Comprehensive Study of Tensor Flow with Parameter Variation
Keywords:
Intrusion Detection Systems, TensorFlow, Data Mining, Machine Learning, Classification, RegressionAbstract
Intrusion detection systems (IDS) have evolved significantly since their inception by James Anderson in 1980. This paper explores the integration of TensorFlow, a powerful machine learning framework, with various data mining techniques to enhance the performance of IDS. We review a range of data mining methods, including clustering, Bayesian networks, Hidden Markov Models, decision trees, support vector machines, genetic algorithms, and fuzzy logic, and their applications in intrusion detection. The study highlights how TensorFlow can be utilized for both classification and regression tasks to improve detection accuracy and system efficiency. We discuss practical implementations using TensorFlow for handling large-scale datasets and optimizing model parameters. The findings suggest that TensorFlow, when combined with effective data mining techniques, provides a robust framework for developing advanced IDS capable of addressing contemporary cybersecurity threats.
References
- R. Power, "1999 CSI/FBI Computer Crime and Security Survey,” Computer Security Issues & Trends, Computer Security Institute, Winter 1999.
- D. E. Denning, “An Intrusion-Detection Model,” IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222-232, Feb. 1987.
- W. Lee, S. Stolfo, and K. Mok, “Adaptive Intrusion Detection: A Data Mining Approach,” Artificial Intelligence Review, vol. 14, no. 6, pp. 533-567, Dec. 2000.
- S. Singh and G. Kaur, “Unsupervised Anomaly Detection In Network Intrusion Detection Using Clusters,” in Proc. National Conference on Challenges & Opportunities in Information Technology, RIMT-IET, Mandi Gobindgarh, Mar. 23, 2007.
- E. Bloedorn, A. D. Christiansen, W. Hill, C. Skorupka, L. M. Talbot, and J. Tivel, “Data Mining for Network Intrusion Detection: How to Get Started,” CiteSeer, 2001.
- L. Portnoy, “Intrusion Detection with Unlabeled Data Using Clustering,” Undergraduate Thesis, Columbia University, 2000.
- T. Lappas and K. Pelechrinis, “Data Mining Techniques for (Network) Intrusion Detection Systems,” [Online]. Available: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.120.2533&rep=rep1&type=pdf.
- D. M. Farid, N. Harbi, S. Ahmmed, M. Z. Rahman, and C. M. Rahman, “Mining Network Data for Intrusion Detection through Naïve Bayesian with Clustering,” World Academy of Science, Engineering and Technology, 2010.
- The KDD Archive, “KDD99 cup dataset,” 1999. [Online]. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
- X. Li and N. Ye, “A Supervised Clustering Algorithm for Computer Intrusion Detection,” Knowledge and Information Systems, vol. 8, pp. 498-509, 2005.
- C. Kruegel, D. Mutz, W. Robertson, and F. Valeur, “Bayesian Event Classification for Intrusion Detection,” in Proc. 19th Annual Computer Security Applications Conference, 2003.
- L. Portnoy, E. Eskin, and S. J. Stolfo, “Intrusion Detection with Unlabeled Data Using Clustering,” in Proc. ACM Workshop on Data Mining Applied to Security, 2001.
- V. Paxson, “Bro: A System for Detecting Network Intruders in Real-Time,” Computer Networks, vol. 31, no. 23-24, pp. 2435-2463, Dec. 14, 1999.
- Al-Ghuwairi, A. R., Sharrab, Y., Al-Fraihat, D., AlElaimat, M., Alsarhan, A., & Algarni, A. (2022). Intrusion detection in cloud computing based on time series anomalies utilizing machine learning. Journal of Cloud Computing, 12(1), 127.
- Mohamed, D., & Ismael, O. (2022). Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing. Journal of Cloud Computing, 12(1), 41.
- Samunnisa, K., Kumar, G. S. V., & Madhavi, K. (2021). Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods. Measurement: Sensors, 25, 100612.
- Attou, H., Guezzaz, A., Benkirane, S., Azrour, M., & Farhaoui, Y. (2023). Cloud-based intrusion detection approach using machine learning techniques. Big Data Mining and Analytics, 6(3), 311-320.
- Tariq, M., & Suaib, M. (2021). A review on intrusion detection in cloud computing. International Journal of Engineering and Management Research, 13(2), 207-215.
- Kavitha, C., Gadekallu, T. R., K, N., Kavin, B. P., & Lai, W. C. (2023). Filter-based ensemble feature selection and deep learning model for intrusion detection in cloud computing. Electronics, 12(3), 556.
- Attou, H., Mohy-eddine, M., Guezzaz, A., Benkirane, S., Azrour, M., Alabdultif, A., & Almusallam, N. (2021). Towards an intelligent intrusion detection system to detect malicious activities in cloud computing. Applied Sciences, 13(17), 9588.
- Lin, H., Xue, Q., Feng, J., & Bai, D. (2022). Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine. Digital Communications and Networks, 9(1), 111-124.
- Maheswari, K. G., Siva, C., & Priya, G. N. (2020). An optimal cluster based intrusion detection system for defence against attack in web and cloud computing environments. Wireless Personal Communications, 128(3), 2011-2037.
- Maheswari, K. G., Siva, C., & Nalinipriya, G. (2022). Optimal cluster based feature selection for intrusion detection system in web and cloud computing environment using hybrid teacher learning optimization enables deep recurrent neural network. Computer Communications, 202, 145-153.
- Vashishtha, L. K., Singh, A. P., & Chatterjee, K. (2022). HIDM: A hybrid intrusion detection model for cloud based systems. Wireless Personal Communications, 128(4), 2637-2666.
- Srilatha, D., & Thillaiarasu, N. (2022). Implementation of Intrusion detection and prevention with Deep Learning in Cloud Computing. Journal of Information Technology Management, 15(Special Issue), 1-18.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.