CSEIT2062166 | Accepted : 01 May 2020 | Published : 05 May 2020 | May-June-2020 [ 6 (3) : 61-71 ] International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2020 IJSRCSEIT | Volume 6 | Issue 3 | ISSN : 2456-3307 DOI : https://doi.org/10.32628/CSEIT2062111 61 Intrusion Detection System using Machine Learning Jayesh Zala, Aditya Panchal, Advait Thakkar, Bhagirath Prajapati, Priyanka Puvar Computer Engineering Department, A. D. Patel Institute of Technology, Karamsad, Gujarat, India ABSTRACT Intrusion Detection System (IDS) is a tool, or software application, that monitors network or system activity and detects malicious activity occurring. The protected evolution of the network must incorporate new threats and related approaches to avoid these threats. The key role of the IDS is to secure resources against the attacks. Several approaches, methods and algorithms of the intrusion detection help to detect a plethora of attacks. The main objective of this paper is to provide a complete system to detect intruding attacks using the Machine Learning technique which identifies the unknown attacks using the past information gained from the known attacks. The paper explains preprocessing techniques, model comparisons for training as well as testing, and evaluation technique. Keywords : Intrusion Detection System, Host, Network, Detection Techniques, Support vector machine, Machine Learning, NIDS, HIDS. I. INTRODUCTION The Network Intrusion Detection System (NIDS) are software programs, or hardware systems that monitor and evaluate activities in a computer network for the purpose of detecting malicious behaviour and the Firewall is designed to monitor & filter the network traffic that is coming into or going out of the network. Since the frequency of attacks in the network has significantly risen, the intrusion detection program has been a required enhancement to most enterprises' protection infrastructure. With the growing edge of technology, the use of the internet is increasingly used and with that, the security of the internet is also a concern for organizations around the world. To deter intruders from securing credential records. To protect the data Web Firewall, the network infrastructure and Internet communications are protected by encrypting, authenticating and virtual private networks (VPN). Intrusion identification is a fairly recent addition to a number of security technologies. An intrusion requires any unauthorized access to or malicious use of the information services. A real- object is an attacker or an intruder trying to find ways to gain unauthorized access to information, harm or engage in other malicious activities. IDS is a technology that enhances network protection and protects the organization's records. The IDS assists the network administrator to track unauthorized network behaviour and alerts the administrator to the data being protected by taking necessary action. Intrusion Detection System (IDS) is a protection system that tracks and analyzes the network traffic and computer networks for possible hostile attacks from outside the organization, and for system failure or attacks within the organization. Intrusion mitigation allows businesses to secure their networks from attacks arising from increasing