TY - JOUR
T1 - Comparison study of machine learning classifiers to detect anomalies
AU - Shetty, Nisha P.
AU - Shetty, Jayashree
AU - Narula, Rohil
AU - Tandona, Kushagra
N1 - Publisher Copyright:
© 2020 Institute of Advanced Engineering and Science. All rights reserved.
PY - 2020/10
Y1 - 2020/10
N2 - In this era of Internet ensuring the confidentiality, authentication and integrity of any resource exchanged over the net is the imperative. Presence of intrusion prevention techniques like strong password, firewalls etc. are not sufficient to monitor such voluminous network traffic as they can be breached easily. Existing signature based detection techniques like antivirus only offers protection against known attacks whose signatures are stored in the database.Thus, the need for real-time detection of aberrations is observed. Existing signature based detection techniques like antivirus only offers protection against known attacks whose signatures are stored in the database. Machine learning classifiers are implemented here to learn how the values of various fields like source bytes, destination bytes etc. in a network packet decides if the packet is compromised or not . Finally the accuracy of their detection is compared to choose the best suited classifier for this purpose. The outcome thus produced may be useful to offer real time detection while exchanging sensitive information such as credit card details.
AB - In this era of Internet ensuring the confidentiality, authentication and integrity of any resource exchanged over the net is the imperative. Presence of intrusion prevention techniques like strong password, firewalls etc. are not sufficient to monitor such voluminous network traffic as they can be breached easily. Existing signature based detection techniques like antivirus only offers protection against known attacks whose signatures are stored in the database.Thus, the need for real-time detection of aberrations is observed. Existing signature based detection techniques like antivirus only offers protection against known attacks whose signatures are stored in the database. Machine learning classifiers are implemented here to learn how the values of various fields like source bytes, destination bytes etc. in a network packet decides if the packet is compromised or not . Finally the accuracy of their detection is compared to choose the best suited classifier for this purpose. The outcome thus produced may be useful to offer real time detection while exchanging sensitive information such as credit card details.
UR - http://www.scopus.com/inward/record.url?scp=85087161591&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85087161591&partnerID=8YFLogxK
U2 - 10.11591/IJECE.V10I5.PP5445-5452
DO - 10.11591/IJECE.V10I5.PP5445-5452
M3 - Article
AN - SCOPUS:85087161591
SN - 2088-8708
VL - 10
SP - 5445
EP - 5452
JO - International Journal of Electrical and Computer Engineering
JF - International Journal of Electrical and Computer Engineering
IS - 5
ER -