Machine Learning Techniques For Network-1
Machine Learning Techniques For Network-1
Volume 9.
Rajesh Dhakad et al., International Journal of Emerging No.12,
Trends December 2021
in Engineering Research, 9(12), December 2021, 1477 – 1483
International Journal of Emerging Trends in Engineering Research
Available Online at http://www.warse.org/IJETER/static/pdf/file/ijeter059122021.pdf
https://doi.org/10.30534/ijeter/2021/059122021
Received Date : November 06, 2021 Accepted Date : November 28, 2021 Published Date : December 07, 2021
1477
Rajesh Dhakad et al., International Journal of Emerging Trends in Engineering Research, 9(12), December 2021, 1477 – 1483
main disadvantage that is, it can only detect the attack whose There are three types of IDS methods: knowledge-based,
attack patterns are already known or store in the database. statistics-based, and machine learning-based. The
Unknown attack pattern cannot be detected by this method knowledge- based approach uses existing system data such as
[4]. network traffic instances and protocol specifications to
Anomaly-Based Detection: In the Anomaly Based determine the requested actions [7]. In contrast, a
Detection Approach, the user’s regular behavior is first saved statistics-based technique builds a statistical model of user
in the database, and then the user’s present behavior is behavior by collecting and analyzing every data record in a
compared to the data stored in the database. When a big group of objects [8], whereas machine-learning algorithms
divergence is discovered, it is assumed that an intrusion has identify deep hidden pattern-matching from training data [9].
taken place [5]. Unknown threats and anomalous activity of a This survey focuses mostly on machine learning-based
network or host are detected via anomaly-based detection. approaches.
Anomalies can be discovered in a variety of methods.
Researchers have created a variety of Machine 2.1 Machine Learning Approach
Learning-based approaches to detect these anomalies. There are three main types of machine learning
Although anomaly-based IDS detects new attacks, it has the methodologies i. e. supervised learning, unsupervised
disadvantage of producing a large numbers of false negative learning and reinforcement learning.
and false positives.
A. Supervised Learning: It is named as supervised, because
B. Limitation of IDS: IDS have some limitations which it used labeled data instances in training phase to train
describe as follows: algorithm that classify the data instances and predicts the
outcomes. The algorithm is trained until it can detect the
• Traditional IDS can only detect known attacks. So the
hidden pattern and co-relation between the input data and
new unknown and original attacks cannot be output labels. Classification is one of the methods of
identifiedby these traditional IDS. supervised learning [4] [6] [10].
• Unstructured Data: There are lots of incoming and
on- going traffic on the network. This traffic data have Various algorithms for supervised learning exist. Nearest
no valid format. So there is a big problem to bring this Neighbor Algorithm, Artificial Neural Network, Support
traffic data into a valid format or in systematic Vector Machine, Decision Trees (ID3, CART, C4.5,
manner. Random Forrest), Bayesian Statistics, K-nearest neighbour,
• False Negative: Most of the IDS produced false Hidden Markov Model Boosting, Ensembles classifiers,
negativestate. In this state an IDS mistakenly detect Naive Bayes classifier, Bayesian Networks Logistic
an activity as normal when the activity actually an regression, Fisher Linear Discriminant, Perceptron).
attack. Quadratic classifiers are all examples of linear classifiers.
• False Positive: Various IDS suffered with false
positive state. In this state IDS identify normal activity B. Unsupervised Learning: As the name indicates,
as an attack. unsupervised learning is a machine learning approach in
By addressing all these mentioned problems, computational which models are not trained with labeled data instances
power can be reduced and detection rate of IDS can be in training phase. Instead, model discover hidden pattern
improved with the help of machine learning Techniques. By from the given data by itself. Clustering is one of the method
using Machine learning based techniques network traffic of unsupervised learning. Fuzzy clustering, K-means
data can be analyzed properly and organized into a systematic clustering, Apriori algorithm, Eclat algorithm, Hierarchical
clustering and Outliers detection (Local outlier factor), Self-
manner. The learning process follows a data-centric
organizing map are some of the unsupervised learners [5]
approach. It is assumed that in the audit data every authorized
[10].
and unauthorized activity have their footprint [3]. In
Machine learning field classification is one of the methods. C. Reinforcement Learning: Reinforcement learning
In thismethod a model is constructed from the pre-classified refers to a computer system that interacts with a dynamic
dataset. Many academics and researchers have worked on environment in order to achieve a specific goal [10].
develop- ing IDS over the years. This paper summarizes
recent research in IDS. This paper listed the various Machine
2.2 Supervised Learning Based Classifiers to Design Ids.
Learning based classification techniques and algorithms.
