juncture, the IDS could indeed issue alarm systems or notifications as well as perform multiple required actions such as closing down Internet access or particular data centers, trying to launch backtraces, as well as making other influential attempts to recognize intruders but also gather the evidence of with their questionable activities. Among the most frequent and dangerous threats is the denial of service (DOS). DOS attacks are intended to remotely disable numerous infrastructures for end customers. It consumes network capacity as well as loads this same framework with unwanted queries. As a result, DOS serves as a broad umbrella including all varieties of attacks aimed at consuming the network and computer assets. Yahoo became the initial target of a DOS attack in 2000 (Figure 1), but also DOS documented the first community invasion on the same date. DOS attacks are currently targeting web applications as well as websites on social media. From some other point of view, remote to local (R2L) threats are also a general concept including all sorts of threats that are intended to even have local right authorizations since some network components, such as file servers, are just available for locally located clients. There are multiple categories of R2L breaches, such as SPY and PHF, that intend to plan unauthorized use of network resources. In terms of gaining unauthorized entry to computer and network resource management, User to Root (U2R) breaches seek to change the suspect's appropriate access from regular user to root user, who seems to have full access to the internet and networking devices. The greatest difficulty would be that intruders are constantly innovating their own tools and methods for extracting any type of vulnerability. As a result, detecting all forms of attacks using a single standard alternative is incredibly difficult. As a result, IDS have become a crucial component of network safety. It is used to continuously monitor traffic and produce notifications whenever threats are
  • 3. Asian Journal of Applied Science and Technology (AJAST) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018 317 | P a g e Online ISSN: 2456-883X Website: www.ajast.net detected. IDS may be used to keep track of a particular device (host-based intrusion detection system) or even all traffic patterns (network - intrusion detection system) is the most popular type. There seem to be two kinds of IDS in summary (anomaly base or misuse base). An anomalous intrusion detection system is used to recognize threats using previously documented acceptable behavior. As a result, it relates actual current data packets to previously documented regular traffic; the above category of intrusion detection is extensively utilized because it can identify new categories of security breaches. However, from some other point of view, it records the maximum standard of false positive alarms, implying that a significant number of the regular data packet are misidentified as attack packets. Fig. 1: Denial of service attack (DOS) Nevertheless, a misappropriation intrusion detection system is employed to identify threats using a database of attack patterns. It does not generate false alarms, however, it is exposed to fresh types of attacks (new signatures). 2. IMPORTANT WORKS TO THE KDD DATASET This part comprises works that are associated with employing the KDD data set to incorporate machine learning techniques. It moreover provides a short introduction to the different machine learning techniques as well as demonstrates how and why the KDD dataset can be used to test and evaluate different types of machine learning techniques. The classifier selection model carried out a comprehensive examination of both the intrusion detection system and the KDD dataset. For attack detection systems, the KDD dataset is used as a standard business dataset. It was noted that such an SVM algorithm necessitates a significant time for training, which limits its functionality. 2.1. KDD Dataset Preprocessing and Investigation The KDD dataset provided a thorough comprehension of many attack behaviors while also being extensively utilized in numerous places for evaluating and testing intrusion prevention methodologies. The KDD dataset had first been made available to the public in 1999 by MIT Lincoln labs at the University of California. This has 4898431 instances and 41 attributes. The KDD dataset must have been sourced into SQL Server 2008 in order to
  • 4. Asian Journal of Applied Science and Technology (AJAST) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018 318 | P a g e Online ISSN: 2456-883X Website: www.ajast.net configure multiple mathematical measured values, such as allocation of instance records, threat forms, as well as occurrence proportions. The stages inside the KDD procedure are shown in Figure 2. Fig. 2: Process levels in a typical KDD process 2.2. Machine learning techniques A. Pattern classification Pattern recognition is indeed the intervention of taking original information as well as performing activities on data types. To overcome different pattern recognition difficulties, both supervised and unsupervised learning models may be employed [13-15]. This is centered on employing the training information to generate a feature, where every other training data includes a couple of input vectors as well as output vectors (i.e. the class label). To start creating classifiers, the training assignment would be to calculate the distance between two points between input-output examples. After the model is implemented, this could categorize unspecified illustrations into previously understood labels. The process in a pattern classification technique is depicted in Figure 3. One machine learning technique may be employed to solve intrusion prevention difficulties. Machine learning methods were employed to address these issues in most of the existing research works conducted. B. K-nearest neighbor K-nearest neighbor (k-NN) (Figure 4) seems to be a simple as well as a conventional probabilistic methodology for sample classification. This calculates the estimated intervals among numerous locations upon these input variables before allocating the unidentifiable position towards the class of its K-nearest neighbors. k is an essential property in the creation of a k-NN classification model, but also various k values result in various performance levels.
