Network intrusion detection system: A systematic study of machine learning and deep learning approaches

被引:448
作者
Ahmad, Zeeshan [1 ,2 ]
Shahid Khan, Adnan [1 ]
Wai Shiang, Cheah [1 ]
Abdullah, Johari [1 ]
Ahmad, Farhan [3 ,4 ]
机构
[1] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Sarawak, Malaysia
[2] King Khalid Univ, Dept Elect Engn, Coll Engn, Abha, Saudi Arabia
[3] Univ Derby, Coll Engn & Technol, Cyber Secur Res Grp, Derby, England
[4] Coventry Univ, Inst Future Transport & Cities, Coventry, W Midlands, England
关键词
Deep learning; Machine learning; Network anomaly detection; Network intrusion detection system; Network security; NEURAL-NETWORK; SPARSE AUTOENCODER; ENSEMBLE METHOD; MODEL; ALGORITHM; INTERNET; THINGS; FRAMEWORK; TAXONOMY; TRUST;
D O I
10.1002/ett.4150
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The rapid advances in the internet and communication fields have resulted in a huge increase in the network size and the corresponding data. As a result, many novel attacks are being generated and have posed challenges for network security to accurately detect intrusions. Furthermore, the presence of the intruders with the aim to launch various attacks within the network cannot be ignored. An intrusion detection system (IDS) is one such tool that prevents the network from possible intrusions by inspecting the network traffic, to ensure its confidentiality, integrity, and availability. Despite enormous efforts by the researchers, IDS still faces challenges in improving detection accuracy while reducing false alarm rates and in detecting novel intrusions. Recently, machine learning (ML) and deep learning (DL)-based IDS systems are being deployed as potential solutions to detect intrusions across the network in an efficient manner. This article first clarifies the concept of IDS and then provides the taxonomy based on the notable ML and DL techniques adopted in designing network-based IDS (NIDS) systems. A comprehensive review of the recent NIDS-based articles is provided by discussing the strengths and limitations of the proposed solutions. Then, recent trends and advancements of ML and DL-based NIDS are provided in terms of the proposed methodology, evaluation metrics, and dataset selection. Using the shortcomings of the proposed methods, we highlighted various research challenges and provided the future scope for the research in improving ML and DL-based NIDS.
引用
收藏
页数:29
相关论文
共 141 条
  • [1] A Game-Theoretic Approach for Enhancing Security and Data Trustworthiness in IoT Applications
    Abdalzaher, Mohamed S.
    Muta, Osamu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (11): : 11250 - 11261
  • [2] Employing Game Theory and TDMA Protocol to Enhance Security and Manage Power Consumption in WSNs-Based Cognitive Radio
    Abdalzaher, Mohamed S.
    Muta, Osamu
    [J]. IEEE ACCESS, 2019, 7 : 132923 - 132936
  • [3] Abdalzaher MS, 2017, IEEE SYMP COMP COMMU, P1257, DOI 10.1109/ISCC.2017.8024697
  • [4] Abdalzaher MS, 2017, IEEE SYMP COMP COMMU, P552, DOI 10.1109/ISCC.2017.8024586
  • [5] Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection
    Abdulhammed, Razan
    Musafer, Hassan
    Alessa, Ali
    Faezipour, Miad
    Abuzneid, Abdelshakour
    [J]. ELECTRONICS, 2019, 8 (03)
  • [6] MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles
    Ahmad, Farhan
    Kurugollu, Fatih
    Adnane, Asma
    Hussain, Rasheed
    Hussain, Fatima
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) : 3310 - 3322
  • [7] Blockchain in Internet-of-Things: Architecture, Applications and Research Directions
    Ahmad, Farhan
    Ahmad, Zeeshan
    Kerrache, Chaker Abdelaziz
    Kurugollu, Fatih
    Adnane, Asma
    Barka, Ezedin
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 314 - 319
  • [8] An intrusion detection system based on combining probability predictions of a tree of classifiers
    Ahmim, Ahmed
    Derdour, Makhlouf
    Ferrag, Mohamed Amine
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (09)
  • [9] Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection
    Al-Qatf, Majjed
    Yu Lasheng
    Al-Habib, Mohammed
    Al-Sabahi, Kamal
    [J]. IEEE ACCESS, 2018, 6 : 52843 - 52856
  • [10] Alalousi Alhamza, 2016, INT J ELECT COMPUT E, V6, P778