Strategies for Network Intrusion Detection using Machine Learning Algorithms
N Radhika Amareshwari1, S Ramanjaneyulu2, G Swapna3
1N. Radhika Amareshwari, Working as Assistant Professor, Department of Computer Science Engineering, Geethanjali College of Engineering and Technology, Hyderabad, Telangana, India.
2S. Ramanjaneyulu, Working as Assistant Professor, Department of Computer Science Engineering, Geethanjali College of Engineering and Technology, Hyderabad, Telangana, India.
3G. Swapna, Working as Assistant Professor, Department of Computer Science Engineering, Geethanjali College of Engineering and Technology, Hyderabad, Telangana, India.

Manuscript received on 12 April 2019 | Revised Manuscript received on 18 May 2019 | Manuscript published on 30 May 2019 | PP: 2437-2440 | Volume-8 Issue-1, May 2019 | Retrieval Number: A2107058119/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Spying identification is an emerging field of software development and research and networking with increasing Internet use in daily life. There have been many issues with classical IDS systems, along with other low network attack identification, high false alarm rate, and inadequate analytical capacity. The primary potential of research on the subject then is to establish a model for intrusion detection with increased performance and decreased preparation time. Machine learning is an efficient tool for analyzing any abnormal events taking place in the network activity flow. This paper proposes a mixture of two methodologies to determine any abnormal conduct in internet traffic. This paper recommends to use the principal component analysis (PCA) and Rough-set Support Vector Machine (SVM) as the hybrid intrusion detection models.
Index Terms: Intrusion Detection; Machine Learning; Support Vector Machine

Scope of the Article: Machine Learning