Network intrusion detection system: A systematic study of machine learning and deep learning approaches

被引:519
作者
Ahmad, Zeeshan [1 ,2 ]
Shahid Khan, Adnan [1 ]
Wai Shiang, Cheah [1 ]
Abdullah, Johari [1 ]
Ahmad, Farhan [3 ,4 ]
机构
[1] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Sarawak, Malaysia
[2] King Khalid Univ, Dept Elect Engn, Coll Engn, Abha, Saudi Arabia
[3] Univ Derby, Coll Engn & Technol, Cyber Secur Res Grp, Derby, England
[4] Coventry Univ, Inst Future Transport & Cities, Coventry, W Midlands, England
关键词
Deep learning; Machine learning; Network anomaly detection; Network intrusion detection system; Network security; NEURAL-NETWORK; SPARSE AUTOENCODER; ENSEMBLE METHOD; MODEL; ALGORITHM; INTERNET; THINGS; FRAMEWORK; TAXONOMY; TRUST;
D O I
10.1002/ett.4150
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The rapid advances in the internet and communication fields have resulted in a huge increase in the network size and the corresponding data. As a result, many novel attacks are being generated and have posed challenges for network security to accurately detect intrusions. Furthermore, the presence of the intruders with the aim to launch various attacks within the network cannot be ignored. An intrusion detection system (IDS) is one such tool that prevents the network from possible intrusions by inspecting the network traffic, to ensure its confidentiality, integrity, and availability. Despite enormous efforts by the researchers, IDS still faces challenges in improving detection accuracy while reducing false alarm rates and in detecting novel intrusions. Recently, machine learning (ML) and deep learning (DL)-based IDS systems are being deployed as potential solutions to detect intrusions across the network in an efficient manner. This article first clarifies the concept of IDS and then provides the taxonomy based on the notable ML and DL techniques adopted in designing network-based IDS (NIDS) systems. A comprehensive review of the recent NIDS-based articles is provided by discussing the strengths and limitations of the proposed solutions. Then, recent trends and advancements of ML and DL-based NIDS are provided in terms of the proposed methodology, evaluation metrics, and dataset selection. Using the shortcomings of the proposed methods, we highlighted various research challenges and provided the future scope for the research in improving ML and DL-based NIDS.
引用
收藏
页数:29
相关论文
共 141 条
[1]   A Game-Theoretic Approach for Enhancing Security and Data Trustworthiness in IoT Applications [J].
Abdalzaher, Mohamed S. ;
Muta, Osamu .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (11) :11250-11261
[2]   Employing Game Theory and TDMA Protocol to Enhance Security and Manage Power Consumption in WSNs-Based Cognitive Radio [J].
Abdalzaher, Mohamed S. ;
Muta, Osamu .
IEEE ACCESS, 2019, 7 :132923-132936
[3]  
Abdalzaher MS, 2017, IEEE SYMP COMP COMMU, P1257, DOI 10.1109/ISCC.2017.8024697
[4]  
Abdalzaher MS, 2017, IEEE SYMP COMP COMMU, P552, DOI 10.1109/ISCC.2017.8024586
[5]   Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection [J].
Abdulhammed, Razan ;
Musafer, Hassan ;
Alessa, Ali ;
Faezipour, Miad ;
Abuzneid, Abdelshakour .
ELECTRONICS, 2019, 8 (03)
[6]   MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles [J].
Ahmad, Farhan ;
Kurugollu, Fatih ;
Adnane, Asma ;
Hussain, Rasheed ;
Hussain, Fatima .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) :3310-3322
[7]   Blockchain in Internet-of-Things: Architecture, Applications and Research Directions [J].
Ahmad, Farhan ;
Ahmad, Zeeshan ;
Kerrache, Chaker Abdelaziz ;
Kurugollu, Fatih ;
Adnane, Asma ;
Barka, Ezedin .
2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, :314-319
[8]   An intrusion detection system based on combining probability predictions of a tree of classifiers [J].
Ahmim, Ahmed ;
Derdour, Makhlouf ;
Ferrag, Mohamed Amine .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (09)
[9]   Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection [J].
Al-Qatf, Majjed ;
Yu Lasheng ;
Al-Habib, Mohammed ;
Al-Sabahi, Kamal .
IEEE ACCESS, 2018, 6 :52843-52856
[10]   A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization [J].
Ali, Mohammed Hasan ;
Al Mohammed, Bahaa Abbas Dawood ;
Ismail, Alyani ;
Zolkipli, Mohamad Fadli .
IEEE ACCESS, 2018, 6 :20255-20261