A Machine learning technique or algorithm can be
employed as a standalone classifier in the development of an
2. RELATED WORK IDS. In this section some machine learning-based
techniques are discussed that have been utilized to construct
This section gives an overview of recent work that has been IDS.
proposed to ensure a higher detection accuracy rate of IDS.
1478
Rajesh Dhakad et al., International Journal of Emerging Trends in Engineering Research, 9(12), December 2021, 1477 – 1483
1) Naive Bayes: The Naive Bayes classifier considers that scientists easy and faster to collect, analyze, and understand
the training dataset’s attributes are conditionally massive amounts of data. Deep learning algorithm achieves
independent and so attempts to estimate the this by employing a multi-layered structure of algorithms
class-conditional probability using the given class label [11]. known as neural networks [18].
When only simpler relationships exist, the Naive Bayes
classifier delivers the best results. The Naive Bayes classifier 7) Artificial neural network (ANN): One of the most unique
just needs to scan the training dataset once, which saves time fields of artificial intelligence is ANN. The underlying
and effort. concept of an ANN is inspired by the biological neural
networks that make up the operation of the human brain
2) Decision tree: A decision tree is a tree-based [19]. ANN is collection of large number of units that are
classification technique that predicts the target class value interconnected in some pattern to provide communication
for unknown test data instances based on a set of conditions between nodes or neurons. An ANN typically organized in
and previously known data examples. On the basis of some layer manner in which each layer have some interconnected
decision rules, a decision tree classifier classifies unseen nodes which contain the activation function. The input layer,
incoming test data examples [12]. Because of the easier hidden layer, and output layer are the three layers that make
implementation and simplicity, decision tree is one of the up an Artificial Neural Network. The input layer accepts
most popular as a single classifier [13]. There are two forms data in a variety of formats that the programmer provides.
of decision trees: classification trees and regression trees Between the input and output layers, the hidden layer acts
[12]. as an intermediary. To uncover hidden patterns and features,
it executes all of the transformations and calculations. After
3) K-nearest neighbor: In k-nearest neighbor (K-NN), a that, the hidden layers are linked to an output layer, which
variety of distance measurement methods are used. TheK-NN provides the detection result.
technique finds K examples in the training dataset that are Table 1 : Research Papers Based On Supervised Learning
closest to the test examples, and then assigns the most Algorithms
common class among the training examples to the test
Classifier Paper Name Author
example. The k-NN approach can be used for both K-NN • Anomaly detection techniques for a (G. Davanzo,
classification and regression, but it is most commonly utilized web defacement monitoring service. 2011) [22]
for classification problems. K-NN algorithm is one of themost
Naive Bayes • A NIDS by using a hidden naive (Levent Koc,
simple and non-parametric algorithm [14] that does not make bayes multiclass classifier. 2012) [20]
any assumption on underlying data. • Malicious web content detection by (YungTsung,
using naive bayes classifier. ,2010) [21]
4) Support Vector Machine: Support Vector Machine SVM • Design Network traffic anomaly dete (Carlos A.
ction system by using an autonomous Catania) [15]
(SVM) was first introduced in the mid-to-late 1990s [15]. labeling approach to SVM.
The basic concept of using the SVM algorithm to develop an • Machine learning based malicious (Yung-Tsung,
web content detection system. 2010) [21]
IDS is that it uses the training dataset to describe only the • A web defacement monitoring service (G. Davanzo,
normal class objects or those that are not anomalous in the for anomaly detection. 2011) [22]
IDS, while the rest of the class objects are assumed to be Decision Tree • Malicious web content detection by (Yung-Tsung,
anomalous [16]. SVM algorithm is extremely popular Using Decision Tree Algorithm. 2010) [23]
• IDS based on Data Mining Approach. (Su-Yun Wua,
because it has the ability to handle multiple categorical and • A Machine learning approach for IDS. 2009) [24]
continuous variables.
ANN • A stepping-stone IDS by using NN. (HanChing
Wu) [25]
5) Random Forest Classifier: It names as Random forest • An IDS using NN classifier. (S.Devaraju,
(RF) because it consists a large number of independent 2013) [26]
Fuzzy Logic • IDS using Data Mining based (Su-Yun Wua,
decision tree that operate as an ensemble. It generates Approach. 2009) [24]
decision trees from randomly picked data points, receives ID3 • An Efficient algorithm for NIDS. (V. Jaiganesh,
predictions from each independent tree, and votes on the one (2014) [27]
that produces the best outcome. The authors [17], used a
random forest classifier to create a NIDS. RF algorithm is
used to perform effective classification of attacks for IDS. 2.3 Unsupervised Learning Based Algorithm to Design Ids.
