A comprehensive survey and taxonomy of the SVM-based intrusion detection systems

被引:140
作者
Mohammadi, Mokhtar [1 ]
Rashid, Tarik A. [2 ]
Karim, Sarkhel H. Taher [3 ,4 ]
Aldalwie, Adil Hussain Mohammed [5 ]
Quan Thanh Tho [6 ]
Bidaki, Moazam [7 ]
Rahmani, Amir Masoud [8 ,9 ]
Hosseinzadeh, Mehdi [10 ,11 ]
机构
[1] Lebanese French Univ, Dept Informat Technol, Erbil, Kurdistan Regio, Iraq
[2] Univ Kurdistan Hewler, Comp Sci & Engn Dept, Erbil, Krg, Iraq
[3] Univ Halabja, Coll Sci, Comp Dept, Halabja, Iraq
[4] Sulaimani Polytech Univ, Tech Coll Informat, Comp Networks Dept, Sulaymaniyah, Iraq
[5] Cihan Univ Erbil, Dept Commun & Comp Engn, Erbil, Iraq
[6] Ho Chi Minh City Univ Technol Vietnam Natl Univ, Dept Software Engn, Ho Chi Minh City, Vietnam
[7] Islamic Azad Univ, Dept Comp Engn, Neyshabur Branch, Neyshabur, Iran
[8] Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, 123 Univ Rd,Sect 3, Touliu 64002, Yunlin, Taiwan
[9] Khazar Univ, Dept Comp Sci, Baku, Azerbaijan
[10] Duy Tan Univ, Inst Res & Dev, Da Nang 550000, Vietnam
[11] Iran Univ Med Sci, Mental Hlth Res Ctr, Psychosocial Hlth Res Inst, Tehran, Iran
关键词
SVM; Anomaly; Multi-class SVM; Feature selection; Intrusion detection; PCA; SUPPORT VECTOR MACHINES; FEATURE-SELECTION; ANOMALY DETECTION; INCREMENTAL SVM; HYBRID; ALGORITHM; ENSEMBLE;
D O I
10.1016/j.jnca.2021.102983
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing number of security attacks have inspired researchers to employ various classifiers, such as support vector machines (SVMs), to deal with them in Intrusion detection systems (IDSs). This paper presents a comprehensive study and investigation of the SVM-based intrusion detection and feature selection systems proposed in the literature. It first presents the essential concepts and background knowledge about security attacks, IDS, and SVM classifiers. It then provides a taxonomy of the SVM-based IDS schemes and describes how they have adapted numerous types of SVM classifiers in detecting various types of anomalies and intrusions. Moreover, it discusses the main contributions of the investigated schemes and highlights the algorithms and techniques combined with the SVM to enhance its detection rate and accuracy. Finally, different properties and limitations of the SVM-based IDS schemes are discussed.
引用
收藏
页数:24
相关论文
共 131 条
[1]   A novel weighted support vector machines multiclass classifier based on differential evolution for intrusion detection systems [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
INFORMATION SCIENCES, 2017, 414 :225-246
[2]  
Aburomman AA, 2016, Adv Inform Managemen, P636, DOI 10.1109/IMCEC.2016.7867287
[3]   A novel SVM-kNN-PSO ensemble method for intrusion detection system [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
APPLIED SOFT COMPUTING, 2016, 38 :360-372
[4]   Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques [J].
Agarwal, Basant ;
Mittal, Namita .
2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 :996-1003
[5]   Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components [J].
Ahmad, Iftikhar ;
Hussain, Muhammad ;
Alghamdi, Abdullah ;
Alelaiwi, Abdulhameed .
NEURAL COMPUTING & APPLICATIONS, 2014, 24 (7-8) :1671-1682
[6]   Optimized intrusion detection mechanism using soft computing techniques [J].
Ahmad, Iftikhar ;
Abdullah, Azween ;
Alghamdi, Abdullah ;
Hussain, Muhammad .
TELECOMMUNICATION SYSTEMS, 2013, 52 (04) :2187-2195
[7]   Real-time multi-agent system for an adaptive intrusion detection system [J].
Al-Yaseen, Wathiq Laftah ;
Othman, Zulaiha Ali ;
Nazri, Mohd Zakree Ahmad .
PATTERN RECOGNITION LETTERS, 2017, 85 :56-64
[8]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[9]   A new intrusion detection method based on SVM with minimum within-class scatter [J].
An, Wenjuan ;
Liang, Mangui .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (09) :1064-1074
[10]   RETRACTED: Oppositional based Laplacian grey wolf optimization algorithm with SVM for data mining in intrusion detection system (Retracted Article) [J].
Anitha, P. ;
Kaarthick, B. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (03) :3589-3600