Data Fusion for Network Intrusion Detection: A Review

被引:52
作者
Li, Guoquan [1 ]
Yan, Zheng [1 ,2 ]
Fu, Yulong [1 ]
Chen, Hanlu [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab ISN, Xian, Shaanxi, Peoples R China
[2] Aalto Univ, Dept Commun & Networking, Espoo, Finland
基金
芬兰科学院;
关键词
FEATURE-SELECTION; ANOMALY DETECTION; SYSTEM; ALGORITHM; ENSEMBLE; DESIGN; MODEL;
D O I
10.1155/2018/8210614
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Rapid progress of networking technologies leads to an exponential growth in the number of unauthorized or malicious network actions. As a component of defense-in-depth, Network Intrusion Detection System (NIDS) has been expected to detect malicious behaviors. Currently, NIDSs are implemented by various classification techniques, but these techniques are not advanced enough to accurately detect complex or synthetic attacks, especially in the situation of facing massive high-dimensional data. Besides, the inherent defects of NIDSs, namely, high false alarm rate and low detection rate, have not been effectively solved. In order to solve these problems, data fusion (DF) has been applied into network intrusion detection and has achieved good results. However, the literature still lacks thorough analysis and evaluation on data fusion techniques in the field of intrusion detection. Therefore, it is necessary to conduct a comprehensive review on them. In this article, we focus on DF techniques for network intrusion detection and propose a specific definition to describe it. We review the recent advances of DF techniques and propose a series of criteria to compare their performance. Finally, based on the results of the literature review, a number of open issues and future research directions are proposed at the end of this work.
引用
收藏
页数:16
相关论文
共 60 条
[1]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[2]  
Ambusaidi MA, 2015, 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, P295, DOI [10.1109/Trustcom.2015.387, 10.1109/Trustcom-2015.387]
[3]   A novel feature selection approach for intrusion detection data classification [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Tan, Zhiyuan ;
Nanda, Priyadarsi ;
Lu, Liang Fu ;
Nagar, Upasana T. .
2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, :82-89
[4]  
Ammar A., 2015, Journal of Data Analysis and Information Processing, V3, P11, DOI [10.4236/jdaip.2015.32002, DOI 10.4236/JDAIP.2015.32002]
[5]  
[Anonymous], 2011, WORKSHOP BUILDING AN, DOI DOI 10.1145/1978672.1978676
[6]  
[Anonymous], 2015, INT C COMP COMM INF, DOI DOI 10.1109/ICCCI.2015.7218109
[7]  
[Anonymous], 2007, NEOPLASIA
[8]  
[Anonymous], HDB MULTISENSOR DATA
[9]   A hybrid intrusion detection system design for computer network security [J].
Aydin, M. Ali ;
Zaim, A. Halim ;
Ceylan, K. Goekhan .
COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (03) :517-526
[10]   Packet Information Collection and Transformation for Network Intrusion Detection and Prevention [J].
Beheshti, Mohsen ;
Han, Jianchao ;
Kowalski, Kazimierz ;
Ortiz, Joel ;
Tomelden, Johnly ;
Alvillar, Damian .
2008 INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS, VOLS 1 AND 2, 2008, :42-48