1) K-mean cluster: The K-mean algorithm is a popular
6) Deep Learning: Deep learning is a machine learning and clustering technique that aims to divide ‘N’ data points into
artificial intelligence (AI) technique that mimics how people ‘K’ clusters, with each data point selected by the clusters
acquire certain types of knowledge. Data science, which nearest mean. The approach of K-mean clustering is based on
covers statistics and predictive modeling, includes deep distance. The distance between the data points is calculated
learning as a key component. It makes the task of data using the Euclidean metric approach. The number of clusters
1479
Rajesh Dhakad et al., International Journal of Emerging Trends in Engineering Research, 9(12), December 2021, 1477 – 1483
defined by user at the execution time of algorithm. A which have pairs of clusters, and sub-clusters are joined
numbersof solutions will be tested until the most suitable one as one travelsup the hierarchy in this clustering process.
is chosen [28]. Divisive Cluster: It’s also a clustering method that uses
2) Hierarchical Clustering: It is a technique of clustering an iterative clustering strategy. The cluster with the
whose aims to create a hierarchy of clusters. Agglomerative biggest diameter in feature space is chosen and divided
and Divisive are the two basic approaches for hierarchical into binary sub-clusters with a lower range using this
clustering [28]. method.
Agglomerative cluster: It’s a clustering method that
uses a bottom-up approach. Clusters have sub-clusters,
Table 2: Comparative Analysis of Machine Learning Techniques for Ids
Na¨ıve Bayes • The Naive Bayes classifier considers that the • Construction of model is easy [6]. • Attributes are conditionally autonomous,
training dataset’s attributes are conditionally • Training is fast an easy [21]. which is not right all the time [20].
independent and so attempts to estimate the class • it can handle noisy data [4].
-conditional probability using the given class label • This model is highly scalable [21].
[11]. When only simpler relationships exist,
the Naive Bayes classifier delivers the best results.
clustering, K-NN and Damper-shafer theory to improve the
2.4 Ensemble Learning performance of NIDS in [32] Chan TS, Yen KK and Luo
J, using an high and low dimensional feature spaces with
In simple, the process of training multiple machine learning
correlation analysis.
models and combining their outputs together to get better
prediction is known as ensemble learning [29]. Various ma- • Arif jamal malik et.al, proposed”Hybrid binary PSO and
chine learning models are used as a base to create an efficient random forest (RF) based NIDS”. To select most appropriate
model. Averaging the outputs of different models is one of features for classification author used BINARY- PSO.
the simple ensemble learning techniques. Bagging and Random forest classifier algorithm is used to classify the
booting are also common methods for combining various classes of attacks [33].
learners [30] and there are many more complex algorithms
and techniques developed to combine the prediction of many • Mohammad abu alsheikh et al in [34] have proposed a
base machine learning models together. multilevel based classification model by using Neural
2.5 Hybrid Classifiers Network and K-NN classification algorithm. For anomaly
The term hybrid classifier refers to a classification system that detection K- NN classifier was used to classify the given data
uses multiple Machine Learning approaches or algorithms. A into one of thetwo category either normal or anomaly. In next
hybrid method is used to improve the detection rate of IDS. step a neural network is used to detect a specific type of attack
There are some papers in which author uses hybrid classifiers in anomaly.
to build an efficient intrusion detection system [31].
• An IDS is implemented by using a combination of fuzzy Table 3 : Research Paper Based On Hybrid Classifier
1480
Rajesh Dhakad et al., International Journal of Emerging Trends in Engineering Research, 9(12), December 2021, 1477 – 1483
then try to reduce the computation power requirement of Information Processing-2016 (IMCIP-2016) Random
traditional signature based IDS based on the output of Forest Modeling for Network Intrusion Detec- tion
anomaly based IDS. System Nabila Farnaaz and M. A. Jabbar MJCET
Hyderabad, India.
REFERENCES 18. Tich Phuoc Tran, L. C. (2009). Novel Intrusion
Detection using Proba- bilistic Neural.
1. Decision Tree: A Machine Learning for Intrusion
19. Haykin, S. (1999). Neural networks: A
Detection Shilpashree. S, S. C. Lingareddy, Nayana G
comprehensive foundation (2nd Edition). New
Bhat, Sunil Kumar G.
Jersey: Prentice Hall.
2. Neha G.Relan, prof. Dharmaraj R. Patil,
20. Levent Koc, T. A. (2012). A network intrusion
”Implementation of Network Intrusion Detection detection system based on a Hidden Na¨ıve Bayes
System using Varient of Decision Tree algorithm” multiclass classifier.