  • 5. Asian Journal of Applied Science and Technology (AJAST) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018 319 | P a g e Online ISSN: 2456-883X Website: www.ajast.net If k is very big, the neighbors in use for estimation will necessitate a long time to classify and therefore will affect predictive performance. In contrast to the inductive learning method, k-NN is known as example-based learning. As a result, it lacks the training phase and instead searches for instances of input variables as well as classifies new incidents. As a result, k-NN trains the instances in-line and helps determine the k-nearest neighbor of the new sample. Fig. 3: Steps in pattern classification C. Support vector machines Support vector machines (SVM) map the input matrix into a feature space with higher dimensions before determining the best partitioning hyper-plane in that space. Furthermore, the partitioning hyper-plane, which is ascertained by support vectors instead of by the complete training samples, is exceedingly resistant to outliers. An SVM classifier, in specific, is intended for classification tasks. That would be, to isolate a collection of training vectors from two distinct categories. It is crucial to remember that perhaps the support vectors are indeed the training sample size closest to the decision function. The SVM furthermore includes a user-specified attribute known as the penalty factor. It enables individuals to trade off the amount of incorrectly classified samples versus the size of a decision boundary. Figure 5 depicts the basic idea behind SVM. Data Collection Feature Selection Model Selection Training Classification Evaluation of Classifier Start End
  • 6. Asian Journal of Applied Science and Technology (AJAST) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018 320 | P a g e Online ISSN: 2456-883X Website: www.ajast.net Fig. 4: Schematic K-nearest neighbor (k-NN) Classification Methodology Fig. 5: Functional Perception of SVM START Read value of K, Type of Distance (D), and Test Data Find the K nearest neighbours (D) to the Test Data Set maximum label class of K to test data END DATA SVM CLASS 1 CLASS 3 CLASS 2 CLASS 4
  • 7. Asian Journal of Applied Science and Technology (AJAST) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018 321 | P a g e Online ISSN: 2456-883X Website: www.ajast.net D. Artificial neural networks The neural network is a collection of data processing elements created to resemble the neural connections inside the brain. The multilayer perceptron (MLP) neural network structure is broadly utilized in numerous problems involving pattern recognition. An MLP infrastructure is made up of three sections: an input layer with a collection of sensory nodes as input neurons, a single or maybe more hidden layers of computing nodes, as well as an output layer of computing nodes. Every connectivity does have a scalar weight that is modified during the training stage. Furthermore, the back-propagation training method is frequently used to train an MLP, also referred to known as a backpropagation neural network. To start with, random weights are allocated somewhere at the start of training. This same methodology whereupon accomplishes weight tuning to determine which hidden layers description would be most efficient at minimizing classification error. The framework of an artificial neural network is depicted in Figure 6. Fig. 6: The framework of an artificial neural network E. Self-organizing maps An unsupervised competitive learning algorithm trains a self-organizing map (SOM) that is a self-organization procedure. Fig. 7: Self-organizing maps SOM aims to minimize the layer of complexity of visualization techniques. SOM, in other words, developments, and groupings of high-dimensional input variables upon a low-dimensional visualized map, typically two Output Lattice Weight Input X1 X2 Xn Y1 Y2 Y3 NEURONS Input Value 1 Input Value 2 Input Value n Output Value 1 Output Value 2 Output Value 3
  • 8. Asian Journal of Applied Science and Technology (AJAST) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018 322 | P a g e Online ISSN: 2456-883X Website: www.ajast.net dimensions for visualization. This is typically composed of an input layer and a Kohonen layer that is a double configuration of neurons that maps n-dimensional input to two dimensions. Kohonen's SOM assigns a fair representation result for each of the input variables. The system locates the node that is nearest to every training iteration as well as continues to move the winner node that is the neuron with the smallest route to the training iteration. On a two-dimensional map, SOM maps comparable input vectors with identical or comparable output variables (Figure 7). As a result, after training, the output would then self-organize into an ordered map, as well as output units of equivalent weights would be positioned in an adjacent manner. F. Decision trees A decision tree (Figure 8) categorizes a dataset by making a series of decision making, with the decision process influencing the subsequent decision. A tree framework emphasizes such a decision sequence. A sample is categorized from root to a suitable end leaf node, with every end leaf node representing a categorization group. Fig. 8: Architecture of a Decision tree Every node has been assigned the features of the extracts, as well as the cost of every branch corresponds to the features. CART is an established program for creating classification trees (Classification and Regressing Trees). A classification tree is a tree structure with a spectrum of the distinct (representational) target class, although a tree has a variety of sustained (arithmetic) attributes. G. Naive bayes networks We understand the mathematical correlations as well as the correlation among state variables in several instances. Nevertheless, expressing the stochastic interactions between these variables may be challenging. In another phrase, the background experience of the framework is merely the reality that one parameter may impact the other. To execute arbitrary code this correlation structure or casual interdependences among a problem is an actually stochastic process, a probability-based graph model known as Nave Bayesian Networks may be used (NB). The framework offers a response to issues such as "What is the likelihood that this is a specific kind of attack provided
