ieeexplore.ieee.org Open in urlscan Pro
2600:9000:2724:9c00:1e:d873:7a00:93a1  Public Scan

Submitted URL: https://doi.org/10.1109/ICAECC54045.2022.9716648
Effective URL: https://ieeexplore.ieee.org/document/9716648/
Submission: On May 02 via manual from SG — Scanned from DE

Form analysis 1 forms found in the DOM

<form _ngcontent-boq-c476="" novalidate="" role="search" class="search-bar-wrapper ng-untouched ng-pristine ng-valid">
  <div _ngcontent-boq-c476="" class="drop-down d-flex"><label _ngcontent-boq-c476=""><select _ngcontent-boq-c476="" aria-label="content type dropdown" name="searchType" class="pe-4 ng-untouched ng-pristine ng-valid">
        <option _ngcontent-boq-c476="" value="0: all">All</option>
        <option _ngcontent-boq-c476="" value="1: books">Books</option>
        <option _ngcontent-boq-c476="" value="2: conferences">Conferences</option>
        <option _ngcontent-boq-c476="" value="3: courses">Courses</option>
        <option _ngcontent-boq-c476="" value="4: periodicals">Journals &amp; Magazines</option>
        <option _ngcontent-boq-c476="" value="5: standards">Standards</option>
        <option _ngcontent-boq-c476="" value="6: authors">Authors</option>
        <option _ngcontent-boq-c476="" value="7: citations">Citations</option><!---->
      </select></label></div>
  <div _ngcontent-boq-c476="" class="search-field">
    <div _ngcontent-boq-c476="" class="search-field-icon-container">
      <div _ngcontent-boq-c476="" class="global-search-bar"><xpl-typeahead-migr _ngcontent-boq-c476="" placeholder="" name="search-term" statsclassname="stats-Global_Search_Type_Dropdown" arialabel="main"
          ulclass="search-within-results ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" minchars="3" _nghost-boq-c75="">
          <div _ngcontent-boq-c75="" class="Typeahead text-sm-md-lh"><input _ngcontent-boq-c75="" type="search" autocomplete="off" class="Typeahead-input ng-untouched ng-pristine ng-valid" placeholder="" aria-label="main"><!----></div>
        </xpl-typeahead-migr></div><!----><!---->
      <div _ngcontent-boq-c476="" class="search-icon"><button _ngcontent-boq-c476="" type="submit" aria-label="Search" class="fa fa-search stats-Global_Search_Icon"
          data-tealium_data="{&quot;searchTerm&quot;: &quot;&quot;, &quot;searchType&quot;: &quot;all&quot;}"></button></div><!---->
    </div><!---->
  </div>
</form>

Text Content

Machine Learning Based Intrusion Detection | IEEE Conference Publication | IEEE
Xplore

Skip to Main Content
 * IEEE.org
 * IEEE Xplore
 * IEEE SA
 * IEEE Spectrum
 * More Sites

Subscribe
 *  * Donate
   
    * Cart
      
   
    * 
      
    * 
   
    * Create Account
      
    * Personal Sign In

 * Browse
 * My Settings
 * Help
   

Institutional Sign In

Institutional Sign In
AllBooksConferencesCoursesJournals & MagazinesStandardsAuthorsCitations

ADVANCED SEARCH
Conferences >2022 IEEE Fourth Internationa...


MACHINE LEARNING BASED INTRUSION DETECTION

Publisher: IEEE
Cite This
PDF

Shivam Kejriwal; Devika Patadia; Saloni Dagli; Prachi Tawde
All Authors

Sign In or Purchase
to View Full Text
2
Cites in
Papers
202
Full
Text Views


 * 
   
 * 
   
 * 
   
 * 
   
 * Alerts
   
   
   ALERTS
   
   Manage Content Alerts
   Add to Citation Alerts
   

--------------------------------------------------------------------------------

Abstract
Document Sections
 * I.
   
   Introduction
 * II.
   
   Related Works
 * III.
   
   Datasets and Pre-Processing
 * IV.
   
   Methodology
 * V.
   
