Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019
-
Upload
phdDissertation -
Category
Education
-
view
4 -
download
0
description
Transcript of Tips for developing Academically sound IDS Models and algorithms for Your IEEE Publication 2019
MACHINE LEARNING MODELS FOR INTRUSION DETECTION
SYSTEMS(IDS)Tips for developing academically sound IDS
models and algorithms for Your IEEE Publication 2019
SEP 23, 2019
Copyright © 2019 PhD Assistance. All rights reserved
TOPICS TO BE DISCUSSED
Intrusion Detection System
Types Of IDS Techniques
Pre-Processing IDS Data
IDS classification
Summary
Copyright © 2019 PhD Assistance. All rights reserved
About Us
Copyright © 2019 PhD Assistance. All rights reserved
PhD Lab @PhD AssistanceEngineering and Technology:E&T Lab at PhD Assistance is involved in exploring novel research areas by conducting dynamic research. It promotes innovation in all fields of engineering by advancing the technology with structured and continuous research. The problems and challenges faced by the existing technologies and trends are explored by our researchers exists in scholarly literature, in theory, or in practices that needs deliberate investigation. These problems are identified and fixed by our researchers by suggesting better novel alternatives with appropriate tools, technologies and approaches, thereby proving their effectiveness in real time applications.
INTRUSION
Unauthorised activities on the organisation's local
computer network
Copyright © 2019 PhD Assistance. All rights reserved
MOST COMMON INTRUSIONS
Ransomware
Denial of Service (DoS)SQL
injections
Cross-site scriptingattacks
Copyright © 2019 PhD Assistance. All rights reserved
Monitors network traffic for suspicious
activity and issues alerts.
INTRUSION DETECTION
SYSTEM
Scans a network or
a system for harmful activity.
It varies from a single
computer to large
network.
Copyright © 2019 PhD Assistance. All rights reserved
IPS detect the intrusion &
prevent them
Creates a log
Restrict the access of intrusions
Blocks IP address source
INTRUSION PREVENTION
SYSTEM
Copyright © 2019 PhD Assistance. All rights reserved
TYPES OF IDS TECHNIQUES
Network based(NIDS)
Host based intrusion
(HIDS)
Vulnerabilityassessment-
based(VIDS)Copyright © 2019 PhD Assistance. All rights reserved
PRE-PROCESSING IDS DATAPerformed through data set(KDD’99, DARPA dataset)
Dataset size should be huge & balanced
Prevent intrusions in real-time traffic
Easier to categorize, reduce operation time and improves classification performance and accuracy.
Copyright © 2019 PhD Assistance. All rights reserved
IDS
CLAS
SIFI
CATI
ON
Machine learning (ML)algorithm [Artificial Neural Networks]
Statistical anomalydetection algorithms
Data mining Algorithms
Knowledge-based detection
Copyright © 2019 PhD Assistance. All rights reserved
A constant update willimprove the accuracy and reduce the error rates.
SUMMARY
Building an IDS isextremely challenging
Copyright © 2019 PhD Assistance. All rights reserved
PhD Lab @PhD
AssistanceWWW.RESEARCH.PHDASSISTANCE.COM
Copyright © 2019 PhD Assistance. All rights reserved
PHONE NUMBERUK: +44-1143520021
INDIA: +91-4448137070
EMAIL ADDRESS [email protected]
ANYQUERIES
APPROACH US
Copyright © 2019 PhD Assistance. All rights reserved
Get in touch
with us