  • 9. Asian Journal of Applied Science and Technology (AJAST) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018 323 | P a g e Online ISSN: 2456-883X Website: www.ajast.net a few identified security events?" while using the probability density equation. A directed acyclic graph (DAG) is commonly used to depict the framework of an NB, in which each uniquely identifies each of the state variables so each connection embeds the impact among one node on the other. 3. SOFT COMPUTING APPLICATION FOR IDS Even though most infringements could be detected by specific criteria that measure user behavior as well as audit documents, numerous IDSs were developed by utilizing known threat as well as misappropriation structures [16-19]. Misappropriation detection systems as well as anomalous detection systems seem to be the two types of intrusion detection systems. Misappropriation-recognizing systems can monitor attacks using well-known potential attacks. Abnormality monitoring systems utilize user data to identify anomalies; whatever difference from standard usage patterns is regarded as an invasion. Figure 9 depicts the fundamental categorizations of intrusion detection technologies. Fig. 9: Intrusion Detection System Categories To improve the effectiveness of IDS, software cybersecurity experts are attempting to apply computational intelligence methodologies to IDS. Soft computing is the combination of research methods designed to simulate and facilitate real-world solutions to issues that cannot be mathematical equations patterned or are far more difficult to simulate. Soft computing is a broad term for such a collection of tuning and processing methods that take advantage of sensitivity for inaccuracy, lack of certainty, partial truth, and approximate solution to achieve robustness and small expenses. The primary objective of IDS investigators would be to create intellectual, flexible, and premium software competent mainly in real-time intrusion prevention. To decrease human interference, numerous Artificial Intelligence (AI) methodologies were employed to computerize the intrusion detection method. In a broad sense, the methodologies used in IDS are built on machine learning. In summary, Artificial Neural Networks (ANNs) and Genetic Algorithms (GAs) are employed in the IDS execution, with Data Analysis, Adaptive Control, and Probability-based Reasoning being added methodologies to enhance that strategy. Intrusion Detection System Analysis Method Source of Data Misuse IDS Anomaly IDS Host-based IDS Network-based IDS
  • 10. Asian Journal of Applied Science and Technology (AJAST) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018 324 | P a g e Online ISSN: 2456-883X Website: www.ajast.net 3.1. Artificial Neural Networks Artificial Neural Networks (ANN), also known as Neural Networks (NN), are computational models derived from biological neural networks (neurons) that allocate different qualities to interconnection among both components inside the neural network in the same way that circuit probabilities for neurons have been developed at conjunction with the local in accordance with their frequency of activation. The greater the frequency with which a neighboring nerve cell activates, the greater the electric fields there at neural connections of the receptors which respond toward this configuration. Components in neurons that takes inputs from neighboring components have greater weight. It is made up of an interconnection of interconnected neurons that process information using only a connectionist approach to data processing. Often these ANNs are adaptive systems that modify their framework depending on external or inner data that moves through the system during the process of learning. Neurons, more in realistic terms, are quasi-statistical information methods. They have the ability to identify patterns in the information or even to model complex relationships among inputs and outputs. The neural network models encounter, while complex and still a little intriguing could be used to address a variety of classifications and predictions, including vulnerability scanning. The concept of using computational methods, especially ANN, inside the implementation of intrusion detection systems is to incorporate an intelligent system in the technology that enables the creation of revealing dormant patterns in normal and unusual connection audit logs and generalizing the trends to fresh (and distinguishable) connection records of the identical category. The brilliance of neural network models in vulnerability scanning is that they don't require annotations or perhaps even rules. Immediately begin trying to feed model parameters about system or host-based occurrences to a neuron, and it'll take care of the rest. While some learning time will be required, artificial neural networks are quite well adapted to quickly comprehending new structures of invasion. The computational intelligence methodology has existed for a long time, and it seems probable that it