International Journal of Innovative Research in Engineering and Management
Year: 2024, Volume: 12, Issue: 2
First page : ( 87) Last page : ( 90)
Online ISSN : 2350-0557.
DOI: 10.55524/ijircst.2024.12.2.15 |
DOI URL: https://doi.org/10.55524/ijircst.2024.12.2.15
Crossref
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Pushpendra Chaturvedi
Despite the existence of various types of network intrusion detection system, growth of attacks at host level has increased in the present time. Therefore, there is a huge potential of research in this field and which motivates this research work. This paper analyses the pattern of four classes of attacks used to deploy host-based intrusion. KNN and Naïve-Bayes algorithms are employed and compared in this research work to determine the presence of intrusion using standard measures of performance.
[1] Glenn M. Fung and O. L. Mangasarian, "Multicategory Proximal Support Vector Machine Classifiers", Springer Science and Business Media, Machine Learning, 59, 77–97, 2005.
[2] R. Sahani, C. Rout, J. Chandrakanta Badajena, A. K. Jena, and H. Das, "Classification of intrusion detection using data mining techniques," in Progress in Computing, Analytics and Networking: Proceedings of ICCAN 2017, pp. 753-764, Springer Singapore, 2018.
[3] K. Goeschel, "Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis," in SoutheastCon 2016, pp. 1-6, IEEE, March 2016.
[4] V. K. Kshirsagar, S. M. Tidke, and S. Vishnu, "Intrusion detection system using genetic algorithm and data mining: An overview," International Journal of Computer Science and Informatics ISSN (PRINT), vol. 2231, no. 5292, 2012.
[5] D. Y. Yeung and Y. Ding, "Host-based intrusion detection using dynamic and static behavioral models," Pattern recognition, vol. 36, no. 1, pp. 229-243, 2003.
[6] Y. Shin and K. Kim, "Comparison of anomaly detection accuracy of host-based intrusion detection systems based on different machine learning algorithms," International Journal of Advanced Computer Science and Applications, vol. 11, no. 2, 2020.
[7] P. Ramprakash, M. Sakthivadivel, N. Krishnaraj, and J. Ramprasath, "Host-based intrusion detection system using sequence of system calls," International Journal of Engineering and Management Research (IJEMR), vol. 4, no. 2, pp. 241-247, 2014.
[8] X. Xu and T. Xie, "A reinforcement learning approach for host-based intrusion detection using sequences of system calls," in Advances in Intelligent Computing: International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part I, pp. 995-1003, Springer Berlin Heidelberg, 2005.
[9] S. K. Singh, N. Chaurasia, and P. Sharma, "Concept and proposed architecture of Hybrid Intrusion Detection System using data mining," International Journal of Engineering and Advanced Technology (IJEAT), vol. 2, pp. 274-276, 2013.
[10] M. Almseidin, J. Al-Sawwa, and M. Alkasassbeh, "Generating a Benchmark Cyber Multi-Step Attacks Dataset for Intrusion Detection," pp. 3679 – 3694, 1 Jan. 2022.
Lecturer, SOS in Computer Science and Application, Jiwaji University, Gwalior, Madhya Pradesh, India
No. of Downloads: 33 | No. of Views: 740
Shivaraj Yanamandram Kuppuraju, Sharad Shyam Ojha, Mrinal Kumar.
March 2025 - Vol 13, Issue 2
Shiva Kiran Lingishetty, Chandrashekhar Moharir, Mrinal Kumar.
March 2025 - Vol 13, Issue 2
Prasanna Sankaran, Shiva Kiran Lingishetty, Mrinal Kumar.
March 2025 - Vol 13, Issue 2