Uploaded on Sep 23, 2019
1.AI is promising in the of detecting intrusions are cross-site scripting attacks, SQL injections, Denial of Service (DoS), Ransomware, etc. 2.Deep learning models able to accurately predict and recognize “normal activity” or malicious activity faster and generate a much lower percentage of false positives 3.Real-time IDS systems must not have a single fixed algorithm instead the algorithms must be updated regularly
Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019
SEP 23, 2019
MACHINE LEARNING MODELS
FOR INTRUSION DETECTION
SYSTEMS(IDS)
Tips for developing academically sound IDS
models and algorithms for Your IEEE Publication
2019
Copyright © 2019 PhD Assistance. All rights reserved
TOPICS TO BE DISCUSSED
About Us
Intrusion Detection System
Types Of IDS Techniques
Pre-Processing IDS Data
IDS classification
Summary
Copyright © 2019 PhD Assistance. All rights reserved
PhD Lab @
PhD Assistance
Engineering and Technology:
E&T Lab at PhD Assistance is involved in exploring novel research
areas by conducting dynamic research. It promotes innovation in all
fields of engineering by advancing the technology with structured
and continuous research. The problems and challenges faced by the
existing technologies and trends are explored by our researchers
exists in scholarly literature, in theory, or in practices that needs
deliberate investigation. These problems are identified and fixed by
our researchers by suggesting better novel alternatives with
appropriate tools, technologies and approaches, thereby proving
their effectiveness in real time applications.
Copyright © 2019 PhD Assistance. All rights reserved
INTRUSION
Unauthorised activities on
the organisation's local
computer network
Copyright © 2019 PhD Assistance. All rights reserved
Ransomware
Denial of
Service
(DoS) MOST COMMON
SQL INTRUSIONS
injections
Cross-site
scripting
attacks
Copyright © 2019 PhD Assistance. All rights reserved
Monitors
network
traffic for
suspicious
activity and
issues alerts.
Scans a
network or INTRUSION It varies from
a system for a single
harmful DETECTION computer to
activity. large SYSTEM network.
Copyright © 2019 PhD Assistance. All rights reserved
Creates a
log
IPS detect the INTRUSION
Blocks IP
intrusion & PREVENTION address source
prevent them
SYSTEM
Restrict the access of
Copyright © 2019 PhD Assistance. All rights reserved intrusions
TYPES OF IDS TECHNIQUES
Network based
(NIDS)
Host based
intrusion
(HIDS)
Vulnerability
assessment-
based
Copyright © 2019 PhD Assistance. All rights reserved (VIDS)
PRE-PROCESSING IDS DATA
Performed through data set(KDD’99,
DARPA dataset)
Dataset size should be huge & balanced
Prevent intrusions in real-time traffic
Easier to categorize, reduce operation
time and improves classification
performance and accuracy.
Copyright © 2019 PhD Assistance. All rights reserved
Statistical anomaly
detection algorithms
Machine learning (ML)
algorithm [Artificial Neural
Networks]
Knowledge-based detection
Data mining Algorithms
Copyright © 2019 PhD Assistance. All rights reserved
IDS CLASSIFICATION
SUMMARY
Building an IDS is
extremely challenging
A constant update will
improve the accuracy and
reduce the error rates.
Copyright © 2019 PhD Assistance. All rights reserved
PhD Lab @
PhD
Assistance
WWW.RESEARCH.PHDASSISTANCE.COM
Copyright © 2019 PhD Assistance. All rights reserved
PHONE NUMBER
ANY
UK: +44-1143520021 QUERIES
INDIA: +91-4448137070 APPROACH US
EMAIL ADDRESS [email protected]
om
Get in
Copyright © 2019 PhD Assistance. All rights reserved touch
with us
Comments