will become increasingly widely used or depended on in vulnerability scanning within the coming years as dependence on signature verification declines. Numerous forms of ANN can be used for categorization, estimation, cluster analysis, correlation, and other purposes. A forward feed is the initial and undoubtedly most basic type of artificial neural system that was indeed the ANN. In this system, data goes only across the input layers to the output units, passing across any hidden neurons. In the backpropagation neural training algorithm there seem to be no iterations or branching in the network that is frequently utilized in the classification task. Cyber-attack identification is a classification task in the sense that both computer and network data are categorized as invasion or regular use. A feed-forward ANN's capacity to comprehend intelligent dynamical input data is one of its advantages for text categorization. The ANN understands fingerprint trends of computer security and regular utilization operations from training data and then applies even these fingerprint trends to categorize operations in test data as an attack or regular use. A forward feed that is one or more hidden units of processing elements but one output unit of processing elements constitutes ANN. Computation units are interconnected across layers but not among them. A feed-forward ANN with input variables, one hidden neuron of four processing elements, and one
  • 11. Asian Journal of Applied Science and Technology (AJAST) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018 325 | P a g e Online ISSN: 2456-883X Website: www.ajast.net output unit of two processing elements that are hyperlinked. Every input is linked to one of the hidden neurons, and each hidden unit is linked to one of the output units. Every relationship is connected with a weighting factor. 3.2. Genetic Algorithm The Genetic algorithm (GA) is a powerful search technique used to determine precisely or estimate solutions for optimization and searching difficulties. General search algorithms include evolutionary algorithms. Evolutionary algorithms are indeed a subclass of evolutionary computation also recognized as genetic algorithms that employ biology methodologies including hereditary, genetic variation, selection, and crossover also called recombination. A genetic algorithm's method usually starts with either a randomly chosen community of chromosomes. Such genomes constitute a challenge that must be addressed. Various units of every chromosome are embedded as a bit stream, character types, or numerals based on the original problem characteristics. Such locations, known as genes, are transformed at random inside a distance during evolution. A population refers to a group of genes throughout an evolutionary stage. Every chromosome's goodness is determined by calculating using an iterative algorithm. During the assessment, the two basic operators crossover and mutation are employed to replicate species regeneration as well as mutagenesis. The biggest and strongest genes are prioritized in the shortlisting of genetic material for continued existence and pairing. To describe a traditional evolutionary algorithm, two items must be characterized: (i) A biological depiction of the initial solution; and (ii) A fitness value for assessing the computational domain. The solution is commonly represented as an arrangement of the bit stream. Numerous categories and frameworks of arrays may be used in the same way. The primary benefit of these biological characterizations would be that their components have been conveniently associated due to their predefined length, which allows for simple crossover probability. Arbitrary length characterizations can also be employed but the execution of crossover is much more complicated in this particular instance. Genetic algorithms investigate tree-like characterizations, whereas evolutionary programming investigates graph-form representations. The fitness function has been defined over genetic depiction and is used to assess the effectiveness of the characterized solution. The fitness function has always been impacted by the situation. In the knapsack problem, for example, we would like to achieve the highest possible price for objects we are able to fit into a knapsack with a degree of permanence. A sequence of bits could be used to symbolize a solution, with every bit representing objects and the significance of the bit (0 or 1) representing whether or not that particular item is in the knapsack. Because the length of items could exceed the carrying capacity of the knapsack when not that kind of interpretation is accurate. If the interpretation is legitimate, the fitness of the solution is the average of the values of all items in the knapsack, else it is 0, in certain cases. A quantitative study was carried out in the form of a science-based publishing lookup for particular matter-related terms to provide an overall picture of literary works trends. Every phrase was searched in conjunction with the phrase "intrusion detection" to limit the outcomes to simply the relevant field. Due to its easiness and flexibility, Google Scholar was frequently employed to conduct academic publication lookups. Contingent on the lookup priorities, the total number of articles with the exception of references as well as patent applications has been
