Comparative research on network intrusion detection methods based on machine learning

被引:64
作者
Zhang, Chunying [1 ]
Jia, Donghao [1 ]
Wang, Liya [1 ]
Wang, Wenjie [1 ]
Liu, Fengchun [2 ]
Yang, Aimin [1 ]
机构
[1] North China Univ Sci & Technol, Coll Sci, Qinhuangdao, Hebei, Peoples R China
[2] North China Univ Sci & Technol, Qianan Coll, Qinhuangdao, Hebei, Peoples R China
关键词
Network intrusion detection; Machine learning; Deep learning; Comparative experiment; ATTACK DETECTION;
D O I
10.1016/j.cose.2022.102861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection system is an essential part of network security research. It detects intrusion behaviors through active defense technology and takes emergency measures such as alerting and terminating intrusions. With the rapid development of machine learning technology, more and more researchers apply machine learning algorithms to network intrusion detection to improve detection efficiency and accuracy. Due to the different principles of various algorithms, they also have their advantages and disadvantages. To construct the dominant algorithm model in the field of network intrusion detection and provide the accuracy value, this paper systematically combs the application literature of machine learning algorithms in intrusion detection in the past ten years. A review is made from three categories: traditional machine learning, ensemble learning, and deep learning. Then, this paper selects the KDD CUP99 and NSL-KDD datasets to conduct comparative experiments on decision trees, Naive Bayes, support vector machines, random forests, XGBoost, convolutional neural networks, and recurrent neural networks. The detection accuracy, F1, AUC, and other indicators of these algorithms on different data sets are compared. The experimental results show that the effect of the ensemble learning algorithm is generally better. The Naive Bayes algorithm has low accuracy in recognizing the learned data, but it has obvious advantages when facing new types of attacks, and the training speed is faster. The deep learning algorithm is not particularly prominent in this experiment, but its optimal results are affected by the structure, hyperparameters, and the number of training iterations, which need further in-depth study. Finally, the main challenges facing the current network intrusion detection field are summarized, and the future research directions have been prospected. (C) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:17
相关论文
共 88 条
[81]  
[姚潍 Yao Wei], 2015, [计算机应用, Journal of Computer Applications], V35, P2883
[82]  
Yin L.B, 2019, DECODING IND CYBER S, V1th
[83]   Network Intrusion Detection Method Based on PCA and Bayes Algorithm [J].
Zhang, Bing ;
Liu, Zhiyang ;
Jia, Yanguo ;
Ren, Jiadong ;
Zhao, Xiaolin .
SECURITY AND COMMUNICATION NETWORKS, 2018,
[84]   Label flipping attacks against Naive Bayes on spam filtering systems [J].
Zhang, Hongpo ;
Cheng, Ning ;
Zhang, Yang ;
Li, Zhanbo .
APPLIED INTELLIGENCE, 2021, 51 (07) :4503-4514
[85]   An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset [J].
Zhang, Hongpo ;
Huang, Lulu ;
Wu, Chase Q. ;
Li, Zhanbo .
COMPUTER NETWORKS, 2020, 177
[86]   State-of-the-art review of soft computing applications in underground excavations [J].
Zhang, Wengang ;
Zhang, Runhong ;
Wu, Chongzhi ;
Goh, Anthony Teck Chee ;
Lacasse, Suzanne ;
Liu, Zhongqiang ;
Liu, Hanlong .
GEOSCIENCE FRONTIERS, 2020, 11 (04) :1095-1106
[87]   Siamese Neural Network Based Few-Shot Learning for Anomaly Detection in Industrial Cyber-Physical Systems [J].
Zhou, Xiaokang ;
Liang, Wei ;
Shimizu, Shohei ;
Ma, Jianhua ;
Jin, Qun .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (08) :5790-5798
[88]  
[朱军 Zhu Jun], 2015, [计算机研究与发展, Journal of Computer Research and Development], V52, P16