Research Article

Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi

Volume: 2 Number: 1 July 1, 2018
  • Oğuz Ata *
  • Khalid Kadhim
TR EN

Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi

Abstract

Abstract

Recently, it has become important to use advanced intrusion detection techniques to protect networks from the

developing network attacks, which are becoming more complex and difficult to detect. For this reason, machine

learning techniques have been employed in the Intrusion Detection Systems (IDS), so that, more complex features

can be detected in the characteristics of the packets incoming to the network. As these techniques require training

data, many datasets are collected for this purpose. Some of these datasets have known issues that limit the

ability to apply intrusion detection systems built, based on these datasets, in real-life applications.

In this study, the existing intrusion datasets are illustrated alongside with the known issues of each dataset, as well

as, the existing intrusion detection systems that employ machine learning techniques and use these datasets, are

discussed. As machine learning techniques extract different knowledge from different datasets, and each technique

has different approaches to extract that knowledge, the performance of each technique is different from

one dataset to another. The results of the discussed studies show the great potential of using machine learning

techniques to implement IDS, where the Artificial Neural Networks (ANN) have shown the highest average performance,

among other machine learning techniques.

Keywords

References

  1. D. Acemoglu, A. Malekian, and A. Ozdaglar, “Network security and contagion,” Journal of Economic Theory, vol. 166, pp. 536-585, 2016.
  2. D. Yu, Y. Jin, Y. Zhang, and X. Zheng, “A survey on security issues in services communication of Microservices‐ enabled fog applications,” Concurrency and Computation: Practice and Experience, p. e4436.
  3. V. C. Storey and I.-Y. Song, “Big data technologies and Management: What conceptual modeling can do,” Data & Knowledge Engineering, vol. 108, pp. 50-67, 2017.
  4. I. H. Witten, E. Frank, M. A. Hall, and C. J. Pal, Data Mining: Practical machine learning tools and techniques: Morgan Kaufmann, 2016.
  5. M. Ahmed, A. N. Mahmood, and J. Hu, “A survey of network anomaly detection techniques,” Journal of Network and Computer Applications, vol. 60, pp. 19-31, 2016.
  6. K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014.
  7. K. Cup, “Dataset,” available at the following website http://kdd. ics. uci. edu/databases/kddcup99/kddcup99. html, vol. 72, 1999.
  8. M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” in Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on, 2009, pp. 1-6.

Details

Primary Language

English

Subjects

-

Journal Section

Research Article

Authors

Oğuz Ata * This is me
Türkiye

Khalid Kadhim This is me
Türkiye

Publication Date

July 1, 2018

Submission Date

June 30, 2018

Acceptance Date

-

Published in Issue

Year 2018 Volume: 2 Number: 1

APA
Ata, O., & Kadhim, K. (2018). Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi. AURUM Journal of Engineering Systems and Architecture, 2(1), 115-123. https://izlik.org/JA76WC82BN
AMA
1.Ata O, Kadhim K. Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi. A-JESA. 2018;2(1):115-123. https://izlik.org/JA76WC82BN
Chicago
Ata, Oğuz, and Khalid Kadhim. 2018. “Network Intrusion Detection Using Machine Learning Techniques Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi”. AURUM Journal of Engineering Systems and Architecture 2 (1): 115-23. https://izlik.org/JA76WC82BN.
EndNote
Ata O, Kadhim K (July 1, 2018) Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi. AURUM Journal of Engineering Systems and Architecture 2 1 115–123.
IEEE
[1]O. Ata and K. Kadhim, “Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi”, A-JESA, vol. 2, no. 1, pp. 115–123, July 2018, [Online]. Available: https://izlik.org/JA76WC82BN
ISNAD
Ata, Oğuz - Kadhim, Khalid. “Network Intrusion Detection Using Machine Learning Techniques Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi”. AURUM Journal of Engineering Systems and Architecture 2/1 (July 1, 2018): 115-123. https://izlik.org/JA76WC82BN.
JAMA
1.Ata O, Kadhim K. Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi. A-JESA. 2018;2:115–123.
MLA
Ata, Oğuz, and Khalid Kadhim. “Network Intrusion Detection Using Machine Learning Techniques Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi”. AURUM Journal of Engineering Systems and Architecture, vol. 2, no. 1, July 2018, pp. 115-23, https://izlik.org/JA76WC82BN.
Vancouver
1.Oğuz Ata, Khalid Kadhim. Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi. A-JESA [Internet]. 2018 Jul. 1;2(1):115-23. Available from: https://izlik.org/JA76WC82BN

.