  • 12. Asian Journal of Applied Science and Technology (AJAST) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018 326 | P a g e Online ISSN: 2456-883X Website: www.ajast.net documented. The primary objective of such study findings is to offer an overview of current developments in an understandable manner. 4. IMPLEMENTING AI-BASED INTRUSION DETECTION Because of the volume of private information which moves across interconnections, anomaly detection has emerged as a leading research as well as concern issue in the modern environment. A variety of Machine Learning algorithms are available to detect anomalies. For intrusion detection systems, standard methods are commonly used, however, a mix of various learning techniques should be employed. In recent times, fusion or ensemble learning methods have also been employed. These methodologies are utilized in conjunction with a classification model. The classifier determines to see if an internal user belongs to a negative or positive linkage. Pattern Classification is a predominant machine learning approach that may be employed for the intrusion detection system. Pattern classification could be accomplished through both supervised and unsupervised methods. A training set of data is used to learn a feature that produces an input and a result matrix in supervised learning. The feature builds a classification model that can convert unidentified instances into established classifiers. Neural networks (NNs) may be employed to create accounts of software behavior and endeavor to differentiate between both abnormal and malicious software behavior. The primary objective of using NNs for Intrusion Prevention is that they should be able to transfer insufficient information and distinguish between both suspicious as well as secure connections. An ANN is made up of processing elements, and otherwise access points, and the interconnection that links up them. The weight of any interaction between two units is employed to ascertain how often each unit affects another. A neural network accomplishes a representation through one collection of values designated to the input neurons to some other collection of values by allocating a stimulation towards each input data and enabling the operations to continue to spread it through the system retrieved from the output nodes. As demonstrated above, a traditional feed-forward multi-layer training algorithm principle may be employed to generate a system for intrusion detection. Backpropagation networks are also employed satisfactorily in the detection of network intrusions because they are in use for learning, which allows the IDS to construct and discover profile information of unusual behaviors. To transform the information transferred from and to the defendant all through telnet conversations, network sniffing information should be first accessed. Alternatively, as the very first outcome, the overall amount of search terms constitutes. The search terms are chosen from a which was before the line-up. Preferably, this number might be proportional to the likelihood of such a threat during a session. Such search term numbers are then analyzed in two forms by neural networks. Each neural network estimates the enhanced prior distribution of a threat in a session, while the second attempts to categorize attack patterns to generate a threat identity. At first, 58 search terms from a dataset of key phrases IDS which thus identify suspected behavior and well-known threats were used. Search term collection was indeed accomplished for threat code download, threat preparedness, the real break-in, in which an adventitious root shell was frequently formed, as well as threats carried out after obtaining root access. In addition to the 58 established search terms, 31 new search terms have been appended. To
  • 13. Asian Journal of Applied Science and Technology (AJAST) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018 327 | P a g e Online ISSN: 2456-883X Website: www.ajast.net pick alike search terms and channel configuration again for identification neurons, a multi-layer perceptron neural classification model was employed to perform a cross-validation of tenfold on the learning algorithm. Weight intensity trimming was used to pick search terms for connections without hidden units and extraction of features. With 30 keywords, high detection result was achieved, as well as a low false alarm rate, although, with very few or even more search terms, the detection accuracy was lowered. A few keywords were assigned highly positive weights as they were frequently discovered throughout threats, whereas others were assigned negative weights since it was determined that they had been utilized frequently in regular sessions. As a result, many false alarms have been avoided as a number of these search terms are also employed in regular sessions. A genetic algorithm is a type of mathematical model that relies on evolution and natural selection. To transform the issue into a particular domain pertaining to the framework, the genetic algorithm requires a copy of the gene database schema and develops the gene using selection, rearrangement, and consensual operators. Simple internet connectivity standards can be defined using a genetic algorithm. Such regulations will prevent the passing of commonly identified malware activity. The above rules are generally contained as if-then statements. These characterize the genetic traits in the chromosomes, to which preceding illustrations will indeed be implemented and analyzed. An appropriate rule is prioritized, while an inaccurate rule is excluded from consideration. The optimal set is again developed from this population. Crossover and mutation operators are used to drive transformation. Due to the evaluation function's effectiveness, the succeeding population is biased toward regulations that complement intrusion regulations. Throughout this context, the Genetic Algorithm may be used to create simple network capacity. Such rules have been