Intrusion detection taxonomy and data preprocessing mechanisms

被引:13
作者
Al-Utaibi, Khaled A. [1 ]
El-Alfy, El-Sayed M. [2 ]
机构
[1] Univ Hail, Coll Comp Sci & Engn, Hail, Saudi Arabia
[2] King Fahd Univ Petr & Minerals, Coll Comp Sci & Engn, Dept Informat & Comp Sci, Dhahran 31261, Saudi Arabia
关键词
Information systems; cybersecurity; intrusion detection; machine learning; computational intelligence; feature normalization; feature discretization; feature engineering; feature selection; dimensionality reduction; FEATURE-SELECTION; DETECTION SYSTEM; PREVENTION SYSTEM; DECISION; CLASSIFICATION; NORMALIZATION; EFFICIENT; NETWORKS; ATTACKS; CLOUD;
D O I
10.3233/JIFS-169432
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the increasingly growing internal and external attacks on computer systems and online services, cybersecurity has become a vibrant research area. Countering intrusive attacks is a daunting task with no universal magic solution that can successfully handle all scenarios. A variety of machine-learning and computational intelligence techniques have been applied extensively to detect and classify these attacks. However, the effectiveness of these techniques greatly depends on the adopted data preprocessing methods for feature extraction and engineering. This paper presents an extended taxonomy of the work related to intrusion detection and reviews the state-of-the-art techniques for data preprocessing. It offers a critical up-to-date survey which can be an instrumental pedagogy to help junior researchers conceive the vast amount of research work and gain a holistic view and awareness of various contemporary research directions in this domain.
引用
收藏
页码:1369 / 1383
页数:15
相关论文
共 76 条
[1]   Feature normalization and likelihood-based similarity measures for image retrieval [J].
Aksoy, S ;
Haralick, RM .
PATTERN RECOGNITION LETTERS, 2001, 22 (05) :563-582
[2]   Contextual information fusion for intrusion detection: a survey and taxonomy [J].
Aleroud, Ahmed ;
Karabatis, George .
KNOWLEDGE AND INFORMATION SYSTEMS, 2017, 52 (03) :563-619
[3]  
[Anonymous], 2007, INT J INFORM COMPUTE, DOI DOI 10.1504/IJICS.2007.012248
[4]  
[Anonymous], INFORM SCI
[5]  
[Anonymous], 1998, Feature Extraction, Construction and Selection: A Data Mining Perspective
[6]  
Anuar N.B., 2010, P 2010 INF SEC S AFR, DOI DOI 10.1109/ISSA.2010.5588654
[7]   Empirical study of feature selection methods based on individual feature evaluation for classification problems [J].
Arauzo-Azofra, Antonio ;
Aznarte, Jose Luis ;
Benitez, Jose M. .
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (07) :8170-8177
[8]  
Axelsson S., 2000, 9915 CHALM U TECHN
[9]   An introduction to modern missing data analyses [J].
Baraldi, Amanda N. ;
Enders, Craig K. .
JOURNAL OF SCHOOL PSYCHOLOGY, 2010, 48 (01) :5-37
[10]  
Batista GEAPA, 2003, APPL ARTIF INTELL, V17, P519, DOI 10.1080/08839510390219309