Comparative research on network intrusion detection methods based on machine learning

被引:64
作者
Zhang, Chunying [1 ]
Jia, Donghao [1 ]
Wang, Liya [1 ]
Wang, Wenjie [1 ]
Liu, Fengchun [2 ]
Yang, Aimin [1 ]
机构
[1] North China Univ Sci & Technol, Coll Sci, Qinhuangdao, Hebei, Peoples R China
[2] North China Univ Sci & Technol, Qianan Coll, Qinhuangdao, Hebei, Peoples R China
关键词
Network intrusion detection; Machine learning; Deep learning; Comparative experiment; ATTACK DETECTION;
D O I
10.1016/j.cose.2022.102861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection system is an essential part of network security research. It detects intrusion behaviors through active defense technology and takes emergency measures such as alerting and terminating intrusions. With the rapid development of machine learning technology, more and more researchers apply machine learning algorithms to network intrusion detection to improve detection efficiency and accuracy. Due to the different principles of various algorithms, they also have their advantages and disadvantages. To construct the dominant algorithm model in the field of network intrusion detection and provide the accuracy value, this paper systematically combs the application literature of machine learning algorithms in intrusion detection in the past ten years. A review is made from three categories: traditional machine learning, ensemble learning, and deep learning. Then, this paper selects the KDD CUP99 and NSL-KDD datasets to conduct comparative experiments on decision trees, Naive Bayes, support vector machines, random forests, XGBoost, convolutional neural networks, and recurrent neural networks. The detection accuracy, F1, AUC, and other indicators of these algorithms on different data sets are compared. The experimental results show that the effect of the ensemble learning algorithm is generally better. The Naive Bayes algorithm has low accuracy in recognizing the learned data, but it has obvious advantages when facing new types of attacks, and the training speed is faster. The deep learning algorithm is not particularly prominent in this experiment, but its optimal results are affected by the structure, hyperparameters, and the number of training iterations, which need further in-depth study. Finally, the main challenges facing the current network intrusion detection field are summarized, and the future research directions have been prospected. (C) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:17
相关论文
共 88 条
[11]   I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems [J].
Bedi, Punam ;
Gupta, Neha ;
Jindal, Vinita .
APPLIED INTELLIGENCE, 2021, 51 (02) :1133-1151
[12]   An intrusion detection and alert correlation approach based on revising probabilistic classifiers using expert knowledge [J].
Benferhat, Salem ;
Boudjelida, Abdelhamid ;
Tabia, Karim ;
Drias, Habiba .
APPLIED INTELLIGENCE, 2013, 38 (04) :520-540
[13]   A Novel PCA-Firefly Based XGBoost Classification Model for Intrusion Detection in Networks Using GPU [J].
Bhattacharya, Sweta ;
Krishnan, Siva Rama S. ;
Maddikunta, Praveen Kumar Reddy ;
Kaluri, Rajesh ;
Singh, Saurabh ;
Gadekallu, Thippa Reddy ;
Alazab, Mamoun ;
Tariq, Usman .
ELECTRONICS, 2020, 9 (02)
[14]   Network anomaly detection in a controlled environment based on an enhanced PSOGSARFC [J].
Boahen, Edward Kwadwo ;
Bouya-Moko, Brunel Elvire ;
Wang, Changda .
COMPUTERS & SECURITY, 2021, 104
[15]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[16]   A Review and Experimental Comparison of Multivariate Decision Trees [J].
Canete-Sifuentes, Leonardo ;
Monroy, Raul ;
Medina-Perez, Miguel Angel .
IEEE ACCESS, 2021, 9 :110451-110479
[17]   Problem formulations and solvers in linear SVM: a review [J].
Chauhan, Vinod Kumar ;
Dahiya, Kalpana ;
Sharma, Anuj .
ARTIFICIAL INTELLIGENCE REVIEW, 2019, 52 (02) :803-855
[18]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[19]   Mining network data for intrusion detection through combining SVMs with ant colony networks [J].
Feng, Wenying ;
Zhang, Qinglei ;
Hu, Gongzhu ;
Huang, Jimmy Xiangji .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 37 :127-140
[20]   An effective intrusion detection approach using SVM with naive Bayes feature embedding [J].
Gu, Jie ;
Lu, Shan .
COMPUTERS & SECURITY, 2021, 103