Skip to main content

Machine Learning Based Intrusion Detection Techniques

  • Chapter
  • First Online:
Handbook of Computer Networks and Cyber Security

Abstract

Nowadays the usage of Internet has being increased exponentially due to the reason of keeping most sensitive data in on-line. It leads vulnerabilities on the data that is available in on-line like intruders can raise any kind of attacks. Therefore, intrusion detection helps a computing environment or computer system to deal with such kind of attacks. Intrusion detection is also an important supplement as well as component in the traditional computer security mechanism. It can be considered as a typical classification problem. Therefore to develop an effective intrusion detection method, the machine learning methods can be used. This chapter briefs the current state of the art in the intrusion detection domain using the supervised learning approaches of machine learning.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Axelsson, S. (2000). Intrusion detection systems: A survey and taxonomy.

    Google Scholar 

  2. Frank, J. (1994). Artificial intelligence and intrusion detection: Current and future directions. In Proceedings of the 17th National Computer Security Conference.

    Google Scholar 

  3. Gaddam, S. R., Phoha, V. V., & Balagani, K. S. (2007). K-Means+ID3: A novel method for supervised anomaly detection by cascading k-means clustering and ID3 decision tree learning methods. IEEE Transactions on Knowledge and Data Engineering, 19(3), 345–354.

    Article  Google Scholar 

  4. Ilgun, K., & Kemmerer, A. (1995). State transition analysis: A rule-based intrusion detection approach. IEEE Transaction on Software Engineering, 21(3), 181–199.

    Article  Google Scholar 

  5. Kumar, G. K., Viswanath, P., & Rao, A. A. (2011). Intrusion detection using an ensemble of decision trees. In Indian International Conference on Artificial Intelligence (pp. 382–392).

    Google Scholar 

  6. Kumar, G. K., Viswanath, P., & Rao, A. A. (2015). Ensemble of soft decision trees using multiple approximate fuzzy-rough set based reducts. International Journal of Information Processing, 9(2), 36–46.

    Google Scholar 

  7. Kumar, G. K., Viswanath, P., & Rao, A. A. (2016). Ensemble of randomized soft decision trees for robust classification. Sadhana, 41(3), 273–282.

    MathSciNet  MATH  Google Scholar 

  8. Lee, W., & Stolfo, S. J. (1998). Data mining approaches for intrusion detection. In 7th USENIX Security Symposium.

    Google Scholar 

  9. Lichman, M. (2013). UCI machine learning repository. http://archive.ics.uci.edu/ml, University of California, Irvine, School of Information and Computer Sciences.

  10. Lincoln Laboratory MIT.DARPA intrusion detection data sets. http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.html.

  11. Lippman, R. P., Fried, D. J., Graf, I., & Zissman, M. A. (2000). Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings of DARPA Information Survivability Conference and Exosition (pp. 12–26).

    Google Scholar 

  12. Lunt, T., & Jagannathan, R. (1994). A prototype real-time intrusion-detection expert system. In Proceedings of 1988 IEEE Computer Society Symposium on Research in Security and Privacy (pp. 59–66). Washington: IEEE Computer Society Press.

    Google Scholar 

  13. Luo, J. (1999). Integrating fuzzy logic with data mining methods for intrusion detection.

    Google Scholar 

  14. Mukherjee, B., Heberlein, L., & Levitt, K. (1994). Network intrusion detection. Computer Networks, 8(3), 26–41.

    Google Scholar 

  15. Smaha, S. (1998). Haystack: An intrusion detection system. In Proceedings of the Fourth Aerospace Computer Security Applications Conference (pp. 37–44).

    Google Scholar 

  16. Zhou, L., & Jiang, F. (2011). A rough set based decision tree algorithm and its application in intrusion detection. In 4th International Conference on Pattern Recognition and Machine Intelligence (pp. 333–338). Berlin: Springer.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gulla, K.K., Viswanath, P., Veluru, S.B., Kumar, R.R. (2020). Machine Learning Based Intrusion Detection Techniques. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22277-2_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22276-5

  • Online ISBN: 978-3-030-22277-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics