AI NETWORK INTRUSION DETECTION SYSTEMUSING MULTI LAYER PERCEPTRON ALGORITHM
DOI:
https://doi.org/10.29121/shodhkosh.v5.i3.2024.4437Keywords:
Intrusion Detection, Machine Learning, Deep Learning, Multi-Layer Perceptron Algorithm, Network DatasetsAbstract [English]
An intrusion detection system, or IDS, is designed to be a software program that keeps an eye on system or network activity and alerts users when anything suspicious is happening. Concerns regarding how to safely transmit and preserve digital information are raised by the internet's explosive expansion and use. In order to obtain important information, hackers today employ a variety of attack techniques. New things like viruses and worms being imported as the internet becomes more prevalent in society. In order to create system vulnerabilities, malicious individuals employ a variety of methods, such as password cracking and the detection of unencrypted information. As a result, users require security to protect their system from hackers. One of the most often used security methods is the firewall mechanism, which is intended to keep private networks isolated from public networks. IDS are utilized in credit card fraud, medical applications, insurance agencies, and network-related operations. These assaults are detectable with the aid of numerous intrusion detection techniques, methods, and algorithms. This paper's primary goal is to present a comparative analysis of intrusion detection methods utilizing different deep learning and machine learning approaches. In this paper we can implement the multilayer perceptron algorithm to improve the accuracy in intrusion detection.
References
Aljawarneh, Shadi, Monther Aldwairi, and Muneer Bani Yassein. "Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model." Journal of Computational Science 25 (2018): 152-160. DOI: https://doi.org/10.1016/j.jocs.2017.03.006
Sultana, Nasrin, et al. "Survey on SDN based network intrusion detection system using machine learning approaches." Peer-to-Peer Networking and Applications 12.2 (2019): 493-501. DOI: https://doi.org/10.1007/s12083-017-0630-0
Peng, Kai, Victor CM Leung, and Qingjia Huang. "Clustering approach based on mini batch kmeans for intrusion detection system over big data." IEEE Access 6 (2018): 11897-11906. DOI: https://doi.org/10.1109/ACCESS.2018.2810267
Farahnakian, Fahimeh, and Jukka Heikkonen. "A deep auto-encoder based approach for intrusion detection system." 2018 20th International Conference on Advanced Communication Technology (ICACT). IEEE, 2018. DOI: https://doi.org/10.23919/ICACT.2018.8323687
Idhammad, Mohamed, Karim Afdel, and Mustapha Belouch. "Distributed intrusion detection system for cloud environments based on data mining techniques." Procedia Computer Science 127 (2018): DOI: https://doi.org/10.1016/j.procs.2018.01.095
-41.
Rustam, Zuherman, and Durrabida Zahras. "Comparison between support vector machine and fuzzy c-means as classifier for intrusion detection system." Journal of Physics: Conference Series. Vol. 1028. No. 1. IOP Publishing, 2018. DOI: https://doi.org/10.1088/1742-6596/1028/1/012227
Peng, Kai, et al. "Intrusion detection system based on decision tree over big data in fog environment." Wireless Communications and Mobile Computing 2018 (2018). DOI: https://doi.org/10.1155/2018/4680867
Pham, Ngoc Tu, et al. "Improving performance of intrusion detection system using ensemble methods and feature selection." Proceedings of the Australasian Computer Science Week Multiconference. 2018. DOI: https://doi.org/10.1145/3167918.3167951
Ahmad, Iftikhar, et al. "Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection." IEEE access 6 (2018): 33789- 33795. DOI: https://doi.org/10.1109/ACCESS.2018.2841987
Sahani, Roma, et al. "Classification of intrusion detection using data mining techniques." Progress in computing, analytics and networking. Springer, Singapore, 2018. 753-764. DOI: https://doi.org/10.1007/978-981-10-7871-2_72
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 N.Karthigavani, K.Pradeep, V.Praveenraj, S.Poovarasan

This work is licensed under a Creative Commons Attribution 4.0 International License.
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.