Comparative research on network intrusion detection methods based on machine learning

被引:64
作者
Zhang, Chunying [1 ]
Jia, Donghao [1 ]
Wang, Liya [1 ]
Wang, Wenjie [1 ]
Liu, Fengchun [2 ]
Yang, Aimin [1 ]
机构
[1] North China Univ Sci & Technol, Coll Sci, Qinhuangdao, Hebei, Peoples R China
[2] North China Univ Sci & Technol, Qianan Coll, Qinhuangdao, Hebei, Peoples R China
关键词
Network intrusion detection; Machine learning; Deep learning; Comparative experiment; ATTACK DETECTION;
D O I
10.1016/j.cose.2022.102861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection system is an essential part of network security research. It detects intrusion behaviors through active defense technology and takes emergency measures such as alerting and terminating intrusions. With the rapid development of machine learning technology, more and more researchers apply machine learning algorithms to network intrusion detection to improve detection efficiency and accuracy. Due to the different principles of various algorithms, they also have their advantages and disadvantages. To construct the dominant algorithm model in the field of network intrusion detection and provide the accuracy value, this paper systematically combs the application literature of machine learning algorithms in intrusion detection in the past ten years. A review is made from three categories: traditional machine learning, ensemble learning, and deep learning. Then, this paper selects the KDD CUP99 and NSL-KDD datasets to conduct comparative experiments on decision trees, Naive Bayes, support vector machines, random forests, XGBoost, convolutional neural networks, and recurrent neural networks. The detection accuracy, F1, AUC, and other indicators of these algorithms on different data sets are compared. The experimental results show that the effect of the ensemble learning algorithm is generally better. The Naive Bayes algorithm has low accuracy in recognizing the learned data, but it has obvious advantages when facing new types of attacks, and the training speed is faster. The deep learning algorithm is not particularly prominent in this experiment, but its optimal results are affected by the structure, hyperparameters, and the number of training iterations, which need further in-depth study. Finally, the main challenges facing the current network intrusion detection field are summarized, and the future research directions have been prospected. (C) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:17
相关论文
共 88 条
[1]   Misbehavior-Aware On-Demand Collaborative Intrusion Detection System Using Distributed Ensemble Learning for VANET [J].
A. Ghaleb, Fuad ;
Saeed, Faisal ;
Al-Sarem, Mohammad ;
Ali Saleh Al-rimy, Bander ;
Boulila, Wadii ;
Eljialy, A. E. M. ;
Aloufi, Khalid ;
Alazab, Mamoun .
ELECTRONICS, 2020, 9 (09) :1-17
[2]   An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks [J].
Abu Al-Haija, Qasem ;
Zein-Sabatto, Saleh .
ELECTRONICS, 2020, 9 (12) :1-26
[3]   Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection [J].
Al-Qatf, Majjed ;
Yu Lasheng ;
Al-Habib, Mohammed ;
Al-Sabahi, Kamal .
IEEE ACCESS, 2018, 6 :52843-52856
[4]   Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection [J].
Alavizadeh, Hooman ;
Alavizadeh, Hootan ;
Jang-Jaccard, Julian .
COMPUTERS, 2022, 11 (03)
[5]   A Machine Learning Based Intrusion Detection System for Mobile Internet of Things [J].
Amouri, Amar ;
Alaparthy, Vishwa T. ;
Morgera, Salvatore D. .
SENSORS, 2020, 20 (02)
[6]  
Anderson J.P., 1980, Computer Security Threat Monitoring and Surveillance
[7]   Nearest cluster-based intrusion detection through convolutional neural networks [J].
Andresini, Giuseppina ;
Appice, Annalisa ;
Malerba, Donato .
KNOWLEDGE-BASED SYSTEMS, 2021, 216
[8]  
[Anonymous], 1999, KDD Cup 1999 Data
[9]  
Bagyalakshmi C., 2020, Int. J. Adv. Trends Comput. Sci. Eng, V9, P7301
[10]   Distributed Hierarchical Pattern-Matching for Network Intrusion Detection [J].
Baig, Zubair ;
Salah, Khaled .
JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02) :167-178