CSEIT2062166 | Accepted : 01 May 2020 | Published : 05 May 2020 | May-June-2020 [ 6 (3) : 61-71 ]
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
© 2020 IJSRCSEIT | Volume 6 | Issue 3 | ISSN : 2456-3307
DOI : https://doi.org/10.32628/CSEIT2062111
61
Intrusion Detection System using Machine Learning
Jayesh Zala, Aditya Panchal, Advait Thakkar, Bhagirath Prajapati, Priyanka Puvar
Computer Engineering Department, A. D. Patel Institute of Technology, Karamsad, Gujarat, India
ABSTRACT
Intrusion Detection System (IDS) is a tool, or software application, that monitors network or system activity and
detects malicious activity occurring. The protected evolution of the network must incorporate new threats and
related approaches to avoid these threats. The key role of the IDS is to secure resources against the attacks. Several
approaches, methods and algorithms of the intrusion detection help to detect a plethora of attacks. The main
objective of this paper is to provide a complete system to detect intruding attacks using the Machine Learning
technique which identifies the unknown attacks using the past information gained from the known attacks. The
paper explains preprocessing techniques, model comparisons for training as well as testing, and evaluation
technique.
Keywords : Intrusion Detection System, Host, Network, Detection Techniques, Support vector machine, Machine
Learning, NIDS, HIDS.
I. INTRODUCTION
The Network Intrusion Detection System (NIDS) are
software programs, or hardware systems that monitor
and evaluate activities in a computer network for the
purpose of detecting malicious behaviour and the
Firewall is designed to monitor & filter the network
traffic that is coming into or going out of the network.
Since the frequency of attacks in the network has
significantly risen, the intrusion detection program
has been a required enhancement to most enterprises'
protection infrastructure.
With the growing edge of technology, the use of the
internet is increasingly used and with that, the
security of the internet is also a concern for
organizations around the world. To deter intruders
from securing credential records. To protect the data
Web Firewall, the network infrastructure and Internet
communications are protected by encrypting,
authenticating and virtual private networks (VPN).
Intrusion identification is a fairly recent addition to a
number of security technologies.
An intrusion requires any unauthorized access to or
malicious use of the information services. A real-
object is an attacker or an intruder trying to find ways
to gain unauthorized access to information, harm or
engage in other malicious activities. IDS is a
technology that enhances network protection and
protects the organization's records. The IDS assists the
network administrator to track unauthorized network
behaviour and alerts the administrator to the data
being protected by taking necessary action. Intrusion
Detection System (IDS) is a protection system that
tracks and analyzes the network traffic and computer
networks for possible hostile attacks from outside the
organization, and for system failure or attacks within
the organization.
Intrusion mitigation allows businesses to secure their
networks from attacks arising from increasing