Network Intrusion Detection using ML Techniques for Sustainable Information System

Network intrusion detection is a vital element of cybersecurity, focusing on identification of malicious activities within computer networks. With the increasing complexity of cyber-attacks and the vast volume of network data being spawned, traditional intrusion detection methods are becoming less e...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:E3S web of conferences 2023-01, Vol.430, p.1064
Hauptverfasser: Chandra Mouli, K., Indupriya, B., Ushasree, D., Raghavendran, Ch.V., Rawat, Babita, Madhu, Bhukya
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Network intrusion detection is a vital element of cybersecurity, focusing on identification of malicious activities within computer networks. With the increasing complexity of cyber-attacks and the vast volume of network data being spawned, traditional intrusion detection methods are becoming less effective. In response, machine learning has emerged as a promising solution to enhance the accuracy and efficiency of intrusion detection. This abstract provides an overview of proper utilization of machine learning techniques in intrusion detection and its associated benefits. The base paper explores various machine learning algorithms employed for intrusion detection and evaluates their performance. Findings indicate that machine learning algorithms exhibit a significant improvement in intrusion detection accuracy compared to traditional methods, achieving an accuracy rate of approximately 90 percent. It is worth noting that the previous work experienced computational challenges due to the time-consuming nature of the utilized algorithm when processing datasets. In this paper, we propose the exertion of more efficient algorithms to compute datasets, resulting in reduced processing time and increased precision compared to other algorithms to provide sustainability. This approach proves particularly when computational resources are limited or when the relationship between features and target variables is relatively straightforward.
ISSN:2267-1242
2267-1242
DOI:10.1051/e3sconf/202343001064