Network intrusion detection system: A systematic study of machine learning and deep learning approaches

被引:448
作者
Ahmad, Zeeshan [1 ,2 ]
Shahid Khan, Adnan [1 ]
Wai Shiang, Cheah [1 ]
Abdullah, Johari [1 ]
Ahmad, Farhan [3 ,4 ]
机构
[1] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Sarawak, Malaysia
[2] King Khalid Univ, Dept Elect Engn, Coll Engn, Abha, Saudi Arabia
[3] Univ Derby, Coll Engn & Technol, Cyber Secur Res Grp, Derby, England
[4] Coventry Univ, Inst Future Transport & Cities, Coventry, W Midlands, England
关键词
Deep learning; Machine learning; Network anomaly detection; Network intrusion detection system; Network security; NEURAL-NETWORK; SPARSE AUTOENCODER; ENSEMBLE METHOD; MODEL; ALGORITHM; INTERNET; THINGS; FRAMEWORK; TAXONOMY; TRUST;
D O I
10.1002/ett.4150
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The rapid advances in the internet and communication fields have resulted in a huge increase in the network size and the corresponding data. As a result, many novel attacks are being generated and have posed challenges for network security to accurately detect intrusions. Furthermore, the presence of the intruders with the aim to launch various attacks within the network cannot be ignored. An intrusion detection system (IDS) is one such tool that prevents the network from possible intrusions by inspecting the network traffic, to ensure its confidentiality, integrity, and availability. Despite enormous efforts by the researchers, IDS still faces challenges in improving detection accuracy while reducing false alarm rates and in detecting novel intrusions. Recently, machine learning (ML) and deep learning (DL)-based IDS systems are being deployed as potential solutions to detect intrusions across the network in an efficient manner. This article first clarifies the concept of IDS and then provides the taxonomy based on the notable ML and DL techniques adopted in designing network-based IDS (NIDS) systems. A comprehensive review of the recent NIDS-based articles is provided by discussing the strengths and limitations of the proposed solutions. Then, recent trends and advancements of ML and DL-based NIDS are provided in terms of the proposed methodology, evaluation metrics, and dataset selection. Using the shortcomings of the proposed methods, we highlighted various research challenges and provided the future scope for the research in improving ML and DL-based NIDS.
引用
收藏
页数:29
相关论文
共 141 条
  • [31] Internet of Things: A survey on machine learning-based intrusion detection approaches
    da Costa, Kelton A. P.
    Papa, Joao P.
    Lisboa, Celso O.
    Munoz, Roberto
    de Albuquerque, Victor Hugo C.
    [J]. COMPUTER NETWORKS, 2019, 151 : 147 - 157
  • [32] Dahl GE, 2013, INT CONF ACOUST SPEE, P8609, DOI 10.1109/ICASSP.2013.6639346
  • [33] Towards a taxonomy of intrusion-detection systems
    Debar, H
    Dacier, M
    Wespi, A
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08): : 805 - 822
  • [34] An improved method to construct basic probability assignment based on the confusion matrix for classification problem
    Deng, Xinyang
    Liu, Qi
    Deng, Yong
    Mahadevan, Sankaran
    [J]. INFORMATION SCIENCES, 2016, 340 : 250 - 261
  • [35] AN INTRUSION-DETECTION MODEL
    DENNING, DE
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232
  • [36] Enhanced transductive support vector machine classification with grey wolf optimizer cuckoo search optimization for intrusion detection system
    Devi, E. M. Roopa
    Suganthe, R. C.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (04)
  • [37] Effective Intrusion Detection System Using XGBoost
    Dhaliwal, Sukhpreet Singh
    Abdullah-Al Nahid
    Abbas, Robert
    [J]. INFORMATION, 2018, 9 (07)
  • [38] Dong B, 2016, I C COMM SOFTW NET, P581, DOI 10.1109/ICCSN.2016.7586590
  • [39] Farahnakian F, 2018, INT CONF ADV COMMUN, P178, DOI 10.23919/ICACT.2018.8323688
  • [40] Random Forest Modeling for Network Intrusion Detection System
    Farnaaz, Nabila
    Jabbar, M. A.
    [J]. TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 213 - 217