ieeexplore.ieee.org
Open in
urlscan Pro
2600:9000:2724:9c00:1e:d873:7a00:93a1
Public Scan
Submitted URL: https://doi.org/10.1109/ICAECC54045.2022.9716648
Effective URL: https://ieeexplore.ieee.org/document/9716648/
Submission: On May 02 via manual from SG — Scanned from DE
Effective URL: https://ieeexplore.ieee.org/document/9716648/
Submission: On May 02 via manual from SG — Scanned from DE
Form analysis
1 forms found in the DOM<form _ngcontent-boq-c476="" novalidate="" role="search" class="search-bar-wrapper ng-untouched ng-pristine ng-valid">
<div _ngcontent-boq-c476="" class="drop-down d-flex"><label _ngcontent-boq-c476=""><select _ngcontent-boq-c476="" aria-label="content type dropdown" name="searchType" class="pe-4 ng-untouched ng-pristine ng-valid">
<option _ngcontent-boq-c476="" value="0: all">All</option>
<option _ngcontent-boq-c476="" value="1: books">Books</option>
<option _ngcontent-boq-c476="" value="2: conferences">Conferences</option>
<option _ngcontent-boq-c476="" value="3: courses">Courses</option>
<option _ngcontent-boq-c476="" value="4: periodicals">Journals & Magazines</option>
<option _ngcontent-boq-c476="" value="5: standards">Standards</option>
<option _ngcontent-boq-c476="" value="6: authors">Authors</option>
<option _ngcontent-boq-c476="" value="7: citations">Citations</option><!---->
</select></label></div>
<div _ngcontent-boq-c476="" class="search-field">
<div _ngcontent-boq-c476="" class="search-field-icon-container">
<div _ngcontent-boq-c476="" class="global-search-bar"><xpl-typeahead-migr _ngcontent-boq-c476="" placeholder="" name="search-term" statsclassname="stats-Global_Search_Type_Dropdown" arialabel="main"
ulclass="search-within-results ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" minchars="3" _nghost-boq-c75="">
<div _ngcontent-boq-c75="" class="Typeahead text-sm-md-lh"><input _ngcontent-boq-c75="" type="search" autocomplete="off" class="Typeahead-input ng-untouched ng-pristine ng-valid" placeholder="" aria-label="main"><!----></div>
</xpl-typeahead-migr></div><!----><!---->
<div _ngcontent-boq-c476="" class="search-icon"><button _ngcontent-boq-c476="" type="submit" aria-label="Search" class="fa fa-search stats-Global_Search_Icon"
data-tealium_data="{"searchTerm": "", "searchType": "all"}"></button></div><!---->
</div><!---->
</div>
</form>
Text Content
Machine Learning Based Intrusion Detection | IEEE Conference Publication | IEEE Xplore Skip to Main Content * IEEE.org * IEEE Xplore * IEEE SA * IEEE Spectrum * More Sites Subscribe * * Donate * Cart * * * Create Account * Personal Sign In * Browse * My Settings * Help Institutional Sign In Institutional Sign In AllBooksConferencesCoursesJournals & MagazinesStandardsAuthorsCitations ADVANCED SEARCH Conferences >2022 IEEE Fourth Internationa... MACHINE LEARNING BASED INTRUSION DETECTION Publisher: IEEE Cite This PDF Shivam Kejriwal; Devika Patadia; Saloni Dagli; Prachi Tawde All Authors Sign In or Purchase to View Full Text 2 Cites in Papers 202 Full Text Views * * * * * Alerts ALERTS Manage Content Alerts Add to Citation Alerts -------------------------------------------------------------------------------- Abstract Document Sections * I. Introduction * II. Related Works * III. Datasets and Pre-Processing * IV. Methodology * V. Experimental Results Show Full Outline Authors Figures References Citations Keywords Metrics More Like This * Download PDF * Download References * * Request Permissions * Save to * Alerts Abstract:Intrusion refers to any malicious activity done in order to access confidential data. An intrusion detection system (IDS) detects these attacks and, on detection, it repo...View more Metadata Abstract: Intrusion refers to any malicious activity done in order to access confidential data. An intrusion detection system (IDS) detects these attacks and, on detection, it reports them to the administrator. It does so either by comparing the new activity with the past activities or by analyzing the network performance. This system forms a part of the vast security module and works with several other such sub-modules in order to make sure that these unwanted intrusions do not go unreported. The system that has been implemented in this paper is an anomaly-based Intrusion Detection System (IDS). The primary purpose of this implementation is to develop an efficient system in order to detect any external or internal unauthenticated activity. Several models have been experimented with in order to find one that suits the system the best and gives a good enough accuracy. The models that have been experimented with include Logistic Regressor, Random Forest Classifier, K Nearest Neighbor classifier, XGBoost Classifier, Gaussian Naive Bayes Classifier and a Multi-Layer Perceptron Classifier (MLP). Further, the accuracy of each of these models was calculated, and a comparative analysis was done between the performance of these models. The model that performed the best in this particular use case was the Random Forest Classifier giving an accuracy of 99.8% and a macro average F1-Score of 0.98. Published in: 2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC) Date of Conference: 10-11 January 2022 Date Added to IEEE Xplore: 23 February 2022 ISBN Information: ISSN Information: DOI: 10.1109/ICAECC54045.2022.9716648 Publisher: IEEE Conference Location: Bengaluru, India Contents -------------------------------------------------------------------------------- I. INTRODUCTION With the proliferation in the field of information technology comes the increase in the dependency of large-scale organizations on technology. This calls for a need to develop efficient methodologies in order to provide security to these companies to make sure that the information, as well as the data of these companies, is protected from intrusions. An intrusion refers to any activity that is not authorized and authenticated by the company. Intrusion is not only limited to the access of company resources by an external source but also includes unauthenticated access to information within the company itself. Sign in to Continue Reading Authors Figures References Citations Keywords Metrics More Like This The safety speed calculation model and verification of the elliptic section tank truck steering rollover based on computer simulation 2016 5th International Conference on Computer Science and Network Technology (ICCSNT) Published: 2016 Computers and Safety. A First International Conference on the Use of Programmable Electronic Systems in Safety Related Applications (Conf. Publ. No.314) 1989 A First International Conference on the Use of Programmable Electronic Systems in Safety Related Applications Computers and Safety Published: 1989 Show More REFERENCES References is not available for this document. IEEE PERSONAL ACCOUNT * Change username/password PURCHASE DETAILS * Payment Options * View Purchased Documents PROFILE INFORMATION * Communications Preferences * Profession and Education * Technical interests NEED HELP? * US & Canada: +1 800 678 4333 * Worldwide: +1 732 981 0060 * Contact & Support FOLLOW * * * * * About IEEE Xplore | Contact Us | Help | Accessibility | Terms of Use | Nondiscrimination Policy | IEEE Ethics Reporting | Sitemap | IEEE Privacy Policy A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. IEEE ACCOUNT * Change Username/Password * Update Address PURCHASE DETAILS * Payment Options * Order History * View Purchased Documents PROFILE INFORMATION * Communications Preferences * Profession and Education * Technical Interests NEED HELP? * US & Canada: +1 800 678 4333 * Worldwide: +1 732 981 0060 * Contact & Support * About IEEE Xplore * Contact Us * Help * Accessibility * Terms of Use * Nondiscrimination Policy * Sitemap * Privacy & Opting Out of Cookies A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.