Predictive Analysis on Intrusion Detection System Using CNN: Machine Learning Algorithm
DOI:
https://doi.org/10.32628/IJSRST25122251Keywords:
IDS, Machine Learning, CNNAbstract
In this research article the researcher emphasized on rapid expansion of the digital landscape, the security of networked systems has become a paramount concern. Network intrusions, which involve unauthorized access and malicious activities, pose significant threats to the confidentiality, integrity, and availability of sensitive information. To counter these threats, intrusion detection systems (IDS) play a crucial role in identifying and mitigating such intrusions. In recent times, machine learning algorithms have gained prominence in enhancing the accuracy and efficiency of IDS.This study presents a comprehensive investigation into network intrusion and intrusion detection techniques, focusing on the utilization of the CNN algorithm from the classification of machine learning approach to identify the group of intrusion and non intrusion data. The main objective of implementation of CNN algorithm adapted to the context of intrusion detection due to its ability to discover patterns in large datasets. The researcher found the 99% accuracy level using CNN Basic Performance Model and At 100/100, it takes 63s 631ms/step to lose 0.2421ms per step, and it finds a way 0.850ms per way to acquire 1.05ms.99.9% of the time has elapsed since Epoch started.
Downloads
References
Rajasekaran and A. Ayyasamy (2017). ‘A Novel Ensemble Approach for Effective Intrusion Detection System ’, 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM),and Date of Conference: 3-4 Feb. 2017,Date Added to IEEE Xplore: 05 October 2017,INSPEC Accession Number: 17240661,DOI: 10.1109/ICRTCCM.2017.27.
D.P. Gaikwad and Ravindra C. Thool(2015). ‘ Intrusion Detection System Using Bagging Ensemble Method of Machine Learning’, 2015 International Conference on Computing Communication Control and Automation , Date of Conference: 26-27 Feb. 2015, Pune, India. Date Added to IEEE Xplore: 16 July 2015,Electronic ISBN: 978-1-4799-6892-3,INSPEC Accession Number: 15305461,DOI: 10.1109/ICCUBEA.2015.61.
M.Govindarajan and RM.Chandrasekaran(2012). ‘Intrusion Detection using an Ensemble ofClassification Methods’, Proceedings of the World Congress on Engineering and Computer Science 2012 Vol. I,WCECS 2012, October 24-26, 2012, San Francisco, USA.
Chih-FongTsai and Chia-YingLin (2010). ‘A triangle area based nearest neighbors approach to intrusion detection ’, Pattern Recognition,Volume 43, Issue 1, January 2010, Pages 222-229, https://doi.org/10.1016/j.patcog.2009.05.017.
Sandhya Peddabachigaria, Ajith Abrahamb, Crina Grosanc, and JohnsonThomasa (2007). ‘Modeling Intrusion Detection System Using Hybrid Intelligent Systems ’, Journal of Network and Computer Applications, Volume 30, Issue 1, January 2007, Pages 114-132, https://doi.org/10.1016/j.jnca.2005.06.003.
Yinhui Lia, JingboXiaa, Silan Zhanga, Jiakai Yana Xiaochuan , and AibKuobinDaic(2011). ‘An Efficient Intrusion Detection System Based On Support Vector Machines And Gradually Feature Removal Method ’, Expert Systems with Applications,Volume 39, Issue 1, January 2012, Pages 424-430, https://doi.org/10.1016/j.eswa.2011.07.032.
Wenke Lee , S.J. Stolfo , P.K. Chan , E. Eskin ,Wei Fan , M. Miller ,S. Hershkop , and Junxin Zhang(2002). ‘Real Time Data Mining-Based Intrusion Detection’, Published in: Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01,Date of Conference: 12-14 June 2001,Date Added to IEEE Xplore: 07 August 2002,Print ISBN: 0-7695-1212-7,INSPEC Accession Number: 6991861,DOI: 10.1109/DISCEX.2001.932195.
Naoki Abe, Bianca Zadrozny, and John Langford (2006). ‘ Outlier Detection By Active Learning ’, KDD '06 Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining,Pages 504-509 ,Philadelphia, PA, USA — August 20 - 23, 2006 ,ACM New York, NY, USA ©2006 , ISBN:1-59593-339-5 doi>10.1145/1150402.1150459.
Rajesh Wankhede, vikrant Chole, and shruti Kolte(2015). ‘A Review On Intrusion Detection System Using Classification Technique’, International Journal of Advanced Computational Engineering and Networking, ISSN: 2320-2106, Volume-3, Issue-12, Dec.-2015. [10].Amit Kumar, Harish Chandra Maurya, Rahul Misra(2013).’A Research study on Hybrid Intrusion Detection System’,International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-2, Issue-4, April 2013.
Mostaque Md. Morshedur Hassan (2013),’Current Studies on Intrusion Detection System, Genetic Algorithm and Fuzzy Logic’, International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.2, March 2013.
U. Oktay and O.K. Sahingoz (2013). ‘.Attack Types and Intrusion Detection Systems in Cloud Computing’,International Information Security & Cryptology Conference, Kitabı20-21 September /Eylül 2013 | Ankara / TURKEY.
Dr. S.Vijayarani and Ms. Maria Sylviaa.S(2015). ‘Intrusion Detection System – A Study’, International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015.
Hadi Barani Baravati , and Javad Hosseinkhani(2017), ‘A new Data Mining-based Approach to Improving the Quality of Alerts in Intrusion Detection Systems, IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.8, August 2017. [15].Nilotpal Chakraborty(2013), ‘Intrusion Detection System And Intrusion Prevention System: A Comparative Study’, International Journal of Computing and Business Research (IJCBR) ISSN (Online) : 2229-6166 Volume 4 Issue 2 May 2013.
Vishal Joshi and Parveen Kakkar(2017). ‘Honeypot Based Intrusion Detection System with Snooping agents and Hash Tags’, International Journal of Computer Science and Information Technologies, Vol. 8 (2) , 2017, 237-242.
MeeraGandhi and S.K.Srivatsa(2018). ‘Detecting and preventing attacks using network intrusion detection systems’, International Journal of Computer Science and Security, Volume (2) : Issue (1),2018.
Sonal Paliwal, Rajesh Shyam Singh, and H.L.Mandoria(2015). ‘Analytical Study On Intrusion Detection And Prevention System’, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: editor@ijettcs.org Volume 4, Issue 6, November - December 2015, ISSN 2278-6856.
Mohit Tiwari, Raj Kumar, Akash Bharti, and Jai Kishan(2017). ‘Intrusion Detection System’, International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com, Volume 5, Issue 2 (March - April 2017), PP. 38-44.
Rajni Tewatia, and Asha Mishra(2015). ‘Introduction To Intrusion Detection System: Review’, International Journal of Scientific & Technology Research Volume 4, Issue 05, May 2015 ISSN 2277-8616.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Science and Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.