A Review on Intrusion Detection System using Machine Learning
Authors: Nitika jain, Dr Jitendra Singh Chouhan
Certificate: View Certificate
Abstract
An intrusion detection system (IDS) are devices or software’s that are used to monitors networks for any unkind activities that bridge the normal functionality of systems hence causing some policy violation. This paper reviews some of the intrusion detection systems and software’s highlighting their main classifications and their performance evaluations and measure. As in today’s developing network environment there is threat of new type of attacks daily in the network. So, the network administration system is also needed to be updated regularly for up gradation of security level. One of the network packet monitoring system is Intrusion detection systems (IDS).There are many techniques in the literature for developing these defense systems. However, it is also important to examine the improvement of the datasets used to train and test these security systems. Enhanced datasets extend the detection capabilities of offline and online intrusion detection models. Standard datasets such as KDD 99 and NSL-KDD are obsolete and do not contain data on current attacks such as denial of service. Therefore, they are not suitable for evaluation. This article presents an indepth analysis of IDS records and presents the challenges of IDS. This article also provides an overview of the deep learning approach that can be used to develop a better network intrusion detection system.
Introduction
compromise the overall integrity and confidentiality of a resource. The goal therefore of intrusion detection is to identify accessors that attempt to intrude and compromise systems security controls. Current IDS examine the entire data features to detect any intrusion and misuse patterns, although some of the features may be redundant and may contribute less to the detection process [1]. Current anomaly based intrusion detection systems and many other technical approaches have been developed and deployed to track novel attacks on systems. 98% detection rates at a high and 1% at a low alarm rate can therefore be achieved by using these techniques [2]. This paper review the various intrusion detection systems by evaluating their performance measures.
Conclusion
information security has become a legitimate concern for organizations and computer users due to the growing trust in computers and electronic transactions. Various techniques are used to ensure a company\'s security against threats or attacks. On the other hand, attackers are discovering new techniques and ways to violate these security guidelines. The main types of IDS technologies - network-based, wireless and host-based offer substantially different functions. This paper reviews and analyses the research area for intrusion detection systems (IDSs) based on deep learning (DL) techniques into a coherent taxonomy and identifies the gap in this pivotal research area Insert acknowledgment, if any. The preferred spelling of the word “acknowledgment” in American English is without an “e” after the “g.” Use the singular heading even if you have many acknowledgments. Avoid expressions such as “One of us (S.B.A.) would like to thank ....” Instead, write “F. A. Author thanks ... .” Sponsor and financial support acknowledgments are also placed here.
Copyright
Copyright © 2025 Nitika jain, Dr Jitendra Singh Chouhan. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.