An Intelligent System for Securing Network From Intrusion Detection and Prevention of Phishing Attack Using Machine Learning Approaches

2021 ◽  
pp. 193-212
Author(s):  
Sumit Banik ◽  
Sagar Banik ◽  
Anupam Mukherjee

With winning advances like catch of Things, Cloud Computing and Social Networking, mammoth proportions of framework traffic associated information area unit made Intrusion Detection System for sort out security suggests the strategy to look at partner unapproved access on framework traffic. For Intrusion Detection System we are going to call attention to with respect to Machine Learning Approaches. it's accomplice rising field of enrolling which can explicitly act with a decent arrangement of less human affiliation. System gains from the data intentionally affirmation and makes perfect objectives. all through this paper we keep an eye on zone unit going to separated styles of Machine Learning pulls in near and had done relative examination in it. inside the last we keep an eye on territory unit going to foreseen the idea of hybrid development, that might be a blend of host principally and framework based for the most part Intrusion Detection System.


Author(s):  
Zakir Hossain ◽  
Md. Mahmudur Rahman Sourov ◽  
Musharrat Khan ◽  
Parves Rahman

Author(s):  
Derya Yiltas-Kaplan

This chapter focuses on the process of the machine learning with considering the architecture of software-defined networks (SDNs) and their security mechanisms. In general, machine learning has been studied widely in traditional network problems, but recently there have been a limited number of studies in the literature that connect SDN security and machine learning approaches. The main reason of this situation is that the structure of SDN has emerged newly and become different from the traditional networks. These structural variances are also summarized and compared in this chapter. After the main properties of the network architectures, several intrusion detection studies on SDN are introduced and analyzed according to their advantages and disadvantages. Upon this schedule, this chapter also aims to be the first organized guide that presents the referenced studies on the SDN security and artificial intelligence together.


2019 ◽  
Vol 3 (1) ◽  
pp. 1-4 ◽  
Author(s):  
Razan Abdulhammed ◽  
Miad Faezipour ◽  
Abdelshakour Abuzneid ◽  
Arafat AbuMallouh

2019 ◽  
Vol 130 ◽  
pp. 01011
Author(s):  
Halim Frederick ◽  
Astuti Winda ◽  
Mahmud Iwan Solihin

Petrol and diesel engine have a significantly different way to convert chemical energy into mechanical energy. In this work, the intelligent system approach is used to automatically identify the type of engine based on the sound of the engine. The combination of signal processing and machine learning technique for automatic petrol and diesel engine sound identification is presented in this work. After a signal preprocessing step of the engine sound, a Fast Fourier Transform (FFT)-based frequency characteristic modelling technique is applied as the feature extraction method. The resulting features extracted from the sound signal, in the form of frequency in the FFT matrix, are used as the inputs for the machine learning, the Support Vector Machine (SVM), step of the proposed approach. The experiment of FFT with SVM-based diesel and petrol engine sound identification has been carried out. The results show that the proposed approach produces a good accuracy in the relatively short training time. Experimental results show the training and testing accuracy of 100 % and 100 % respectively. They confirm the effectiveness of the proposed intelligent automatic diesel and petrol engine sound identification based on Fast Fourier Transform (FFT) and Support Vector Machines (SVMs).


2020 ◽  
Vol 26 (11) ◽  
pp. 1422-1434
Author(s):  
Vibekananda Dutta ◽  
Michał Choraś ◽  
Marek Pawlicki ◽  
Rafał Kozik

Artificial Intelligence plays a significant role in building effective cybersecurity tools. Security has a crucial role in the modern digital world and has become an essential area of research. Network Intrusion Detection Systems (NIDS) are among the first security systems that encounter network attacks and facilitate attack detection to protect a network. Contemporary machine learning approaches, like novel neural network architectures, are succeeding in network intrusion detection. This paper tests modern machine learning approaches on a novel cybersecurity benchmark IoT dataset. Among other algorithms, Deep AutoEncoder (DAE) and modified Long Short Term Memory (mLSTM) are employed to detect network anomalies in the IoT-23 dataset. The DAE is employed for dimensionality reduction and a host of ML methods, including Deep Neural Networks and Long Short-Term Memory to classify the outputs of into normal/malicious. The applied method is validated on the IoT-23 dataset. Furthermore, the results of the analysis in terms of evaluation matrices are discussed.


Electronics ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 219 ◽  
Author(s):  
Sweta Bhattacharya ◽  
Siva Rama Krishnan S ◽  
Praveen Kumar Reddy Maddikunta ◽  
Rajesh Kaluri ◽  
Saurabh Singh ◽  
...  

The enormous popularity of the internet across all spheres of human life has introduced various risks of malicious attacks in the network. The activities performed over the network could be effortlessly proliferated, which has led to the emergence of intrusion detection systems. The patterns of the attacks are also dynamic, which necessitates efficient classification and prediction of cyber attacks. In this paper we propose a hybrid principal component analysis (PCA)-firefly based machine learning model to classify intrusion detection system (IDS) datasets. The dataset used in the study is collected from Kaggle. The model first performs One-Hot encoding for the transformation of the IDS datasets. The hybrid PCA-firefly algorithm is then used for dimensionality reduction. The XGBoost algorithm is implemented on the reduced dataset for classification. A comprehensive evaluation of the model is conducted with the state of the art machine learning approaches to justify the superiority of our proposed approach. The experimental results confirm the fact that the proposed model performs better than the existing machine learning models.


Sign in / Sign up

Export Citation Format

Share Document