Review on intrusion detection using feature selection with machine learning techniques

被引:20
作者
Kalimuthan, C. [1 ]
Renjit, J. Arokia [2 ]
机构
[1] Anna Univ, Coll Engn Guindy, Fac Informat & Commun Engn, Chennai, Tamil Nadu, India
[2] Jeppiaar Engn Coll, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
关键词
Intrusion detection systems; Machine learning; Deep learning; Feature selection; Classifier; Network computing security; Bench mark dataset; DETECTION SYSTEM; DECISION RULES; MODEL;
D O I
10.1016/j.matpr.2020.06.218
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The Network Security is the most exciting duty in the modern world for development of internet applications, moreover numerous attacks also increased in internet and hence it is need to developing novel techniques for attack detection and prevention more efficiently. It can be achieved by proposing new algorithms for intrusion detection also. To prevent these by Intrusion Detection System (IDS), Access control, and key management. Among these, IDS is more popular for ensuring network security. The present works focus on artificial intelligence based approaches for developing framework of Intrusion Detection to identify the undesirable attacks and to prevent unauthorized access. This paper is a general study of the existing system is surveyed with bench mark data set to identify the unusual attacks and also for understanding the current issues in problems of intrusion detection. The complete studies are mentioned here for detecting different types of attacks and its relevant issues using the machine learning classification algorithms. Furthermore, this investigation evaluates the Performance analysis of the existing IDS using selecting attribute feature and classification of machine learning methods. Finally, experimental results obtained in various methods, we recommend few superior features selection and machine learning algorithm find out the efficient algorithm that can be used for particular intrusive attack detection. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:3794 / 3802
页数:9
相关论文
共 61 条
[1]  
Abdullah M., 2018, International Journal of Computer Science and Information Security IJCSIS, V16, P48
[2]  
Adebowale A., 2013, International Journal of Soft Computing and Engineering (IJSCE), V3, P237
[3]   Feature Selection Using Particle Swarm Optimization in Intrusion Detection [J].
Ahmad, Iftikhar .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
[4]  
Ahmad Tohari, 2019, ICIC INT EXPRESS LET, V13
[5]   Identification of malicious activities in industrial internet of things based on deep learning models [J].
AL-Hawawreh, Muna ;
Moustafa, Nour ;
Sitnikova, Elena .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :1-11
[6]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[7]  
Aljawarneh Shadi, 2017, CLUSTER COMPUTER
[8]  
Aljawarneh Shadi, 2017, J COMPUTATIONAL SCI, P1877
[9]  
Almseidin M, 2017, I S INTELL SYST INFO, P277, DOI 10.1109/SISY.2017.8080566
[10]  
Alrawashdeh K, 2016, 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), P195, DOI [10.1109/ICMLA.2016.0040, 10.1109/ICMLA.2016.167]