Machine Learning-Based Methodologies for Cyber-Attacks and Network Traffic Monitoring: A Review and Insights

被引:0
|
作者
Genuario, Filippo [1 ]
Santoro, Giuseppe [1 ]
Giliberti, Michele [1 ]
Bello, Stefania [2 ]
Zazzera, Elvira [3 ]
Impedovo, Donato [4 ]
机构
[1] Invest & Engn Srl, Viale Paolo Borsellino & Giovanni Falcone 17, I-70125 Bari, BA, Italy
[2] Digital Innovat Srl, Via Edoardo Orabona 4, I-70125 Bari, BA, Italy
[3] Kad3 Srl, Via Baione snc, I-70043 Monopoli, BA, Italy
[4] Univ Bari Aldo Moro, Dept Comp Sci, Piazza Umberto I 1, I-70121 Bari, BA, Italy
关键词
intrusion detection systems; network traffic monitoring; cyber-attack monitoring; machine learning; deep learning;
D O I
10.3390/info15110741
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The number of connected IoT devices is increasing significantly due to their many benefits, including automation, improved efficiency and quality of life, and reducing waste. However, these devices have several vulnerabilities that have led to the rapid growth in the number of attacks. Therefore, several machine learning-based intrusion detection system (IDS) tools have been developed to detect intrusions and suspicious activity to and from a host (HIDS-Host IDS) or, in general, within the traffic of a network (NIDS-Network IDS). The proposed work performs a comparative analysis and an ablative study among recent machine learning-based NIDSs to develop a benchmark of the different proposed strategies. The proposed work compares both shallow learning algorithms, such as decision trees, random forests, Na & iuml;ve Bayes, logistic regression, XGBoost, and support vector machines, and deep learning algorithms, such as DNNs, CNNs, and LSTM, whose approach is relatively new in the literature. Also, the ensembles are tested. The algorithms are evaluated on the KDD-99, NSL-KDD, UNSW-NB15, IoT-23, and UNB-CIC IoT 2023 datasets. The results show that the NIDS tools based on deep learning approaches achieve better performance in detecting network anomalies than shallow learning approaches, and ensembles outperform all the other models.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] Proposal of a Machine Learning-based Model to Optimize the Detection of Cyber-attacks in the Internet of Things
    Seyed, Cheikhane
    Ngo, Jeanne Roux Bilong
    Kebe, Mbaye
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (11) : 965 - 970
  • [2] Towards Secured Online Monitoring for Digitalized GIS Against Cyber-Attacks Based on IoT and Machine Learning
    Elsisi, Mahmoud
    Tran, Minh-Quang
    Mahmoud, Karar
    Mansour, Diaa-Eldin A.
    Lehtonen, Matti
    Darwish, Mohamed M. F.
    IEEE ACCESS, 2021, 9 : 78415 - 78427
  • [3] Learning From Few Cyber-Attacks: Addressing the Class Imbalance Problem in Machine Learning-Based Intrusion Detection in Software-Defined Networking
    Mirsadeghi, Seyed Mohammad Hadi
    Bahsi, Hayretdin
    Vaarandi, Risto
    Inoubli, Wissem
    IEEE ACCESS, 2023, 11 : 140428 - 140442
  • [4] A Multiagent and Machine Learning based Hybrid NIDS for Known and Unknown Cyber-attacks
    Ouiazzane, Said
    Addou, Malika
    Barramou, Fatimazahra
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (08) : 375 - 382
  • [5] A future prediction for cyber-attacks in the network domain with the visualisation of patterns in cyber-security tickets with machine learning
    Sivajothi, E.
    Diana, S. Mary
    Rekha, M.
    Lincy, R. Babitha
    Damodharan, P.
    Rubia, J. Jency
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (05) : 648 - 661
  • [6] Deep Learning-based Detection and Mitigation Strategy for Cyber-attacks on Advanced Metering Infrastructure
    Acharya, Aparna
    Bhalja, Bhavesh R.
    18TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE, SYSCON 2024, 2024,
  • [7] Effectively predicting cyber-attacks through isolation forest learning-based outlier detection
    Ripan, Rony Chowdhury
    Islam, Md Moinul
    Alqahtani, Hamed
    Sarker, Iqbal H.
    SECURITY AND PRIVACY, 2022, 5 (03):
  • [8] A Lightweight Multilayer Machine Learning Detection System for Cyber-attacks in WSN
    Ismail, Shereen
    Dawoud, Diana
    Reza, Hassan
    2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 481 - 486
  • [9] Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey
    Miao, Yuantian
    Chen, Chao
    Pan, Lei
    Han, Qing-Long
    Zhang, Jun
    Xiang, Yang
    ACM COMPUTING SURVEYS, 2021, 54 (07)
  • [10] Multi-Source Cyber-Attacks Detection using Machine Learning
    Taheri, Sona
    Gondal, Iqbal
    Bagirov, Adil
    Harkness, Greg
    Brown, Simon
    Chi, CHihung
    2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2019, : 1167 - 1172