Loading

A Comprehensive Analysis and Solution of Cyber Attacks using Machine Learning Techniques
Vivekanand Kuriyal1, Vikas Tripathi2, Devesh Pratap Singh3, Bhaskar Pant4, Vijay Kumar5

1Vivekanand Kuriyal, Graphic Era Deemed to be University, Dehradun (Uttarakhand), India.

2Vikas Tripathi, Graphic Era Deemed to be University, Dehradun (Uttarakhand), India.

3Devesh Pratap Singh, Graphic Era Deemed to be University, Dehradun (Uttarakhand), India.

4Bhaskar Pant, Graphic Era Deemed to be University, Dehradun (Uttarakhand), India.

5Vijay Kumar, Professor, Graphic Era Hill University, Dehradun (Uttarakhand), India.

Manuscript received on 16 June 2020 | Revised Manuscript received on 27 June 2020 | Manuscript Published on 04 July 2020 | PP: 70-74 | Volume-8 Issue-12S3 October 2019 | Retrieval Number: L101910812S319/2020©BEIESP | DOI: 10.35940/ijitee.L1019.10812S319

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cyber security is a major problem of modern society so that Vulnerabilities of computer Network is become easy with the help of technologies and human skills. Now day’s difference type of attacks occurred for example DOS attack, Probing, R2U, R2L virus, port scans, buffer overflow, CGI Attack and flooding etc. We need a platform where a system can be developed for recognition and prevention of these attacks. In This paper, most of the latest methods are summarised to implement IDS for cyber security. Intrusion Detection Systems is a most suitable solution for cyber attacks. Machine learning based Intrusion Detection Systems have high accuracy, in rapidly changing environment. This paper discusses which type of ML techniques has low accuracy, so it explore some research area for researcher.

Keywords: Machine Learning, Intrusion Detection Systems, Cyber Security, Attacks.
Scope of the Article: Machine Learning