developed primarily to distinguish between typical and abnormal internet traffic behavior. Such standards are saved in that because if situation else activity format, ensuring that when the connectivity detects any abnormal behavior characterized by the if rules, this could take the necessary steps. The data transmission utilized in this case is a pre-classified data set that can distinguish between regular and abnormal behavior. All the above rules serve as the gene foundation for the Genetic Algorithm. As a result, each gene has 57 genetic traits. If an (unusual behavior) principle is discovered to be true, the respective gene will receive an additional; or perhaps (normal behavior), a penalty would be applied. In addition, several wild cards are included in the chart and thus are assigned a value of -1. Such wild cards symbolize a particular variety of values in a rule, that also represents an internet block. Following this, the Genetic Algorithm begins with something like a random manner with random selection rules. Crossover and mutation are then utilized to develop the community. Fuzzy logic works best because once confronted with difficult issues. It is made up of a fuzzy assortment of elements, the participation of which can range between 0 and 1. It lacks the sharp value found in Boolean sets, such as 0 and 1. The elements' participation can be accurately encapsulated. Rough c-means categorize an item into relatively low estimation, boundary, and negative region, whereas fuzzy c-means include a component over 0 to 1. This also will split the information into two categories: lower estimation and boundary. The symbolic valued attributes should be first converted to binary numbers valued attributes during the initial stage. The characteristics were therefore sequentially scaled to every range. The test dataset would then be clustered, and fuzzy inference is used to start generating sets of data that progressively refined rules. The very first step involves applying Data
  • 14. Asian Journal of Applied Science and Technology (AJAST) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018 328 | P a g e Online ISSN: 2456-883X Website: www.ajast.net Mining Techniques to a TCP data stream in order to obtain parameters that have not been specifically mentioned in the packet. These variables are critical in distinguishing between ordinary and abnormal behavior. In a nutshell, it is the creation of variables that are critical for providing fuzzy input data. The origin and destination IP addresses, destination port, TCP control fragments, as well as other data, are derived. The IP source, IP destination, and specific port fields are combined to form a cumulative key. After that, the identifier is employed to generate numbers as well as other statistical approaches from data mining algorithms. Again when the extraction step is finished, it generates fuzzy values utilizing the previous input data and calculates the range within which they will fluctuate. Self-taught Learning (STL) is a deep learning method that comprises two categorization stages. Initially, Unsupervised Feature Learning is used to understand a good feature depiction from a massive selection of unlabeled data (UFL). This learned depiction is then implemented to data points and employed for the classification problem in the second phase. Even though the unlabelled data and labeled data may originate from different distribution functions, there should be some correlation between them. 5. DISCUSSIONS The Internet is an important component of everyday life, and it can be widely employed in a wide range of sectors like banking, information exchange, recreation, education, and personnel day-to-day actions, among others. This same world wide web, in specific, has been employed as a significant component of commercial operations to access the information. The Internet has provided a variety of methods for attempting to attack a software system. Increasing numbers of businesses are becoming exposed to Internet threats and infringements. An invasion or intrusion could be characterized as whatever collection of actions that attempt to undermine the security requirements. Accessibility, Authenticity, Secrecy, Transparency, and Confidence are significant security priorities. Probing, Denial of Service (DoS), User to root (U2R), and Remote to user (R2L) breaches are the four types of invasions of privacy. An amount of anti-intrusion systems have been developed to prevent a huge amount of Internet attacks. The research discovered that an intrusion detection system (IDS) is a member of six anti-intrusion structures, which include preventative measures, pre-emption, deterrence, deflection, recognition, and defensive measures. The ideal recognition of an invasion represents the most significant of such elements. 6. CONCLUSION In recent years, one of the most concerning issues of this creation is the network invasion. This study observed that both commercial and personal computers hold a significant amount of information, thereby the security and privacy of these data are essential for users in networks that work with classified documents. Also, this paper briefly explains four main machine-learning techniques including neural networks, genetic algorithms, and fuzzy logic, how well these methodologies could be incorporated with IDS to enhance the identification of unusual as well as harmful behavior, what rules are constructed to categorize network activities, and what criteria these categories are centered. References [1] Ahmed, M., Naser Mahmood, A., Hu, J. A survey of network anomaly detection techniques. Journal of Network and Computer Applications. 2016; 60: 19–31.
