AI NETWORK INTRUSION DETECTION SYSTEMUSING MULTI LAYER PERCEPTRON ALGORITHM

Authors

  • N.Karthigavani Faculty, Department of Computer Science and Engineering, Mahendra Engineering College, Mallasamudram,Namakkal ,Tamilnadu, India.
  • K.Pradeep Student, Department of Computer Science and Engineering, Mahendra Engineering College, Mallasamudram,Namakkal ,Tamilnadu, India.
  • V.Praveenraj Student, Department of Computer Science and Engineering, Mahendra Engineering College, Mallasamudram,Namakkal ,Tamilnadu, India.
  • S.Poovarasan Student, Department of Computer Science and Engineering, Mahendra Engineering College, Mallasamudram,Namakkal ,Tamilnadu, India.

DOI:

https://doi.org/10.29121/shodhkosh.v5.i3.2024.4437

Keywords:

Intrusion Detection, Machine Learning, Deep Learning, Multi-Layer Perceptron Algorithm, Network Datasets

Abstract [English]

An intrusion detection system, or IDS, is designed to be a software program that keeps an eye on system or network activity and alerts users when anything suspicious is happening. Concerns regarding how to safely transmit and preserve digital information are raised by the internet's explosive expansion and use. In order to obtain important information, hackers today employ a variety of attack techniques. New things like viruses and worms being imported as the internet becomes more prevalent in society. In order to create system vulnerabilities, malicious individuals employ a variety of methods, such as password cracking and the detection of unencrypted information. As a result, users require security to protect their system from hackers. One of the most often used security methods is the firewall mechanism, which is intended to keep private networks isolated from public networks. IDS are utilized in credit card fraud, medical applications, insurance agencies, and network-related operations. These assaults are detectable with the aid of numerous intrusion detection techniques, methods, and algorithms. This paper's primary goal is to present a comparative analysis of intrusion detection methods utilizing different deep learning and machine learning approaches. In this paper we can implement the multilayer perceptron algorithm to improve the accuracy in intrusion detection.

References

Aljawarneh, Shadi, Monther Aldwairi, and Muneer Bani Yassein. "Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model." Journal of Computational Science 25 (2018): 152-160. DOI: https://doi.org/10.1016/j.jocs.2017.03.006

Sultana, Nasrin, et al. "Survey on SDN based network intrusion detection system using machine learning approaches." Peer-to-Peer Networking and Applications 12.2 (2019): 493-501. DOI: https://doi.org/10.1007/s12083-017-0630-0

Peng, Kai, Victor CM Leung, and Qingjia Huang. "Clustering approach based on mini batch kmeans for intrusion detection system over big data." IEEE Access 6 (2018): 11897-11906. DOI: https://doi.org/10.1109/ACCESS.2018.2810267

Farahnakian, Fahimeh, and Jukka Heikkonen. "A deep auto-encoder based approach for intrusion detection system." 2018 20th International Conference on Advanced Communication Technology (ICACT). IEEE, 2018. DOI: https://doi.org/10.23919/ICACT.2018.8323687

Idhammad, Mohamed, Karim Afdel, and Mustapha Belouch. "Distributed intrusion detection system for cloud environments based on data mining techniques." Procedia Computer Science 127 (2018): DOI: https://doi.org/10.1016/j.procs.2018.01.095

-41.

Rustam, Zuherman, and Durrabida Zahras. "Comparison between support vector machine and fuzzy c-means as classifier for intrusion detection system." Journal of Physics: Conference Series. Vol. 1028. No. 1. IOP Publishing, 2018. DOI: https://doi.org/10.1088/1742-6596/1028/1/012227

Peng, Kai, et al. "Intrusion detection system based on decision tree over big data in fog environment." Wireless Communications and Mobile Computing 2018 (2018). DOI: https://doi.org/10.1155/2018/4680867

Pham, Ngoc Tu, et al. "Improving performance of intrusion detection system using ensemble methods and feature selection." Proceedings of the Australasian Computer Science Week Multiconference. 2018. DOI: https://doi.org/10.1145/3167918.3167951

Ahmad, Iftikhar, et al. "Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection." IEEE access 6 (2018): 33789- 33795. DOI: https://doi.org/10.1109/ACCESS.2018.2841987

Sahani, Roma, et al. "Classification of intrusion detection using data mining techniques." Progress in computing, analytics and networking. Springer, Singapore, 2018. 753-764. DOI: https://doi.org/10.1007/978-981-10-7871-2_72

Downloads

Published

2024-03-31

How to Cite

N.Karthigavani, K.Pradeep, V.Praveenraj, & S.Poovarasan. (2024). AI NETWORK INTRUSION DETECTION SYSTEMUSING MULTI LAYER PERCEPTRON ALGORITHM. ShodhKosh: Journal of Visual and Performing Arts, 5(3), 1313–1320. https://doi.org/10.29121/shodhkosh.v5.i3.2024.4437