Review on Network Intrusion Detection Techniques using Machine Learning

K. Shashank, Mamatha Balachandra

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

The security given to a network from unapproved access and dangers is broadly called as network security. It is the obligation of network managers to embrace preventive measures to shield their networks from potential security dangers. Computer networks that are associated with consistent data transactions inside the administration or business require security. The exponential development in the information that streams inside network, the quantity of individuals active on network, makes it essential to have a productive system that disallows outsiders to attack and access secret information. Consistently developing digital attacks should be checked to defend classified information. Machine learning methods which have a critical part in distinguishing the attacks are for the most part utilized as a part of the advancement of Intrusion Detection Systems. Because of colossal increment in network activity and diverse sorts of attacks, checking every single parcel in the system movement is tedious and computationally expensive.

Original languageEnglish
Title of host publication2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages104-109
Number of pages6
ISBN (Electronic)9781538653234
DOIs
Publication statusPublished - 25-03-2019
Event2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Mangalore, India
Duration: 13-08-201814-08-2018

Publication series

Name2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018 - Proceedings

Conference

Conference2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2018
Country/TerritoryIndia
CityMangalore
Period13-08-1814-08-18

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering
  • Computer Networks and Communications
  • Artificial Intelligence
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Review on Network Intrusion Detection Techniques using Machine Learning'. Together they form a unique fingerprint.

Cite this