A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection

被引:405
作者
Mishra, Preeti [1 ,2 ]
Varadharajan, Vijay [3 ,4 ]
Tupakula, Uday [3 ,4 ]
Pilli, Emmanuel S. [5 ]
机构
[1] MNIT, Jaipur 302017, Rajasthan, India
[2] Graph Era Deemed Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[3] Univ Newcastle, Fac Engn & Built Environm, Callaghan, NSW 2308, Australia
[4] Univ Newcastle, Adv Cyber Secur Res Ctr, Callaghan, NSW 2308, Australia
[5] Malaviya Natl Inst Technol, Dept Comp Sci & Engn, Jaipur 302017, Rajasthan, India
关键词
Machine learning; intrusion; attacks; security; SUPPORT VECTOR MACHINES; FEATURE-SELECTION; ANOMALY DETECTION; SWARM INTELLIGENCE; GENETIC ALGORITHM; NAIVE BAYES; NETWORK; SYSTEM; ATTACKS; SVM;
D O I
10.1109/COMST.2018.2847722
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches. However, they are not very successful in identifying all types of intrusions. In this paper, a detailed investigation and analysis of various machine learning techniques have been carried out for finding the cause of problems associated with various machine learning techniques in detecting intrusive activities. Attack classification and mapping of the attack features is provided corresponding to each attack. Issues which are related to detecting low-frequency attacks using network attack dataset are also discussed and viable methods are suggested for improvement. Machine learning techniques have been analyzed and compared in terms of their detection capability for detecting the various category of attacks. Limitations associated with each category of them are also discussed. Various data mining tools for machine learning have also been included in the paper. At the end, future directions are provided for attack detection using machine learning techniques.
引用
收藏
页码:686 / 728
页数:43
相关论文
共 195 条
[1]  
Abadi M., 2006, IRANIAN J ELECT ELEC, V2, P106
[2]   A novel SVM-kNN-PSO ensemble method for intrusion detection system [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
APPLIED SOFT COMPUTING, 2016, 38 :360-372
[3]  
Achtert E, 2008, LECT NOTES COMPUT SC, V5069, P580
[4]   Survey on Anomaly Detection using Data Mining Techniques [J].
Agrawal, Shikha ;
Agrawal, Jitendra .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :708-713
[5]   A k-mean clustering algorithm for mixed numeric and categorical data [J].
Ahmad, Amir ;
Dey, Lipika .
DATA & KNOWLEDGE ENGINEERING, 2007, 63 (02) :503-527
[6]   Optimized intrusion detection mechanism using soft computing techniques [J].
Ahmad, Iftikhar ;
Abdullah, Azween ;
Alghamdi, Abdullah ;
Hussain, Muhammad .
TELECOMMUNICATION SYSTEMS, 2013, 52 (04) :2187-2195
[7]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[8]   A feature reduced intrusion detection system using ANN classifier [J].
Akashdeep ;
Manzoor, Ishfaq ;
Kumar, Neeraj .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 88 :249-257
[9]   Generalized radial basis function networks for classification and novelty detection: self-organization of optimal Bayesian decision [J].
Albrecht, S ;
Busch, J ;
Kloppenburg, M ;
Metze, F ;
Tavan, P .
NEURAL NETWORKS, 2000, 13 (10) :1075-1093
[10]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998