Abstract
Intrusion detection has achievement a comprehensive interest and become a substantial scope for various researches and still being the subject of common concern by researchers. The intrusion detection researches face a complicated problem even after many years of research. Because of the huge number of false warnings throughout detecting anonymous attack patterns residue a vague problem. There are a numerous research trying to expose the possible solutions to this problem. Anomaly detection is the main issue of intrusion detection in which alarms of normal actions show a presence of destined or unintentional prompted attacks, faults, defects, and others. These papers represent an attentive literature review of machine learning approaches for intrusion detection, specifically Random Forest and Support Vector Machines that are used. Founded on the reference number and the significance of the growing method, papers describe every method specified, read, and shortened.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ngu AH, Gutierrez M, Metsis V, Nepal S, Sheng QZ (2017) Iot middleware: a survey on issues and enabling technologies. IEEE Internet Things J 4(1):1–20
Jameel SM, Hashmani MA, Alhussain H, Budiman A, Rehman M (2020) A critical review on adverse effects of concept drift over machine learning classification models. (IJACSA) Int J Adv Comput Sci Appl 11(1)
Shibahara T, Yagi T, Akiyama M, Chiba D, Yada T (2016) Efficient dynamic malware analysis based on network behavior using deep learning. In: Global communications conference (GLOBECOM). IEEE, pp 1–7
Karatas G (2016) Genetic algorithm for intrusion detection system. In: 24th signal processing and communication application conference (SIU). IEEE, pp 1341–1344
Imtiaz W, Khanum M, Mahboob T, Ghafoor HA, Sehar R (2015) A survey on unsupervised machine learning algorithms for automation, classification and maintenance. Int J Comput Appl (0975–8887) 119(13)
Kang M-J, Kang J-W (2016) Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6):e0155781
Tang TA, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M (2016) Deep learning approach for network intrusion detection in software defined networking. IEEE conference location: Fez, Morocco date of conference. https://doi.org/10.1109/WINCOM.2016.7777224, 26–29 Oct 2016
Buczak A (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Sur Tutorials 18(2)
Niyaz Q, Sun W, Javaid AY, Alam M (2016) A deep learning approach for network intrusion detection system. College of Engineering University of Toledo BICT 2015, December 03–05, New York City, United States Copyright © ICST. https://doi.org/10.4108/eai.3-12-2015.2262516
Karatas G, Demir O, Sahingoz OK (2018) Deep learning in intrusion detection systems. International congress on big data, deep learning and fighting cyber terrorism, Ankara, Turkey, 3–4 Dec 2018
Harmony A (2020) Search-based feature selection technique for cloud intrusion detection Widad Mirghani Makki, Maheyzah MD. Siraj, and Nurudeen Mahmud Ibrahim(&) Advances in intelligent systems and computing volume 1073© Springer Nature Switzerland AG 2020
Wang C, Zheng J, Li X (2017) Research on DDoS attacks detection based on RDF-SVM. In: 10th international conference on intelligent computation technology and automation
Balogun A (2015) Anomaly intrusion detection using an hybrid of decision tree and K-nearest neighbor a multidisciplinary journal publication of the Faculty of Science, Adeleke University, Ede, Nigeria
Yao H, Fu D, Zhang P, Li M, Liu Y (2019) MSML: a novel multilevel semi supervised machine learning framework for intrusion detection system. IEEE Internet Things J 6(2):1949–1959
Kumar S, Pal J, Giri A, Raj A, Raj R, Mangayarkarasi R (2019) Intrusion detection system using random forest. researchgate.net/publication/332396674
Farnaaz N, Jabbar MA (2016) Random forest modeling for network intrusion detection system. Twelfth international multi-conference on information processing-2016 (IMCIP-2016)
Ugochukwu CJ, Bennett EO (2018) An intrusion detection system using machine learning algorithm. Int J Comput Sci Math Theory 4(1). ISSN: 2545-5699
Ling J, Wu C (2019) Feature selection and deep learning based approach for network intrusion detection. Advances in computer science research, volume 873rd international conference on mechatronics engineering and information technology (ICMEIT 2019)
Ren J, Guo J, Qian W, Yuan H, Hao X, Jingjing H (2019) Building an effective intrusion detection system by using hybrid data optimization based on machine learning algorithms. Secur Commun Netw I7130868:11
Li X, Chen W, Zhang Q, Wu L (2020) Building auto-encoder intrusion detection system based on random forest feature selection. Comput Secur 95. 101851xzzaza HM
Elijah AV, Abdullah A, JhanJhi NZ, Supramaniam M, Abdullateef B (2019) Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: an empirical study. (IJACSA) Int J Adv Comput Sci Appl 10(9)
Enache A-C, Patriciu VV (2014) Intrusions detection based on support vector machine optimized with swarm intelligence. In: 153–9th IEEE international symposium on applied computational intelligence and informatics, Timişoara, Romnia, May 15–17
Al Mehedi Hasan M, Nasser M, Pal B, Ahmad S (2014) Support vector machine and random forest modeling for intrusion detection system (IDS). J Intell Learn Syst Appl 6:45–52 Published Online February 2014
Patgiri R, Varshney U, Akutota T, Kunde R (2018) An investigation on intrusion detection system using machine learning. IEEE symposium series on computational intelligence SSCI
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Sirag, H., Awadelkariem, S.D. (2022). A Review on Intrusion Detection System Using a Machine Learning Algorithms. In: Al-Emran, M., Al-Sharafi, M.A., Al-Kabi, M.N., Shaalan, K. (eds) Proceedings of International Conference on Emerging Technologies and Intelligent Systems. ICETIS 2021. Lecture Notes in Networks and Systems, vol 322. Springer, Cham. https://doi.org/10.1007/978-3-030-85990-9_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-85990-9_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-85989-3
Online ISBN: 978-3-030-85990-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)