{"title":"基于机器学习的入侵检测","authors":"Shivam Kejriwal, Devika Patadia, Saloni Dagli, Prachi Tawde","doi":"10.1109/ICAECC54045.2022.9716648","DOIUrl":null,"url":null,"abstract":"Intrusion refers to any malicious activity done in order to access confidential data. An intrusion detection system (IDS) detects these attacks and, on detection, it reports them to the administrator. It does so either by comparing the new activity with the past activities or by analyzing the network performance. This system forms a part of the vast security module and works with several other such sub-modules in order to make sure that these unwanted intrusions do not go unreported. The system that has been implemented in this paper is an anomaly-based Intrusion Detection System (IDS). The primary purpose of this implementation is to develop an efficient system in order to detect any external or internal unauthenticated activity. Several models have been experimented with in order to find one that suits the system the best and gives a good enough accuracy. The models that have been experimented with include Logistic Regressor, Random Forest Classifier, K Nearest Neighbor classifier, XGBoost Classifier, Gaussian Naive Bayes Classifier and a Multi-Layer Perceptron Classifier (MLP). Further, the accuracy of each of these models was calculated, and a comparative analysis was done between the performance of these models. The model that performed the best in this particular use case was the Random Forest Classifier giving an accuracy of 99.8% and a macro average F1-Score of 0.98.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Machine Learning Based Intrusion Detection\",\"authors\":\"Shivam Kejriwal, Devika Patadia, Saloni Dagli, Prachi Tawde\",\"doi\":\"10.1109/ICAECC54045.2022.9716648\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Intrusion refers to any malicious activity done in order to access confidential data. An intrusion detection system (IDS) detects these attacks and, on detection, it reports them to the administrator. It does so either by comparing the new activity with the past activities or by analyzing the network performance. This system forms a part of the vast security module and works with several other such sub-modules in order to make sure that these unwanted intrusions do not go unreported. The system that has been implemented in this paper is an anomaly-based Intrusion Detection System (IDS). The primary purpose of this implementation is to develop an efficient system in order to detect any external or internal unauthenticated activity. Several models have been experimented with in order to find one that suits the system the best and gives a good enough accuracy. The models that have been experimented with include Logistic Regressor, Random Forest Classifier, K Nearest Neighbor classifier, XGBoost Classifier, Gaussian Naive Bayes Classifier and a Multi-Layer Perceptron Classifier (MLP). Further, the accuracy of each of these models was calculated, and a comparative analysis was done between the performance of these models. The model that performed the best in this particular use case was the Random Forest Classifier giving an accuracy of 99.8% and a macro average F1-Score of 0.98.\",\"PeriodicalId\":199351,\"journal\":{\"name\":\"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)\",\"volume\":\"58 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAECC54045.2022.9716648\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECC54045.2022.9716648","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Intrusion refers to any malicious activity done in order to access confidential data. An intrusion detection system (IDS) detects these attacks and, on detection, it reports them to the administrator. It does so either by comparing the new activity with the past activities or by analyzing the network performance. This system forms a part of the vast security module and works with several other such sub-modules in order to make sure that these unwanted intrusions do not go unreported. The system that has been implemented in this paper is an anomaly-based Intrusion Detection System (IDS). The primary purpose of this implementation is to develop an efficient system in order to detect any external or internal unauthenticated activity. Several models have been experimented with in order to find one that suits the system the best and gives a good enough accuracy. The models that have been experimented with include Logistic Regressor, Random Forest Classifier, K Nearest Neighbor classifier, XGBoost Classifier, Gaussian Naive Bayes Classifier and a Multi-Layer Perceptron Classifier (MLP). Further, the accuracy of each of these models was calculated, and a comparative analysis was done between the performance of these models. The model that performed the best in this particular use case was the Random Forest Classifier giving an accuracy of 99.8% and a macro average F1-Score of 0.98.