Top Banner
MACHINE LEARNING MODELS FOR INTRUSION DETECTION SYSTEMS(IDS) Tips for developing academically sound IDS models and algorithms for Your IEEE Publication 2019 SEP 23, 2019 Copyright © 2019 PhD Assistance. All rights reserved
13

Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019

Sep 23, 2019

Download

Education

phdDissertation

1.AI is promising in the of detecting intrusions are cross-site scripting attacks, SQL injections, Denial of Service (DoS), Ransomware, etc. 2.Deep learning models able to accurately predict and recognize “normal activity” or malicious activity faster and generate a much lower percentage of false positives 3.Real-time IDS systems must not have a single fixed algorithm instead the algorithms must be updated regularly https://research.phdassistance.com/engineering-and-technology/machine-learning-models-for-intrusion-detection-systems-ids-tips-for-developing-academically-sound-ids-models-and-algorithms-for-your-ieee-publication-2019/
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019

MACHINE LEARNING MODELS FOR INTRUSION DETECTION

SYSTEMS(IDS)Tips for developing academically sound IDS

models and algorithms for Your IEEE Publication 2019

SEP 23, 2019

Copyright © 2019 PhD Assistance. All rights reserved

Page 2: Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019

TOPICS TO BE DISCUSSED

Intrusion Detection System

Types Of IDS Techniques

Pre-Processing IDS Data

IDS classification

Summary

Copyright © 2019 PhD Assistance. All rights reserved

About Us

Page 3: Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019

Copyright © 2019 PhD Assistance. All rights reserved

PhD Lab @PhD AssistanceEngineering and Technology:E&T Lab at PhD Assistance is involved in exploring novel research areas by conducting dynamic research. It promotes innovation in all fields of engineering by advancing the technology with structured and continuous research. The problems and challenges faced by the existing technologies and trends are explored by our researchers exists in scholarly literature, in theory, or in practices that needs deliberate investigation. These problems are identified and fixed by our researchers by suggesting better novel alternatives with appropriate tools, technologies and approaches, thereby proving their effectiveness in real time applications.

Page 4: Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019

INTRUSION

Unauthorised activities on the organisation's local

computer network

Copyright © 2019 PhD Assistance. All rights reserved

Page 5: Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019

MOST COMMON INTRUSIONS

Ransomware

Denial of Service (DoS)SQL

injections

Cross-site scriptingattacks

Copyright © 2019 PhD Assistance. All rights reserved

Page 6: Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019

Monitors network traffic for suspicious

activity and issues alerts.

INTRUSION DETECTION

SYSTEM

Scans a network or

a system for harmful activity.

It varies from a single

computer to large

network.

Copyright © 2019 PhD Assistance. All rights reserved

Page 7: Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019

IPS detect the intrusion &

prevent them

Creates a log

Restrict the access of intrusions

Blocks IP address source

INTRUSION PREVENTION

SYSTEM

Copyright © 2019 PhD Assistance. All rights reserved

Page 8: Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019

TYPES OF IDS TECHNIQUES

Network based(NIDS)

Host based intrusion

(HIDS)

Vulnerabilityassessment-

based(VIDS)Copyright © 2019 PhD Assistance. All rights reserved

Page 9: Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019

PRE-PROCESSING IDS DATAPerformed through data set(KDD’99, DARPA dataset)

Dataset size should be huge & balanced

Prevent intrusions in real-time traffic

Easier to categorize, reduce operation time and improves classification performance and accuracy.

Copyright © 2019 PhD Assistance. All rights reserved

Page 10: Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019

IDS

CLAS

SIFI

CATI

ON

Machine learning (ML)algorithm [Artificial Neural Networks]

Statistical anomalydetection algorithms

Data mining Algorithms

Knowledge-based detection

Copyright © 2019 PhD Assistance. All rights reserved

Page 11: Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019

A constant update willimprove the accuracy and reduce the error rates.

SUMMARY

Building an IDS isextremely challenging

Copyright © 2019 PhD Assistance. All rights reserved

Page 12: Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019

PhD Lab @PhD

AssistanceWWW.RESEARCH.PHDASSISTANCE.COM

Copyright © 2019 PhD Assistance. All rights reserved

Page 13: Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019

PHONE NUMBERUK: +44-1143520021

INDIA: +91-4448137070

EMAIL ADDRESS [email protected]

ANYQUERIES

APPROACH US

Copyright © 2019 PhD Assistance. All rights reserved

Get in touch

with us