Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study

被引:525
作者
Ferrag, Mohamed Amine [1 ]
Maglaras, Leandros [2 ]
Moschoyiannis, Sotiris [3 ]
Janicke, Helge [2 ]
机构
[1] Guelma Univ, Dept Comp Sci, Guelma 24000, Algeria
[2] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[3] Univ Surrey, Dept Comp Sci, Guildford, Surrey, England
基金
英国工程与自然科学研究理事会;
关键词
Machine learning; Deep learning; Cyber security; Intrusion detection; TRAFFIC CLASSIFICATION; NETWORK; SYSTEMS; INTERNET; ATTACKS; THINGS;
D O I
10.1016/j.jisa.2019.102419
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study. Specifically, we provide a review of intrusion detection systems based on deep learning approaches. The dataset plays an important role in intrusion detection, therefore we describe 35 well-known cyber datasets and provide a classification of these datasets into seven categories; namely, network traffic-based dataset, electrical network-based dataset, internet traffic-based dataset, virtual private network-based dataset, android apps-based dataset, IoT traffic-based dataset, and internet-connected devices-based dataset. We analyze seven deep learning models including recurrent neural networks, deep neural networks, restricted Boltzmann machines, deep belief networks, convolutional neural networks, deep Boltzmann machines, and deep autoencoders. For each model, we study the performance in two categories of classification (binary and multiclass) under two new real traffic datasets, namely, the CSE-CIC-IDS2018 dataset and the Bot-IoT dataset. In addition, we use the most important performance indicators, namely, accuracy, false alarm rate, and detection rate for evaluating the efficiency of several methods. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:19
相关论文
共 110 条
[1]   A survey of intrusion detection systems based on ensemble and hybrid classifiers [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
COMPUTERS & SECURITY, 2017, 65 :135-152
[2]  
Adhikari U., Industrial control system (ICS) cyber-attack data-sets," data-sets used in the experimentation
[3]   A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models [J].
Ahmim, Ahmed ;
Maglaras, Leandros ;
Ferrag, Mohamed Amine ;
Derdour, Makhlouf ;
Janicke, Helge .
2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2019, :228-233
[4]   An intrusion detection system based on combining probability predictions of a tree of classifiers [J].
Ahmim, Ahmed ;
Derdour, Makhlouf ;
Ferrag, Mohamed Amine .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (09)
[5]   Intrusion Detection Systems for Intra-Vehicle Networks: A Review [J].
Al-Jarrah, Omar Y. ;
Maple, Carsten ;
Dianati, Mehrdad ;
Oxtoby, David ;
Mouzakitis, Alex .
IEEE ACCESS, 2019, 7 :21266-21289
[6]   An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection [J].
Aldwairi, Tamer ;
Perera, Dilina ;
Novotny, Mark A. .
COMPUTER NETWORKS, 2018, 144 :111-119
[7]   An intrusion detection system for connected vehicles in smart cities [J].
Aloqaily, Moayad ;
Otoum, Safa ;
Al Ridhawi, Ismaeel ;
Jararweh, Yaser .
AD HOC NETWORKS, 2019, 90
[8]  
[Anonymous], 2015, 7 ANN SE CYB SEC SUM
[9]  
[Anonymous], P 2 INT C COMP SCI A
[10]  
[Anonymous], DEEP SCALABLE UNSUPE