   Experimental Results
   

Show Full Outline
Authors
Figures
References
Citations
Keywords
Metrics
More Like This
 * Download PDF
 * Download References
 * 
 * Request Permissions
 * Save to
 * Alerts
   

Abstract:Intrusion refers to any malicious activity done in order to access
confidential data. An intrusion detection system (IDS) detects these attacks
and, on detection, it repo...View more
Metadata
Abstract:
Intrusion refers to any malicious activity done in order to access confidential
data. An intrusion detection system (IDS) detects these attacks and, on
detection, it reports them to the administrator. It does so either by comparing
the new activity with the past activities or by analyzing the network
performance. This system forms a part of the vast security module and works with
several other such sub-modules in order to make sure that these unwanted
intrusions do not go unreported. The system that has been implemented in this
paper is an anomaly-based Intrusion Detection System (IDS). The primary purpose
of this implementation is to develop an efficient system in order to detect any
external or internal unauthenticated activity. Several models have been
experimented with in order to find one that suits the system the best and gives
a good enough accuracy. The models that have been experimented with include
Logistic Regressor, Random Forest Classifier, K Nearest Neighbor classifier,
XGBoost Classifier, Gaussian Naive Bayes Classifier and a Multi-Layer Perceptron
Classifier (MLP). Further, the accuracy of each of these models was calculated,
and a comparative analysis was done between the performance of these models. The
model that performed the best in this particular use case was the Random Forest
Classifier giving an accuracy of 99.8% and a macro average F1-Score of 0.98.
Published in: 2022 IEEE Fourth International Conference on Advances in
Electronics, Computers and Communications (ICAECC)
Date of Conference: 10-11 January 2022
Date Added to IEEE Xplore: 23 February 2022
ISBN Information:
ISSN Information:
DOI: 10.1109/ICAECC54045.2022.9716648
Publisher: IEEE
Conference Location: Bengaluru, India

Contents

--------------------------------------------------------------------------------


I. INTRODUCTION

With the proliferation in the field of information technology comes the increase
in the dependency of large-scale organizations on technology. This calls for a
need to develop efficient methodologies in order to provide security to these
companies to make sure that the information, as well as the data of these
companies, is protected from intrusions. An intrusion refers to any activity
that is not authorized and authenticated by the company. Intrusion is not only
limited to the access of company resources by an external source but also
includes unauthenticated access to information within the company itself.

Sign in to Continue Reading
Authors

Figures

References

Citations

Keywords

Metrics


More Like This
The safety speed calculation model and verification of the elliptic section tank
truck steering rollover based on computer simulation

2016 5th International Conference on Computer Science and Network Technology
(ICCSNT)

Published: 2016

Computers and Safety. A First International Conference on the Use of
Programmable Electronic Systems in Safety Related Applications (Conf. Publ.
No.314)

1989 A First International Conference on the Use of Programmable Electronic
Systems in Safety Related Applications Computers and Safety

Published: 1989

Show More



REFERENCES

References is not available for this document.


IEEE PERSONAL ACCOUNT

 * Change username/password


PURCHASE DETAILS

 * Payment Options
 * View Purchased Documents


PROFILE INFORMATION

 * Communications Preferences
 * Profession and Education
 * Technical interests


NEED HELP?

 * US & Canada: +1 800 678 4333
 * Worldwide: +1 732 981 0060
 * Contact & Support


FOLLOW

 * 
 * 
 * 
 * 
 * 

About IEEE Xplore | Contact Us | Help | Accessibility | Terms of Use |
Nondiscrimination Policy | IEEE Ethics Reporting | Sitemap | IEEE Privacy Policy

A not-for-profit organization, IEEE is the world's largest technical
professional organization dedicated to advancing technology for the benefit of
humanity.

© Copyright 2024 IEEE - All rights reserved.


IEEE ACCOUNT

 * Change Username/Password
 * Update Address


PURCHASE DETAILS

 * Payment Options
 * Order History
 * View Purchased Documents


PROFILE INFORMATION

 * Communications Preferences
 * Profession and Education
 * Technical Interests


NEED HELP?

 * US & Canada: +1 800 678 4333
 * Worldwide: +1 732 981 0060
   
 * Contact & Support

 * About IEEE Xplore
 * Contact Us
 * Help
 * Accessibility
 * Terms of Use
 * Nondiscrimination Policy
 * Sitemap
 * Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical
professional organization dedicated to advancing technology for the benefit of
humanity.
© Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your
agreement to the terms and conditions.