IsCNTE-2015 21. Yung-Tsung Hou, Y. C.-S.-M. (2010). Malicious web
3. ”AN IMPROVED METHOD TO DETECT content detection by machine learning.
INTRUSION USING MA- CHINE LEARNING 22. G. Davanzo, E. M. (2011). Anomaly detection
ALGORITHMS”. Urvashi Modi1 and Anurag Jain2. techniques for a web defacement monitoring
CSE departments, Radharaman inst. of Tech and service.
Science, Bhopal, India 23. Yung-Tsung Hou, Y. C.-S.-M. (2010). Malicious web
4. ”Network Intrusion Detection using Selected Data content detection by machine learning.
Mining Approaches: A Review”. Munawara Saiyara 24. Su-Yun Wua, E. Y. (2009). Data mining-based
Munia, Samira Samrose, Pranab Dey. intrusion detectors.
5. Rachna kulhare, and Dr. Divakar Singh ”Survey paper 25. Han-Ching Wu, S.-H. S. (2010). Neural
on intrusion detection techniques” October 2007. networks-based detection of stepping-stone
6. Harshna (M.Tech C.S.E), NavneetKaur.’Survey paper intrusion.
on Data Mining techniques of Intrusion Detection’ 26. ”DETECTION OF ACCURACY FOR
April 2013. INTRUSION DETECTION SYSTEM USING
7. S. Elhag, A. Ferna´ndez, A. Bawakid, S. Alshomrani, NEURAL NETWORK CLASSIFIER.”S. Devaraju,
and F. Herrera, ”On the combination of genetic fuzzy S. R. (2013).
systems and pairwise learning for improving 27. ’An Efficient Algorithm for Network Intrusion
detection rates on intrusion detection systems,” 2015. Detection System’. V. Jaiganesh, P.
8. Chao, S. Wen, and C. Fong, ”CANN: an intrusion Rutravigneshwaran,P. Sumathi, Ph.D.
detection system based on combining cluster centers 28. Li Tian1, Wang “Research on Network Intrusion
and nearest neighbors, Knowl-edge Based Detection System Based on Improved K-means
System”2015 Clustering Algorithm”,2009.
9. Meshram A, Haas C (2017) Anomaly detection in 29. Chih-Fong Tsai, Y.-F. H.-Y.-Y. (2009). Intrusion
industrial networks using machine learning: a detection by machine learning: A review.
roadmap. In: Beyerer J, Niggemann O, Ku¨hnert C (eds) 30. Dewan Md. Farid, M. Z. (2011). Adaptive Intrusion
Machine learning for cyber physical systems. Detection based on Boosting .
31. Ravi Ranjan, G. S. (2014). A NEW CLUSTERING
10. Anderson, J. (1995). An introduction to neural
APPROACH FOR ANOMALY INTRUSION
networks. Cambridge: MIT Press. DETECTION.
11. Dewan Md. Farid, M. Z. (2011). Adaptive Intrusion 32. Chan TS, Yen KK and Luo J., “Network intrusion
Detection based on Boosting . detection design using feature selection of soft
12. Chih-Fong Tsai, Y.-F. H.-Y.-Y. (2009). Intrusion omputing paradigms”.
detection by machine learning: A review. expert 33. Arif Jamal Malik, Waseem Shahzad, Farrukh Aslam
systems with applications,ELSEVIER . Khan, ”Netword lD using hybrid binary PSO and
13. Dewan Md. Farid, L. Z. (2013). An Adaptive RF algorithm”.
Ensemble Classifier for Mining Concept-Drifting 34. Mohammad Abu Alsheikh, Shaowei Lin, Dusit
Data Streams. Niyato1 and Hwee-Pink Tan, ”Machine Learning in
14. C.M.Bishop. (1995). Neural networks for pattern Wireless Sensor Networks”.
recognition. Eng- land:Oxford University. 35. Gang Wang, J. H. (2010). A new approach to
15. Carlos A. Catania, F. B. (2012). An autonomous intrusion detection using Artificial Neural Network.
labeling approach to support vector machines 36. Su, M.-Y. (2011). Real-time anomaly detection
algorithms for network traffic anomaly detection. systems for Denial-of Service attacks by weighted.
16. Tax, D. (1999). Data domain description using 37. Ravi Ranjan, G. S. (2014). A NEW CLUSTERING
support vectors.Proceedings of the european APPROACH FOR ANOMALY INTRUSION
symposium on artificial neural networks,251-256. DETECTION .
17. Twelfth International Multi-Conference on 38. Prof. D.P. Gaikwad, S. J. (2012) Anomaly Based
1482
Rajesh Dhakad et al., International Journal of Emerging Trends in Engineering Research, 9(12), December 2021, 1477 – 1483
1483