Intrusion detection based on Machine Learning techniques in computer networks

被引:57
作者
Dina, Ayesha S. [1 ]
Manivannan, D. [1 ]
机构
[1] Univ Kentucky, Dept Comp Sci, Lexington, KY 40508 USA
关键词
Network security; Computer security; Cybersecurity; Intrusion detection; Intrusion prevention; Machine learning; DETECTION SYSTEMS; IOT; UNIVERSAL; ALGORITHM; THINGS; MODEL;
D O I
10.1016/j.iot.2021.100462
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusions in computer networks have increased significantly in the last decade, due in part to a profitable underground cyber-crime economy and the availability of sophisticated tools for launching such intrusions. Researchers in industry and academia have been proposing methods and building systems for detecting and preventing such security breaches for more than four decades. Solutions proposed for dealing with network intrusions can be broadly classified as signature-based and anomaly-based. Signature-based intrusion detection systems look for patterns that match known attacks. On the other hand, anomaly-based intrusion detection systems develop a model for distinguishing legitimate users' behavior from that of malicious users' and hence are capable of detecting unknown attacks. One of the approaches used to classify legitimate and anomalous behavior is to use Machine Learning (ML) techniques. Several intrusion detection systems based on ML techniques have been proposed in the literature. In this paper, we present a comprehensive critical survey of ML-based intrusion detection approaches presented in the literature in the last ten years. This survey would serve as a supplement to other general surveys on intrusion detection as well as a reference to recent work done in the area for researchers working in ML-based intrusion detection systems. We also discuss some open issues that need to be addressed.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Intrusion detection in IoT networks using machine learning and deep learning approaches for MitM attack mitigation
    Muhanna Ahmed Ali
    Salah Alawi Hussein Al-Sharafi
    Discover Internet of Things, 5 (1):
  • [22] Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks
    Zhang, Huibin
    Wang, Yuqiao
    Chen, Haoran
    Zhao, Yongli
    Zhang, Jie
    OPTICAL FIBER TECHNOLOGY, 2017, 39 : 37 - 42
  • [23] Effect of Balancing Data Using Synthetic Data on the Performance of Machine Learning Classifiers for Intrusion Detection in Computer Networks
    Dina, Ayesha Siddiqua
    Siddique, A. B.
    Manivannan, D.
    IEEE ACCESS, 2022, 10 : 96731 - 96747
  • [24] Evaluation of Machine Learning Techniques for Traffic Flow-Based Intrusion Detection
    Rodriguez, Maria
    Alesanco, Alvaro
    Mehavilla, Lorena
    Garcia, Jose
    SENSORS, 2022, 22 (23)
  • [25] Cybersecurity in the AI era: analyzing the impact of machine learning on intrusion detection
    Dong, Huiyao
    Kotenko, Igor
    KNOWLEDGE AND INFORMATION SYSTEMS, 2025, : 3915 - 3966
  • [26] A machine learning-based normalized fuzzy subset linked model in networks for intrusion detection
    Madhuri, Simhadri
    Lakshmi, S. Venkata
    SOFT COMPUTING, 2023,
  • [27] Machine Learning for Intrusion Detection in Mobile Tactical Networks
    Yu, Ken F.
    Harang, Richard E.
    Wood, Kerry N.
    CYBER SENSING 2017, 2017, 10185
  • [28] Network intrusion detection system: A systematic study of machine learning and deep learning approaches
    Ahmad, Zeeshan
    Shahid Khan, Adnan
    Wai Shiang, Cheah
    Abdullah, Johari
    Ahmad, Farhan
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
  • [29] Design an Internet of Things Standard Machine Learning Based Intrusion Detection for Wireless Sensing Networks
    Alalayah, Khaled M.
    Alaidarous, Khadija M.
    Alzanin, Samah M.
    Mahdi, Mohammed A.
    Hazber, Mohamed A. G.
    Alwayle, Ibrahim M.
    Noaman, Khaled M. G.
    JOURNAL OF NANOELECTRONICS AND OPTOELECTRONICS, 2023, 18 (02) : 217 - 226
  • [30] A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques
    Singh G.
    Khare N.
    International Journal of Computers and Applications, 2022, 44 (07) : 659 - 669