Skip to main content

Design and Analysis of Intrusion Detection System via Neural Network, SVM, and Neuro-Fuzzy

  • Conference paper
  • First Online:
Emerging Technologies in Data Mining and Information Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 755))

Abstract

An intrusion detection system is continuous observation of system or over the network assessment of an intruder or any other attacks. In this paper, design, and analysis of intrusion detection system via neuro-fuzzy, neural network and SVM technique for the improvement misuse detection system. The proposed approachable to enhancement anomaly detection and improve these techniques for anomaly detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kumar, I., Virmani, J., Bhadauria, H.S.: A review of breast density classification methods. In: Proceeding of 2nd International Conference on Computing for Sustainable Global Development INDIACom, pp. 1960–1967 (2015)

    Google Scholar 

  2. Kumar, I., Virmani, J., Bhadauria, H.S.: Wavelet packet texture descriptors based four-class BIRADS breast tissue density classification. Procedia Comput. Sci. 70, 76–84 (2015)

    Google Scholar 

  3. Kumar, I., Bhadauria, H.S., Virmani, J., Thakur, S.: A classification framework for prediction of breast density using an ensemble of neural network classifiers. Biocybern. Biomed. Eng. 37, 217–228 (2017)

    Google Scholar 

  4. Sabahi, F.: Intrusion detection: a survey. In: The Third International Conference on Systems and Networks Communications. IEEE Computer Society (2008)

    Google Scholar 

  5. Chandrasekhar, A.M. et al.: Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers. In: IEEE Xplore (2013). https://doi.org/10.1109/iccci201.6466310

  6. Le, T.-H. et al.: An effective intrusion detection classifier using long short-term memory with gradient descent optimization. In: IEEE Xplore (2017). https://doi.org/10.1109/platcon.2017.7883684

  7. Cannady, J.: Artificial neural networks for misuse detection. In: National Information Systems Security Conference (2006)

    Google Scholar 

  8. Vladimir, V.N.: The Nature of Statistical Learning Theory. Springer, Berlin, Heidelberg, New York (2005)

    Google Scholar 

  9. Tiwari, A. et al.: An effective approach for secure video watermarking based on H.264 standard. In: 3rd IEEE International Conference on Computational Intelligence and Communication Technology IEEE Xplorer (2017). 978-1-5090-6218-8/17/$31.00

    Google Scholar 

  10. Tiwari, A., Kamlesh K.Gupta, An effective approach of digital image watermarking for copyright protection. Int. J. Big Data Secur. Intell. 2(1), 7–17 (2015). http://dx.doi.org/10.14257/ijbdsi.2015.2.1.02, ISSN: 2383-7047SERSC

  11. Kumar, I., Bhadauria, H.S., Virmani, J., Thakur, S.A.: A hybrid hierarchical framework for classification of breast density using digitized film screen mammograms Multimedia Tools and Applications pp. 1–25 (2017)

    Google Scholar 

  12. Deng, H., Zeng, Q., Agrawal, D.P.: SVM-based intrusion detection system for wireless ad hoc networks. In Proceedings of Vehicular Technology Conference, pp. 2147–2151 (2003)

    Google Scholar 

  13. Denning, D.: An intrusion-detection model. IEEE Trans. Softw. Eng. SE-13(2) (2016)

    Google Scholar 

  14. Abhishek Tiwari, Neelesh Kumar Jain and Devraj Tomar, Analysis of multiscale transform based digital image watermarking for multimedia files, Int. J. Sci. Res. Devel. ISSN: 2321-0613 vol 2( 2) pp. 177–182 (2014)

    Google Scholar 

  15. Tiwari, A.: Real time intrusion detection system using computational intelligence and neural network: review, analysis and anticipated solution of machine learning. Springer Book Series: Information Technology and Applied Mathematics (2017). ISBN: 978-981-10-7590-2, ISSN 2194-5357

    Google Scholar 

  16. Yan, H. et al.: ANN-based multi classifier for identification of perimeter events. In: IEEE Xplore (2011). https://doi.org/10.1109/iscid.2011.141

  17. Malhotra, S. et al.: Genetic programming and K-nearest neighbour classifier based intrusion detection model. In: IEEE Xplore, ISBN (2017). https://doi.org/10.1109/confluence.2017.7943121

  18. Ghosh, A.K.: Learning program behavior profiles for intrusion detection. In: USENIX (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abhishek Tiwari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tiwari, A., Ojha, S.K. (2019). Design and Analysis of Intrusion Detection System via Neural Network, SVM, and Neuro-Fuzzy. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta, S. (eds) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 755. Springer, Singapore. https://doi.org/10.1007/978-981-13-1951-8_6

Download citation

Publish with us

Policies and ethics