  • 15. Asian Journal of Applied Science and Technology (AJAST) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018 329 | P a g e Online ISSN: 2456-883X Website: www.ajast.net [2] D. (Daphne) Yao, X. Shu, L. Cheng, S. J. Stolfo, E. Bertino and R. Sandhu, "Anomaly Detection as a Service: Challenges Advances and Opportunities", Synth. Lect. Inf. Secur. Privacy Trust, vol. 9, no. 3, pp. 1-173, Oct. 2017. [3] Anil Lamba, “Uses of different cyber security service to prevent attack on smart home infrastructure", International Journal for Technological Research in Engineering, vol. 1, iss. 11, pp. 5809-5813, 2014. [4] Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K. Network Anomaly Detection: Methods, Systems and Tools. IEEE Communications Surveys & Tutorials. 2014; 16(1): 303–336. [5] M. Solanki and V. Dhamdhere, "Intrusion Detection Technique using Data Mining Approach: Survey", Int. J. Innov. Res. Comput. Commun. Eng. (An ISO, vol. 3297, no. 11, 2014. [6] Anil Lamba, “A study paper on security related issue before adopting cloud computing service model”, International Journal for Technological Research in Engineering, vol. 3, iss. 4, pp. 5837-5840, 2015. [7] K. Nian, H. Zhang, A. Tayal, T. Coleman and Y. Li, "Auto insurance fraud detection using unsupervised spectral ranking for anomaly", J. Financ. Data Sci., vol. 2, no. 1, pp. 58-75, Mar. 2016. [8] Dartigue, C., Jang, H.I., Zeng, W. A new data-mining based approach for network intrusion detection. In Seventh Annual Communication Networks and Services Research Conference. 2009; 372–377. [9] Anil Lamba, “Mitigating zero-day attacks in IoT using a strategic framework", International Journal for Technological Research in Engineering, vol. 4, iss. 1, pp.5711-5714, 2016. [10] R. Kaur and S. Singh, "A survey of data mining and social network analysis based anomaly detection techniques", Egypt. Informatics J., vol. 17, no. 2, pp. 199-216, Jul. 2016. [11] N. Görnitz Nicogoernitz, K. Rieck Konradrieck and U. Brefeld, Toward Supervised Anomaly Detection Marius Kloft, 2013. [12] Anil Lamba, “Identifying & mitigating cyber security threats in vehicular technologies", International Journal for Technological Research in Engineering, vol. 3, iss. 7, pp. 5703-5706, 2016. [13] Kumar, K., Batth, J.S. Network Intrusion Detection with Feature Selection Techniques using Machine-Learning Algorithms. International Journal of Computer Applications. 2016; 150(12): 1–13. [14] Kurose, J.F., Ross, K.W. Computer Networking: A Top-Down Approach (6th Edition). Pearson, 2012. [15] C. C. Aggarwal, "Supervised Outlier Detection" in Outlier Analysis, New York, NY: Springer New York, pp. 169-198, 2013. [16] Mahesh, B. Machine Learning Algorithms – A Review. International Journal of Science and Research on classification algorithms. International journal of advanced research in computer and communication engineering. 2015; 4(6): 446–452. [17] Pal Singh, A., Deep Singh, M. Analysis of Host-Based and Network-Based Intrusion Detection System. International Journal of Computer Network and Information Security, 2014; 6(8): 41–47.
  • 16. Asian Journal of Applied Science and Technology (AJAST) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 315-330, Oct-Dec 2018 330 | P a g e Online ISSN: 2456-883X Website: www.ajast.net [18] Anil Lamba, “A role of data mining analysis to identify suspicious activity alert system”, International Journal for Technological Research in Engineering, vol. 2, iss. 3, pp. 5814-5825, 2014. [19] A. Zimek and E. Schubert, "Outlier Detection" in Encyclopedia of Database Systems, New York, NY:Springer New York, pp. 1-5, 2017.