Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study

被引:479
|
作者
Ferrag, Mohamed Amine [1 ]
Maglaras, Leandros [2 ]
Moschoyiannis, Sotiris [3 ]
Janicke, Helge [2 ]
机构
[1] Guelma Univ, Dept Comp Sci, Guelma 24000, Algeria
[2] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[3] Univ Surrey, Dept Comp Sci, Guildford, Surrey, England
基金
英国工程与自然科学研究理事会;
关键词
Machine learning; Deep learning; Cyber security; Intrusion detection; TRAFFIC CLASSIFICATION; NETWORK; SYSTEMS; INTERNET; ATTACKS; THINGS;
D O I
10.1016/j.jisa.2019.102419
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study. Specifically, we provide a review of intrusion detection systems based on deep learning approaches. The dataset plays an important role in intrusion detection, therefore we describe 35 well-known cyber datasets and provide a classification of these datasets into seven categories; namely, network traffic-based dataset, electrical network-based dataset, internet traffic-based dataset, virtual private network-based dataset, android apps-based dataset, IoT traffic-based dataset, and internet-connected devices-based dataset. We analyze seven deep learning models including recurrent neural networks, deep neural networks, restricted Boltzmann machines, deep belief networks, convolutional neural networks, deep Boltzmann machines, and deep autoencoders. For each model, we study the performance in two categories of classification (binary and multiclass) under two new real traffic datasets, namely, the CSE-CIC-IDS2018 dataset and the Bot-IoT dataset. In addition, we use the most important performance indicators, namely, accuracy, false alarm rate, and detection rate for evaluating the efficiency of several methods. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Machine learning methods for cyber security intrusion detection: Datasets and comparative study
    Kilincer, Ilhan Firat
    Ertam, Fatih
    Sengur, Abdulkadir
    COMPUTER NETWORKS, 2021, 188
  • [2] Network intrusion detection system: A systematic study of machine learning and deep learning approaches
    Ahmad, Zeeshan
    Shahid Khan, Adnan
    Wai Shiang, Cheah
    Abdullah, Johari
    Ahmad, Farhan
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
  • [3] A Study: Machine Learning and Deep Learning Approaches for Intrusion Detection System
    Sekhar, C. H.
    Rao, K. Venkata
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 845 - 849
  • [4] Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study
    Wang, Zihao
    Fok, Kar Wai
    Thing, Vrizlynn L. L.
    COMPUTERS & SECURITY, 2022, 113
  • [5] Intrusion Detection in IoT Using Deep Learning
    Banaamah, Alaa Mohammed
    Ahmad, Iftikhar
    SENSORS, 2022, 22 (21)
  • [6] ENHANCING IIOT SECURITY WITH MACHINE LEARNING AND DEEP LEARNING FOR INTRUSION DETECTION
    Awad, Omer Fawzi
    Hazim, Layth Rafea
    Jasim, Abdulrahman Ahmed
    Ata, Oguz
    MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2024, 37 (02) : 139 - 153
  • [7] Cyber Security Intrusion Detection for Agriculture 4.0: Machine Learning-Based Solutions, Datasets, and Future Directions
    Ferrag, Mohamed Amine
    Shu, Lei
    Friha, Othmane
    Yang, Xing
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2022, 9 (03) : 407 - 436
  • [8] Machine and Deep Learning Based Comparative Analysis Using Hybrid Approaches for Intrusion Detection System
    Rashid, Azam
    Siddique, Muhammad Jawaid
    Ahmed, Shahid Munir
    2020 3RD INTERNATIONAL CONFERENCE ON ADVANCEMENTS IN COMPUTATIONAL SCIENCES (ICACS), 2020,
  • [10] Deep Learning in IoT Intrusion Detection
    Tsimenidis, Stefanos
    Lagkas, Thomas
    Rantos, Konstantinos
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2022, 30 (01)