skip to main content
10.1145/3231830.3231843acmotherconferencesArticle/Chapter ViewAbstractPublication PagesawictConference Proceedingsconference-collections
research-article

Machine Learning Based Intrusion Detection System for Social Network of Europe

Published: 13 November 2017 Publication History

Abstract

In modern age1, people have become dependent on social networking for communication for both in personal life and in corporate life. There are different types of users of social network, some users use social network for different good purposes like educational, entertainment, exchanging information, etc. Some users are using social network as a platform to exchange information for doing harmful work to the society. As some communications are useful and some are harmful, it's very important to analyze this traffic and to identify the harmful communication for the benefit of the country. Developing analysis model for identification of harmful communication of social network is a challenging area for computer science researchers. In the research proposal, Intrusion Detection System (IDS) is designed which should be installed in the gateways. The proposed research has four tier architectures for IDS.

References

[1]
D. Gupta, S. Singhal, S. Malik and A. Singh. 2016. Network intrusion detection system using various data mining techniques. In Proceedings of International Conference on Research Advances in Integrated Navigation Systems (RAINS), IEEE, 6-7th May 2016.
[2]
A A Aryachandra; Y Fazmah Arif; S Novian Anggis. 2016. Intrusion Detection System (IDS) server placement analysis in cloud computing. In the Proceedings of 4th International Conference on Information and Communication Technology (ICoICT), 2016, IEEE, 25-27th May 2016.
[3]
V. Degeler, R. French, K.Jones. 2016. Self-Healing Intrusion Detection System Concept, In the Proceedings of 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), 2016 IEEE, 9-10th April 2016.
[4]
R. Bronte, H. Shahriar, and H. M. Haddad. 2016. A Signature-Based Intrusion Detection System for Web Applications Based on Genetic Algorithm. In Proceedings of the 9th International Conference on Security of Information and Networks(SIN '16). ACM, New York, NY, USA.
[5]
N. Sengupta, J. Sen, J. Sil and M. Saha. 2013. Designing of On Line Intrusion Detection System Using Rough Set Theory and Q Learning Algorithm, Elsevier Journal, Neurocomputing, volume 111, pages 161--168, July 2013.
[6]
Y. Wang, Z. Wang. 2005. Text categorization rule extraction based on fuzzy decision tree. In Proceedings of 2005 International Conference on Machine Learning, IEEE 18-21 Aug. 2005.
[7]
R. Silhavy, R. Senkerik, Z. K. Oplatková, Z. Prokopova, P. Silhavy. 2017. Artificial Intelligence Trends in Intelligent Systems. In Proceedings of the 6th Computer Science Online Conference 2017 (CSOC2017), Vol 1.
[8]
F. H. Lochovsky. 2004. Feature selection with conditional mutual information maximin in text categorization. In Proceedings of the Thirteenth ACM conference on Information and knowledge management - CIKM 04 CIKM 04, 2004.
[9]
S. Saha. A.Ekbal. 2013. Combining multiple classifiers using vote based classifier ensemble technique for named entity recognition. Elsevier Journal on Data and Knowledge Engineering, Volume 85, Issue, March 2013, Pages 15--39.
[10]
B. Mishra, H. Das, S. Dehuri, A. Jagadev. 2018. Cloud Computing for Optimization: Foundations, Applications, and Challenges. Springer Nature, 2018.
[11]
S. Jiang, X. Song, H. Wang, J. Han, Q. Li. 2006. A clustering-based method for unsupervised intrusion detections. Journal of Pattern Recognition Letters, Volume 27 Issue 7, May 2006, Pages 802--810.
[12]
M. Khashei, A. Hamadani, M. Bijari. 2012. A novel hybrid classification model of artificial neural networks and multiple linear regression models. Journal of Expert Systems with Applications, 2012.
[13]
A. Somani, S. Srivastava, A. Mundra, S. Rawat. 2017. Proceedings of First International Conference on Smart System, Innovations and Computing. Springer Nature, 2018.
[14]
M. Da, H. Hu, and J. Guan. 2010, The Naïve Bayesian Approach in Classifying the Learner of Distance Education System. In Proceedings of 2nd International Conference on Information Engineering and Computer Science, 2010.
[15]
S. Sumathi, S. Esakkirajan. 2007. Data Mining and Data Warehousing. In Fundamentals of Relational Database Management Systems Volume 47 of Studies in Computational Intelligence, Springer 2007.
[16]
J. Engelfriet, G. Filè. 1981. Passes and paths of attribute grammars. Information and Control Volume 49, Issue 2, May 1981, Pages 125--169.
[17]
H. Chen. 1995. Machine learning for information retrieval: Neural networks, symbolic learning, and genetic algorithms. Journal of the American Society for Information Science, 04/1995.
[18]
H. Chen and J. Kim. 1994. GANNET: A Machine Learning Approach to Document Retrieval. Journal of Management Information Systems, 1994.
[19]
D. Gacquer, V. Delcroix, F. Delmotte, S. Piechowiak. 2011. Comparative study of supervised classification algorithms for the detection of atmospheric pollution. Engineering Applications of Artificial Intelligence, 2011.
[20]
M. Thangavel, P. Varalakshmi, Mukund Murrali, K. Nithya. 2015. An Enhanced and Secured RSA Key Generation Scheme (ESRKGS). Journal of Information Security and Applications, Elsevier. Volume 20, February 2015, Pages 3--10.
[21]
Nsl-kdd data set for network-based intrusion detection systems, http://nsl.cs.unb.ca/NSL-KDD/, March 2009.
[22]
N. Sengupta. 2014. Designing Intrusion Detection System and Hybrid Encryption for e-Government System of Bahrain. Middle East and North Africa Conference for Public Administration Research, Bahrain, 23rd - 24th April 2014.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
AWICT 2017: Proceedings of the Second International Conference on Advanced Wireless Information, Data, and Communication Technologies
November 2017
116 pages
ISBN:9781450353106
DOI:10.1145/3231830
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • CNRS: Centre National De La Rechercue Scientifique

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 November 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Data Mining Techniques
  2. Intrusion Detection System
  3. Text Classification

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

AWICT 2017

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 78
    Total Downloads
  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media