Design and Analysis of Intrusion Detection System via Neural Network, SVM, and Neuro-Fuzzy

  • Abhishek TiwariEmail author
  • Sanjeev Kumar Ojha
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 755)


An intrusion detection system is continuous observation of system or over the network assessment of an intruder or any other attacks. In this paper, design, and analysis of intrusion detection system via neuro-fuzzy, neural network and SVM technique for the improvement misuse detection system. The proposed approachable to enhancement anomaly detection and improve these techniques for anomaly detection.


Intrusion detection Neural network Neuro-fuzzy Fuzzy system SVM 


  1. 1.
    Kumar, I., Virmani, J., Bhadauria, H.S.: A review of breast density classification methods. In: Proceeding of 2nd International Conference on Computing for Sustainable Global Development INDIACom, pp. 1960–1967 (2015)Google Scholar
  2. 2.
    Kumar, I., Virmani, J., Bhadauria, H.S.: Wavelet packet texture descriptors based four-class BIRADS breast tissue density classification. Procedia Comput. Sci. 70, 76–84 (2015)Google Scholar
  3. 3.
    Kumar, I., Bhadauria, H.S., Virmani, J., Thakur, S.: A classification framework for prediction of breast density using an ensemble of neural network classifiers. Biocybern. Biomed. Eng. 37, 217–228 (2017)Google Scholar
  4. 4.
    Sabahi, F.: Intrusion detection: a survey. In: The Third International Conference on Systems and Networks Communications. IEEE Computer Society (2008)Google Scholar
  5. 5.
    Chandrasekhar, A.M. et al.: Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers. In: IEEE Xplore (2013).
  6. 6.
    Le, T.-H. et al.: An effective intrusion detection classifier using long short-term memory with gradient descent optimization. In: IEEE Xplore (2017).
  7. 7.
    Cannady, J.: Artificial neural networks for misuse detection. In: National Information Systems Security Conference (2006)Google Scholar
  8. 8.
    Vladimir, V.N.: The Nature of Statistical Learning Theory. Springer, Berlin, Heidelberg, New York (2005)Google Scholar
  9. 9.
    Tiwari, A. et al.: An effective approach for secure video watermarking based on H.264 standard. In: 3rd IEEE International Conference on Computational Intelligence and Communication Technology IEEE Xplorer (2017). 978-1-5090-6218-8/17/$31.00Google Scholar
  10. 10.
    Tiwari, A., Kamlesh K.Gupta, An effective approach of digital image watermarking for copyright protection. Int. J. Big Data Secur. Intell. 2(1), 7–17 (2015)., ISSN: 2383-7047SERSC
  11. 11.
    Kumar, I., Bhadauria, H.S., Virmani, J., Thakur, S.A.: A hybrid hierarchical framework for classification of breast density using digitized film screen mammograms Multimedia Tools and Applications pp. 1–25 (2017)Google Scholar
  12. 12.
    Deng, H., Zeng, Q., Agrawal, D.P.: SVM-based intrusion detection system for wireless ad hoc networks. In Proceedings of Vehicular Technology Conference, pp. 2147–2151 (2003)Google Scholar
  13. 13.
    Denning, D.: An intrusion-detection model. IEEE Trans. Softw. Eng. SE-13(2) (2016)Google Scholar
  14. 14.
    Abhishek Tiwari, Neelesh Kumar Jain and Devraj Tomar, Analysis of multiscale transform based digital image watermarking for multimedia files, Int. J. Sci. Res. Devel. ISSN: 2321-0613 vol 2( 2) pp. 177–182 (2014)Google Scholar
  15. 15.
    Tiwari, A.: Real time intrusion detection system using computational intelligence and neural network: review, analysis and anticipated solution of machine learning. Springer Book Series: Information Technology and Applied Mathematics (2017). ISBN: 978-981-10-7590-2, ISSN 2194-5357Google Scholar
  16. 16.
    Yan, H. et al.: ANN-based multi classifier for identification of perimeter events. In: IEEE Xplore (2011).
  17. 17.
    Malhotra, S. et al.: Genetic programming and K-nearest neighbour classifier based intrusion detection model. In: IEEE Xplore, ISBN (2017).
  18. 18.
    Ghosh, A.K.: Learning program behavior profiles for intrusion detection. In: USENIX (1999)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Computer Science & EngineeringGalgotias Educational InstitutionsGreater NoidaIndia
  2. 2.Department of Radio Engineering & CyberneticMoscow Institute of Physics and TechnologyZhukovskyRussia

Personalised recommendations