Comparative research on network intrusion detection methods based on machine learning

被引:64
作者
Zhang, Chunying [1 ]
Jia, Donghao [1 ]
Wang, Liya [1 ]
Wang, Wenjie [1 ]
Liu, Fengchun [2 ]
Yang, Aimin [1 ]
机构
[1] North China Univ Sci & Technol, Coll Sci, Qinhuangdao, Hebei, Peoples R China
[2] North China Univ Sci & Technol, Qianan Coll, Qinhuangdao, Hebei, Peoples R China
关键词
Network intrusion detection; Machine learning; Deep learning; Comparative experiment; ATTACK DETECTION;
D O I
10.1016/j.cose.2022.102861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection system is an essential part of network security research. It detects intrusion behaviors through active defense technology and takes emergency measures such as alerting and terminating intrusions. With the rapid development of machine learning technology, more and more researchers apply machine learning algorithms to network intrusion detection to improve detection efficiency and accuracy. Due to the different principles of various algorithms, they also have their advantages and disadvantages. To construct the dominant algorithm model in the field of network intrusion detection and provide the accuracy value, this paper systematically combs the application literature of machine learning algorithms in intrusion detection in the past ten years. A review is made from three categories: traditional machine learning, ensemble learning, and deep learning. Then, this paper selects the KDD CUP99 and NSL-KDD datasets to conduct comparative experiments on decision trees, Naive Bayes, support vector machines, random forests, XGBoost, convolutional neural networks, and recurrent neural networks. The detection accuracy, F1, AUC, and other indicators of these algorithms on different data sets are compared. The experimental results show that the effect of the ensemble learning algorithm is generally better. The Naive Bayes algorithm has low accuracy in recognizing the learned data, but it has obvious advantages when facing new types of attacks, and the training speed is faster. The deep learning algorithm is not particularly prominent in this experiment, but its optimal results are affected by the structure, hyperparameters, and the number of training iterations, which need further in-depth study. Finally, the main challenges facing the current network intrusion detection field are summarized, and the future research directions have been prospected. (C) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:17
相关论文
共 88 条
[21]  
Gumusbas D., 2022, Advances in Machine Learning/Deep Learning-based Technologies, P117, DOI 10.1007/978-3-030-76794-5_7
[22]   T-SNERF: A novel high accuracy machine learning approach for Intrusion Detection Systems [J].
Hammad, Mohamed ;
Hewahi, Nabil ;
Elmedany, Wael .
IET INFORMATION SECURITY, 2021, 15 (02) :178-190
[23]   Machine learning in cybersecurity: A review [J].
Handa, Anand ;
Sharma, Ashu ;
Shukla, Sandeep K. .
WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2019, 9 (04)
[24]   Deep-Feature-Based Autoencoder Network for Few-Shot Malicious Traffic Detection [J].
He, Mingshu ;
Wang, Xiaojuan ;
Zhou, Junhua ;
Xi, Yuanyuan ;
Jin, Lei ;
Wang, Xinlei .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[25]   Support vector machines [J].
Hearst, MA .
IEEE INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 1998, 13 (04) :18-21
[26]  
Hota H., 2014, Advanced Computing, Networking and Informatics-Volume, V1, P205, DOI DOI 10.1007/978-3-319-07353-824
[27]   Robust Network Intrusion Detection Scheme Using Long-Short Term Memory Based Convolutional Neural Networks [J].
Hsu, Chia-Ming ;
Azhari, Muhammad Zulfan ;
Hsieh, He-Yen ;
Prakosa, Setya Widyawan ;
Leu, Jenq-Shiou .
MOBILE NETWORKS & APPLICATIONS, 2021, 26 (03) :1137-1144
[28]   STATE TRANSITION ANALYSIS - A RULE-BASED INTRUSION DETECTION APPROACH [J].
ILGUN, K ;
KEMMERER, RA ;
PORRAS, PA .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1995, 21 (03) :181-199
[29]   The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems [J].
Iwendi, Celestine ;
Khan, Suleman ;
Anajemba, Joseph Henry ;
Mittal, Mohit ;
Alenezi, Mamdouh ;
Alazab, Mamoun .
SENSORS, 2020, 20 (09)
[30]   Convolutional neural network-based intrusion detection system for AVTP streams in automotive Ethernet-based networks [J].
Jeong, Seonghoon ;
Jeon, Boosun ;
Chung, Boheung ;
Kim, Huy Kang .
VEHICULAR COMMUNICATIONS, 2021, 29