{"title":"Comparative analysis on Intrusion Detection system through ML and DL Techniques: Survey","authors":"C. Sekhar, K. Pavani, M. Rao","doi":"10.1109/iccica52458.2021.9697291","DOIUrl":null,"url":null,"abstract":"Daily, large amounts of data are generated. Unauthorized users should be kept away from the data. Issues and problems arose one after the other as a result of the continuous development of network security. To avoid these malicious attacks, deep learning and machine learning methodologies are frequently used. Machine learning is a branch of the computer field that studies computational algorithms to convert empirical data into usable models. This field originated from the communities of traditional statics and intelligent retrieval. Machine learning includes deep learning as a subset. A system that can be trained to recognise objects using raw input has referred to as a deep learning system. In this study, we are applying DL techniques such as CNN, DNN, LSTM and RNN on NSL-KDD dataset. In this paper, we conduct a comparative analysis of multiple algorithms to determine which model is best for network security based on the network conditions and environment.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iccica52458.2021.9697291","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Daily, large amounts of data are generated. Unauthorized users should be kept away from the data. Issues and problems arose one after the other as a result of the continuous development of network security. To avoid these malicious attacks, deep learning and machine learning methodologies are frequently used. Machine learning is a branch of the computer field that studies computational algorithms to convert empirical data into usable models. This field originated from the communities of traditional statics and intelligent retrieval. Machine learning includes deep learning as a subset. A system that can be trained to recognise objects using raw input has referred to as a deep learning system. In this study, we are applying DL techniques such as CNN, DNN, LSTM and RNN on NSL-KDD dataset. In this paper, we conduct a comparative analysis of multiple algorithms to determine which model is best for network security based on the network conditions and environment.