Araştırma Makalesi

Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi

Cilt: 2 Sayı: 1 1 Temmuz 2018
  • Oğuz Ata *
  • Khalid Kadhim
PDF İndir
TR EN

Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi

Öz

Abstract

Recently, it has become important to use advanced intrusion detection techniques to protect networks from the

developing network attacks, which are becoming more complex and difficult to detect. For this reason, machine

learning techniques have been employed in the Intrusion Detection Systems (IDS), so that, more complex features

can be detected in the characteristics of the packets incoming to the network. As these techniques require training

data, many datasets are collected for this purpose. Some of these datasets have known issues that limit the

ability to apply intrusion detection systems built, based on these datasets, in real-life applications.

In this study, the existing intrusion datasets are illustrated alongside with the known issues of each dataset, as well

as, the existing intrusion detection systems that employ machine learning techniques and use these datasets, are

discussed. As machine learning techniques extract different knowledge from different datasets, and each technique

has different approaches to extract that knowledge, the performance of each technique is different from

one dataset to another. The results of the discussed studies show the great potential of using machine learning

techniques to implement IDS, where the Artificial Neural Networks (ANN) have shown the highest average performance,

among other machine learning techniques.

Anahtar Kelimeler

Kaynakça

  1. D. Acemoglu, A. Malekian, and A. Ozdaglar, “Network security and contagion,” Journal of Economic Theory, vol. 166, pp. 536-585, 2016.
  2. D. Yu, Y. Jin, Y. Zhang, and X. Zheng, “A survey on security issues in services communication of Microservices‐ enabled fog applications,” Concurrency and Computation: Practice and Experience, p. e4436.
  3. V. C. Storey and I.-Y. Song, “Big data technologies and Management: What conceptual modeling can do,” Data & Knowledge Engineering, vol. 108, pp. 50-67, 2017.
  4. I. H. Witten, E. Frank, M. A. Hall, and C. J. Pal, Data Mining: Practical machine learning tools and techniques: Morgan Kaufmann, 2016.
  5. M. Ahmed, A. N. Mahmood, and J. Hu, “A survey of network anomaly detection techniques,” Journal of Network and Computer Applications, vol. 60, pp. 19-31, 2016.
  6. K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014.
  7. K. Cup, “Dataset,” available at the following website http://kdd. ics. uci. edu/databases/kddcup99/kddcup99. html, vol. 72, 1999.
  8. M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” in Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on, 2009, pp. 1-6.

Ayrıntılar

Birincil Dil

İngilizce

Konular

-

Bölüm

Araştırma Makalesi

Yazarlar

Oğuz Ata * Bu kişi benim
Türkiye

Khalid Kadhim Bu kişi benim
Türkiye

Yayımlanma Tarihi

1 Temmuz 2018

Gönderilme Tarihi

30 Haziran 2018

Kabul Tarihi

-

Yayımlandığı Sayı

Yıl 2018 Cilt: 2 Sayı: 1

Kaynak Göster

APA
Ata, O., & Kadhim, K. (2018). Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi. AURUM Journal of Engineering Systems and Architecture, 2(1), 115-123. https://izlik.org/JA76WC82BN
AMA
1.Ata O, Kadhim K. Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi. A-JESA. 2018;2(1):115-123. https://izlik.org/JA76WC82BN
Chicago
Ata, Oğuz, ve Khalid Kadhim. 2018. “Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi”. AURUM Journal of Engineering Systems and Architecture 2 (1): 115-23. https://izlik.org/JA76WC82BN.
EndNote
Ata O, Kadhim K (01 Temmuz 2018) Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi. AURUM Journal of Engineering Systems and Architecture 2 1 115–123.
IEEE
[1]O. Ata ve K. Kadhim, “Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi”, A-JESA, c. 2, sy 1, ss. 115–123, Tem. 2018, [çevrimiçi]. Erişim adresi: https://izlik.org/JA76WC82BN
ISNAD
Ata, Oğuz - Kadhim, Khalid. “Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi”. AURUM Journal of Engineering Systems and Architecture 2/1 (01 Temmuz 2018): 115-123. https://izlik.org/JA76WC82BN.
JAMA
1.Ata O, Kadhim K. Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi. A-JESA. 2018;2:115–123.
MLA
Ata, Oğuz, ve Khalid Kadhim. “Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi”. AURUM Journal of Engineering Systems and Architecture, c. 2, sy 1, Temmuz 2018, ss. 115-23, https://izlik.org/JA76WC82BN.
Vancouver
1.Oğuz Ata, Khalid Kadhim. Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi. A-JESA [Internet]. 01 Temmuz 2018;2(1):115-23. Erişim adresi: https://izlik.org/JA76WC82BN

.