Detection of Cyber Attack in Network Using Machine Learning Techniques

Authors

  • Bhuvaneswari N  UG Scholar, Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
  • Jaya varshni N  Assosiate Professor, Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
  • Prabu M  
  • Tarshana A  
  • Dr. S. Jothi lakshmi  

Keywords:

IDS, Network, Cyber Security, Cyber Attacks

Abstract

Intrusion Detection is one of network security area of technology main research directions. Data mining technology will be applied to Network Intrusion Detection System (NIDS), may automatically discover the new pattern from the massive network data, to reduce the workload of the manual compilation intrusion behavior patterns and normal behavior patterns. This article reviewed the current intrusion detection technology and the data mining technology briefly. Focus on data mining algorithm in anomaly detection and misuse detection of specific applications. For misuse detection, the main study the classification algorithm; For anomaly detection, the main study the pattern comparison and the cluster algorithm. In pattern comparison to analysis deeply the association rules and sequence rules. Finally, has analyzed the difficulties which the current data mining algorithm in intrusion detection applications faced at present, and has indicated the next research direction.

References

  1. Zhen-Ya Zhang, Hong-Mei Cheng, et al. From data mining to Opportunity / symptoms found. Computer Science. 2007.
  2. Dai Yingxia, lian Yi-feng, Wang hang. Security and intrusion detection systems [M]. Beijing: Tsinghua University Press, 2002.
  3. I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
  4. XuZhuoqun. Construction of data [M]. Beijing: China Broadcast television University Publishing house, 2001: 260- 272.
  5. Liu xin, Zhang Yongping, Wanyanli. Decision Tree Algorithm in Intrusion Detection System Analysis and Improvement. Computer Engineering and Design 2006 .

Downloads

Published

2022-06-30

Issue

Section

Research Articles

How to Cite

[1]
Bhuvaneswari N, Jaya varshni N, Prabu M, Tarshana A, Dr. S. Jothi lakshmi, " Detection of Cyber Attack in Network Using Machine Learning Techniques, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 9, Issue 3, pp.357-360, May-June-2022.