Studying Machine Learning Techniques for Intrusion Detection Systems

被引:15
作者
Quang-Vinh Dang [1 ]
机构
[1] Ind Univ Ho Chi Minh City, Data Innovat Lab, Ho Chi Minh City, Vietnam
来源
FUTURE DATA AND SECURITY ENGINEERING (FDSE 2019) | 2019年 / 11814卷
关键词
Intrusion Detection System; Machine learning; Classification; NETWORKS;
D O I
10.1007/978-3-030-35653-8_28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems (IDSs) have been studied widely in the computer security community for a long time. The recent development of machine learning techniques has boosted the performance of the intrusion detection systems significantly. However, most modern machine learning and deep learning algorithms are exhaustive of labeled data that requires a lot of time and effort to collect. Furthermore, it might be late until all the data is collected to train the model. In this study, we first perform a comprehensive survey of existing studies on using machine learning for IDSs. Hence we present two approaches to detect the network attacks. We present that by using a tree-based ensemble learning with feature engineering we can outperform state-of-the-art results in the field. We also present a new approach in selecting training data for IDSs hence by using a small subset of training data combined with some weak classification algorithms we can improve the performance of the detector while maintaining the low running cost.
引用
收藏
页码:411 / 426
页数:16
相关论文
共 47 条
  • [1] Aggarwal C. C, 2013, OUTLIER ANAL, DOI [10.1007/978-1-4614-6396-2, DOI 10.1007/978-1-4614-6396-2]
  • [2] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31
  • [3] A Survey of Random Forest Based Methods for Intrusion Detection Systems
    Alves Resende, Paulo Angelo
    Drummond, Andre Costa
    [J]. ACM COMPUTING SURVEYS, 2018, 51 (03)
  • [4] Amor S., 2004, ACM Symp. Appl. Comput, P420, DOI DOI 10.1145/967900.967989
  • [5] Anderson James P., 1980, Tech. Rep
  • [6] [Anonymous], 2008, P 8 SIAM INT C DAT M, DOI [DOI 10.1137/1.9781611972788.22, 10.1137/1.9781611972788.22]
  • [7] [Anonymous], 2014, Internet Security Threat Report
  • [8] [Anonymous], 2016, ICACCI
  • [9] [Anonymous], 2016, KDD16 P 22 ACM, DOI DOI 10.1145/2939672.2939785
  • [10] Bhamare D., 2018, ABS181009878 CORR