Abstract
Nowadays the usage of Internet has being increased exponentially due to the reason of keeping most sensitive data in on-line. It leads vulnerabilities on the data that is available in on-line like intruders can raise any kind of attacks. Therefore, intrusion detection helps a computing environment or computer system to deal with such kind of attacks. Intrusion detection is also an important supplement as well as component in the traditional computer security mechanism. It can be considered as a typical classification problem. Therefore to develop an effective intrusion detection method, the machine learning methods can be used. This chapter briefs the current state of the art in the intrusion detection domain using the supervised learning approaches of machine learning.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Axelsson, S. (2000). Intrusion detection systems: A survey and taxonomy.
Frank, J. (1994). Artificial intelligence and intrusion detection: Current and future directions. In Proceedings of the 17th National Computer Security Conference.
Gaddam, S. R., Phoha, V. V., & Balagani, K. S. (2007). K-Means+ID3: A novel method for supervised anomaly detection by cascading k-means clustering and ID3 decision tree learning methods. IEEE Transactions on Knowledge and Data Engineering, 19(3), 345–354.
Ilgun, K., & Kemmerer, A. (1995). State transition analysis: A rule-based intrusion detection approach. IEEE Transaction on Software Engineering, 21(3), 181–199.
Kumar, G. K., Viswanath, P., & Rao, A. A. (2011). Intrusion detection using an ensemble of decision trees. In Indian International Conference on Artificial Intelligence (pp. 382–392).
Kumar, G. K., Viswanath, P., & Rao, A. A. (2015). Ensemble of soft decision trees using multiple approximate fuzzy-rough set based reducts. International Journal of Information Processing, 9(2), 36–46.
Kumar, G. K., Viswanath, P., & Rao, A. A. (2016). Ensemble of randomized soft decision trees for robust classification. Sadhana, 41(3), 273–282.
Lee, W., & Stolfo, S. J. (1998). Data mining approaches for intrusion detection. In 7th USENIX Security Symposium.
Lichman, M. (2013). UCI machine learning repository. http://archive.ics.uci.edu/ml, University of California, Irvine, School of Information and Computer Sciences.
Lincoln Laboratory MIT.DARPA intrusion detection data sets. http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.html.
Lippman, R. P., Fried, D. J., Graf, I., & Zissman, M. A. (2000). Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings of DARPA Information Survivability Conference and Exosition (pp. 12–26).
Lunt, T., & Jagannathan, R. (1994). A prototype real-time intrusion-detection expert system. In Proceedings of 1988 IEEE Computer Society Symposium on Research in Security and Privacy (pp. 59–66). Washington: IEEE Computer Society Press.
Luo, J. (1999). Integrating fuzzy logic with data mining methods for intrusion detection.
Mukherjee, B., Heberlein, L., & Levitt, K. (1994). Network intrusion detection. Computer Networks, 8(3), 26–41.
Smaha, S. (1998). Haystack: An intrusion detection system. In Proceedings of the Fourth Aerospace Computer Security Applications Conference (pp. 37–44).
Zhou, L., & Jiang, F. (2011). A rough set based decision tree algorithm and its application in intrusion detection. In 4th International Conference on Pattern Recognition and Machine Intelligence (pp. 333–338). Berlin: Springer.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Gulla, K.K., Viswanath, P., Veluru, S.B., Kumar, R.R. (2020). Machine Learning Based Intrusion Detection Techniques. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_35
Download citation
DOI: https://doi.org/10.1007/978-3-030-22277-2_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22276-5
Online ISBN: 978-3-030-22277-2
eBook Packages: Computer ScienceComputer Science (R0)