Adrian Dsouza, Vedant Lanjewar, Abhishek Mahakal, S. Khachane
{"title":"基于机器学习技术的实时网络入侵检测","authors":"Adrian Dsouza, Vedant Lanjewar, Abhishek Mahakal, S. Khachane","doi":"10.1109/PuneCon55413.2022.10014863","DOIUrl":null,"url":null,"abstract":"This paper reflects the work carried out in network security using distinctive machine-based learning techniques. In response the exponential increase in network space breaches and data leaks, the demand for a system that can detect anomalies and notify the system admin is imperative. Using packet sniffing modules, we capture the packets and then compare them to a pre-trained machine learning module trained on the NSL KDD dataset to detect ambiguous packets. By selecting the desired port, the IDS (Intrusion Detection System) sniff all incoming packets and categorizes them as anomalous if their behavior is not normal. On successful prediction, we present the user with a choice to act against the prescribed threat or ignore it as per the user's request. A detailed analysis report shall then be presented periodically to provide an overview of the overall health of the system on which our IDS system has been deployed.","PeriodicalId":258640,"journal":{"name":"2022 IEEE Pune Section International Conference (PuneCon)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Real Time Network Intrusion Detection using Machine Learning Technique\",\"authors\":\"Adrian Dsouza, Vedant Lanjewar, Abhishek Mahakal, S. Khachane\",\"doi\":\"10.1109/PuneCon55413.2022.10014863\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper reflects the work carried out in network security using distinctive machine-based learning techniques. In response the exponential increase in network space breaches and data leaks, the demand for a system that can detect anomalies and notify the system admin is imperative. Using packet sniffing modules, we capture the packets and then compare them to a pre-trained machine learning module trained on the NSL KDD dataset to detect ambiguous packets. By selecting the desired port, the IDS (Intrusion Detection System) sniff all incoming packets and categorizes them as anomalous if their behavior is not normal. On successful prediction, we present the user with a choice to act against the prescribed threat or ignore it as per the user's request. A detailed analysis report shall then be presented periodically to provide an overview of the overall health of the system on which our IDS system has been deployed.\",\"PeriodicalId\":258640,\"journal\":{\"name\":\"2022 IEEE Pune Section International Conference (PuneCon)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Pune Section International Conference (PuneCon)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PuneCon55413.2022.10014863\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Pune Section International Conference (PuneCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PuneCon55413.2022.10014863","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Real Time Network Intrusion Detection using Machine Learning Technique
This paper reflects the work carried out in network security using distinctive machine-based learning techniques. In response the exponential increase in network space breaches and data leaks, the demand for a system that can detect anomalies and notify the system admin is imperative. Using packet sniffing modules, we capture the packets and then compare them to a pre-trained machine learning module trained on the NSL KDD dataset to detect ambiguous packets. By selecting the desired port, the IDS (Intrusion Detection System) sniff all incoming packets and categorizes them as anomalous if their behavior is not normal. On successful prediction, we present the user with a choice to act against the prescribed threat or ignore it as per the user's request. A detailed analysis report shall then be presented periodically to provide an overview of the overall health of the system on which our IDS system has been deployed.