JOURNAL ARTICLE

Intrusion Detection of Imbalanced Network Traffic

Pavan Raviteja UpadhyayulaK AmarendraSanjay Bhargav Kudupudi

Year: 2022 Journal:   2022 7th International Conference on Communication and Electronics Systems (ICCES) Pages: 840-844

Abstract

With the growth of the Internet, cyber-attacks are evolving at a rapid pace, and the cyber security scenario is bleak. Machine and Deep Learning approaches for intrusion detection network analysis, as well as a brief instructional overview of each Machine Learning/Deep Learning method. Using temporal or temperature correlations, those presenting each approach were summarized. They cover some of the most often used datasets in Machine learning, highlight the limitations of employing these algorithms for cyber security, and offer future opportunities because data is so crucial in these methodologies. There is a lot of effort being done to enhance intrusion detection algorithms, but study into the information to train & test the model is important since higher data quality can improve offline intrusion detection. The study examines the KDD data set in terms of four classes: Basic, Content, Traffic, and Host, with all data characteristics being classified using MODIFIED RANDOM FOREST (MRF). For Intrusion Detection System (IDS), the analysis is done using two popular assessments metrics: Detection Rate (DR) and False Alarm Rate (FAR). The influence of each of four classes of qualities on DR and FAR is displayed as per the output based on data.

Keywords:
Computer science Intrusion detection system Constant false alarm rate Machine learning Artificial intelligence Pace Random forest Data mining Network security Deep learning The Internet Computer security

Metrics

3
Cited By
0.75
FWCI (Field Weighted Citation Impact)
0
Refs
0.58
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

© 2026 ScienceGate Book Chapters — All rights reserved.