JOURNAL ARTICLE

Network Attack Detection using Machine Learning

N.Shanmuga PriyaS. MeyyappanKN. BalasubramanianA.S. Pruthiev

Year: 2022 Journal:   2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) Pages: 342-346

Abstract

Network attack detection system is utilized to find the anomalies with the aim of finding hackers before they make immense damage to our system. Nowadays business environments need high level security because there are a lot of transactions happening in and around, even if the traditional methods fail to detect the anomalies intrusion detection system interpret a safeguard. These intrusion detection systems use alarms to inform whether there is malicious activity or not. These intrusion detection systems ought to be fine-tuned in such a way that they don't give any false alarms. It is moreover similar to firewall but there is a difference between them, firewall only blocks the intrusion from outside but it won't stop the attacks which are within the same network, Intrusion detection systems are used for this purpose. We have used a few of the Machine Learning (ML) procedures such as Support vector Machine (SVM), Decision Tree (DT), Logistic regression (LR), Random Forest (RF) and Naive Bayes (NB). For Training and classifying various abnormalities, KDD-CUP99 dataset is utilized.

Keywords:
Intrusion detection system Computer science Firewall (physics) Naive Bayes classifier Support vector machine Decision tree Random forest Machine learning Artificial intelligence Hacker Anomaly-based intrusion detection system Host-based intrusion detection system Network security Computer security Data mining Intrusion prevention system Entropy (arrow of time)

Metrics

4
Cited By
1.00
FWCI (Field Weighted Citation Impact)
16
Refs
0.68
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence
Network Packet Processing and Optimization
Physical Sciences →  Computer Science →  Hardware and Architecture

Related Documents

© 2026 ScienceGate Book Chapters — All rights reserved.