Automated Detection Of Network Intrusions Using Machine Learning in Real-Time Systems

Authors

  • Aulia Novi Universitas Hasanuddin
  • Ryan Satria Universitas Hasanuddin

DOI:

https://doi.org/10.62951/ijcts.v1i2.63

Keywords:

Intrusion detection, Real-time systems, Machine learning, Support vector machine, Network security, Decision tree

Abstract

Network intrusion detection is crucial for maintaining the integrity of real-time systems. This paper evaluates various machine learning algorithms, including support vector machines (SVM) and decision trees, for real-time intrusion detection. Through extensive testing on simulated datasets, the study highlights the advantages of automated detection in reducing response times and enhancing network security.

References

Ahmed, S., & Khan, R. (2022). Hybrid intrusion detection systems using machine learning techniques. Journal of Network Security, 15(3), 225-237. https://doi.org/10.1016/j.jns.2022.03.005

Anderson, R., & Moore, T. (2020). The economics of network security and intrusion detection. Journal of Cybersecurity, 7(3), 135-148. https://doi.org/10.1016/j.jcyber.2020.03.002

Chen, J., & Chang, S. (2020). Future directions in machine learning for network security. Cybersecurity Advances, 6(2), 122-140. https://doi.org/10.1016/j.cyber.2020.05.001

Ho, T. K., & Basu, M. (2019). Machine learning techniques for intrusion detection in real-time systems. Security and Privacy Journal, 10(1), 101-113. https://doi.org/10.1002/spy2.12020

Johnson, M., & Wang, L. (2019). A comparative analysis of SVM and decision trees in intrusion detection. Network Security Journal, 9(6), 150-162. https://doi.org/10.1016/j.netsec.2019.03.007

Lee, W., & Stolfo, S. J. (2021). Anomaly-based intrusion detection for network security. IEEE Transactions on Cybernetics, 12(2), 204-210. https://doi.org/10.1109/TCYB.2021.3078742

Liu, X., & Li, Q. (2021). Feature selection in machine learning for intrusion detection. IEEE Transactions on Cybersecurity, 7(2), 118-127. https://doi.org/10.1109/TCS.2021.3078765

Mukherjee, B., & Heberlein, L. T. (2022). Network intrusion detection: Techniques, limitations, and future directions. Cybersecurity Advances, 14(1), 48-62. https://doi.org/10.1016/j.cyber.2022.04.002

Parker, D., & Lee, C. (2021). Real-time processing in network intrusion detection: Challenges and approaches. IEEE Transactions on Information Security, 18(1), 98-105. https://doi.org/10.1109/TIS.2021.3055764

Patel, R., & Gupta, N. (2021). Precision and recall metrics for machine learning in intrusion detection. Journal of Information Security, 13(4), 350-367. https://doi.org/10.4236/jis.2021.134020

Quinlan, J. R. (2020). The decision tree model and its application in intrusion detection systems. Journal of Machine Learning in Security, 8(2), 116-129. https://doi.org/10.1016/j.jms.2020.06.003

Singh, K., & Bharti, P. (2019). A review of intrusion detection systems based on network security. Network and Security Journal, 5(1), 65-78. https://doi.org/10.1016/j.nsj.2019.01.005

Vapnik, V. N. (2021). Support vector machine for pattern recognition and network security. Pattern Recognition Journal, 16(4), 333-347. https://doi.org/10.1016/j.patrec.2021.02.005

Wang, S., & Zhou, H. (2022). Data preprocessing for intrusion detection systems: Techniques and challenges. Advances in Cybersecurity, 4(5), 55-67. https://doi.org/10.1016/j.advcyber.2022.05.001

Zhang, Y., & Tan, K. (2020). Evaluating model latency in real-time network intrusion detection. Journal of Network Security, 11(3), 201-214. https://doi.org/10.1016/j.jns.2020.05.002

Downloads

Published

2024-10-30 — Updated on 2024-04-30

Versions

How to Cite

Aulia Novi, & Ryan Satria. (2024). Automated Detection Of Network Intrusions Using Machine Learning in Real-Time Systems. International Journal of Computer Technology and Science, 1(2), 20–23. https://doi.org/10.62951/ijcts.v1i2.63 (Original work published October 30, 2024)

Similar Articles

1 2 3 > >> 

You may also start an advanced similarity search for this article.