Intrusion detection by machine learning: A review

被引:564
作者
Tsai, Chih-Fong [4 ]
Hsu, Yu-Feng [3 ]
Lin, Chia-Ying [2 ]
Lin, Wei-Yang [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Minsyong, Taiwan
[2] Natl Chung Cheng Univ, Dept Accounting & Informat Technol, Minsyong, Taiwan
[3] Natl Sun Yat Sen Univ, Dept Informat Management, Kaohsiung, Taiwan
[4] Natl Cent Univ, Dept Informat Management, Taipei, Taiwan
关键词
Intrusion detection; Machine learning; Hybrid classifiers; Ensemble classifiers; ALGORITHM; CLASSIFIER; IDS;
D O I
10.1016/j.eswa.2009.05.029
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The popularity of using Internet contains some risks of network attacks. Intrusion detection is one major research problem in network security, whose aim is to identify unusual access or attacks to secure internal networks. In literature, intrusion detection systems have been approached by various machine learning techniques. However, there is no a review paper to examine and understand the current status of using machine learning techniques to solve the intrusion detection problems. This chapter reviews 55 related studies in the period between 2000 and 2007 focusing on developing single, hybrid, and ensemble classifiers. Related studies are compared by their classifier design, datasets used, and other experimental setups. Current achievements and limitations in developing intrusion detection systems by machine learning are present and discussed. A number of future research directions are also provided. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:11994 / 12000
页数:7
相关论文
共 75 条
[1]   A parallel genetic local search algorithm for intrusion detection in computer networks [J].
Abadeh, Mohammad Saniee ;
Habibi, Jafar ;
Barzegar, Zeynab ;
Sergi, Muna .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2007, 20 (08) :1058-1069
[2]  
AGARWAL R, 2000, NEW FRAMEWORK LEARNI
[3]  
Anderson J.A., 1995, An introduction to neural networks, DOI DOI 10.7551/MITPRESS/3905.001.0001
[4]  
[Anonymous], 1996, Neuro-Fuzzy and Soft Computing
[5]   Intrusion detection through learning behavior model [J].
Balajinath, B ;
Raghavan, SV .
COMPUTER COMMUNICATIONS, 2001, 24 (12) :1202-1212
[6]  
Bishop Christopher M, 1995, Neural networks for pattern recognition
[7]   SmcHD1, containing a structural-maintenance-of-chromosomes hinge domain, has a critical role in X inactivation [J].
Blewitt, Marnie E. ;
Gendrel, Anne-Valerie ;
Pang, Zhenyi ;
Sparrow, Duncan B. ;
Whitelaw, Nadia ;
Craig, Jeffrey M. ;
Apedaile, Anwyn ;
Hilton, Douglas J. ;
Dunwoodie, Sally L. ;
Brockdorff, Neil ;
Kay, Graham F. ;
Whitelaw, Emma .
NATURE GENETICS, 2008, 40 (05) :663-669
[8]  
BOUZIDA Y, 2004, P 3 C SURL SEC ARCH
[9]  
BRIDGES SM, 2000, 12 ANN CAN INF TECHN
[10]  
CHAVAN S, 2004, P INT C INF TECHN CO