Intrusion detection based on Machine Learning techniques in computer networks

被引:57
作者
Dina, Ayesha S. [1 ]
Manivannan, D. [1 ]
机构
[1] Univ Kentucky, Dept Comp Sci, Lexington, KY 40508 USA
关键词
Network security; Computer security; Cybersecurity; Intrusion detection; Intrusion prevention; Machine learning; DETECTION SYSTEMS; IOT; UNIVERSAL; ALGORITHM; THINGS; MODEL;
D O I
10.1016/j.iot.2021.100462
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusions in computer networks have increased significantly in the last decade, due in part to a profitable underground cyber-crime economy and the availability of sophisticated tools for launching such intrusions. Researchers in industry and academia have been proposing methods and building systems for detecting and preventing such security breaches for more than four decades. Solutions proposed for dealing with network intrusions can be broadly classified as signature-based and anomaly-based. Signature-based intrusion detection systems look for patterns that match known attacks. On the other hand, anomaly-based intrusion detection systems develop a model for distinguishing legitimate users' behavior from that of malicious users' and hence are capable of detecting unknown attacks. One of the approaches used to classify legitimate and anomalous behavior is to use Machine Learning (ML) techniques. Several intrusion detection systems based on ML techniques have been proposed in the literature. In this paper, we present a comprehensive critical survey of ML-based intrusion detection approaches presented in the literature in the last ten years. This survey would serve as a supplement to other general surveys on intrusion detection as well as a reference to recent work done in the area for researchers working in ML-based intrusion detection systems. We also discuss some open issues that need to be addressed.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Machine Learning Techniques for Enhanced Intrusion Detection in IoT Security
    Hakami, Hanadi
    Faheem, Muhammad
    Bashir Ahmad, Majid
    IEEE ACCESS, 2025, 13 : 31140 - 31158
  • [42] Intrusion detection by machine learning: A review
    Tsai, Chih-Fong
    Hsu, Yu-Feng
    Lin, Chia-Ying
    Lin, Wei-Yang
    EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (10) : 11994 - 12000
  • [43] Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure
    Pinto, Andrea
    Luis-Carlos, Herrera
    Donoso, Yezid
    Gutierrez, Jairo A.
    SENSORS, 2023, 23 (05)
  • [44] Machine Learning Techniques for Network-based Intrusion Detection System: A Survey Paper
    Ahmed, Lubna Ali Hassan
    Hamad, Yahia Abdalla Mohamed
    2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021), 2021, : 1024 - +
  • [45] Intrusion Detection System Through Advance Machine Learning for the Internet of Things Networks
    Saba, Tanzila
    Sadad, Tariq
    Rehman, Amjad
    Mehmood, Zahid
    Javaid, Qaisar
    IT PROFESSIONAL, 2021, 23 (02) : 58 - 64
  • [46] Toward Improved Machine Learning-Based Intrusion Detection for Internet of Things Traffic
    Alkadi, Sarah
    Al-Ahmadi, Saad
    Ben Ismail, Mohamed Maher
    COMPUTERS, 2023, 12 (08)
  • [47] Machine Learning-Based Intrusion Detection Methods in IoT Systems: A Comprehensive Review
    Kikissagbe, Brunel Rolack
    Adda, Meddi
    ELECTRONICS, 2024, 13 (18)
  • [48] Performance analysis of machine learning algorithms on networks intrusion detection
    Hidri, Minyar Sassi
    Alsaif, Suleiman Ali
    Hidri, Adel
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2022, 70 (3-4) : 285 - 295
  • [49] A Situation Based Predictive Approach for Cybersecurity Intrusion Detection and Prevention Using Machine Learning and Deep Learning Algorithms in Wireless Sensor Networks of Industry 4.0
    Al-Quayed, Fatima
    Ahmad, Zulfiqar
    Humayun, Mamoona
    IEEE ACCESS, 2024, 12 : 34800 - 34819
  • [50] Role of Machine Learning in Intrusion Detection System: A Systematic Review
    Alhasani, Areej
    Al Omrani, Faten
    Alzahrani, Taghreed
    alFahhad, Rehab
    Alotaibi, Mohamed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (03): : 155 - 162