Network intrusion detection system: A survey on artificial intelligence-based techniques

被引:17
作者
Habeeb, Mohammed Sayeeduddin [1 ]
Babu, T. Ranga [2 ]
机构
[1] Acharya Nagarjuna Univ, Coll Engn, Elect & Commun Dept, Guntur, Andhra Pradesh, India
[2] RVR & JC Coll Engn, Dept Elect & Commun Engn, Guntur, Andhra Pradesh, India
关键词
deep learning; machine learning; network attacks; network intrusion detection system; network security; DEEP LEARNING APPROACH; NEURAL-NETWORK; CLASSIFICATION MODEL; SPARSE AUTOENCODER; MACHINE; ENSEMBLE; INTERNET; CHALLENGES; ALGORITHM;
D O I
10.1111/exsy.13066
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
High data rate requirements in recent years have resulted in the massive expansion of communication systems, network size and the amount of data generated and processed. This has eventually caused many threats to the communication networks as well due to a more frequent generation of security attacks that are either novel or the mutation of the existing attacks. To secure the networks against such threats, an intrusion detection system (IDS) is considered as one of the promising solutions. The main problem with the IDS is its increased false alarm rate (FAR) in detecting the zero-day attacks. To improve the detection accuracy and minimizing the FAR, the researchers proposed IDS solutions using artificial intelligence (AI) approaches. In this research, we have systematically reviewed the recent AI-based network IDS (NIDS) solutions proposed during the period 2016-2021 by the research community. We systematically analysed the proposed NIDS solutions based on their strengths, shortcomings, AI methodology adopted, datasets, and the evaluation metrics used for evaluation purposes. From the review, we observed that the hybrid approach is mostly adopted by the researchers to propose AI-based NIDS solutions, with a trend shifting to deep learning-based approaches over the last 2 years. Also, most of the proposed solutions are evaluated using a very old dataset with only a few studies opting for the latest datasets. Finally based on our observations, we highlighted the research challenges and the future research directions to help young researchers to contribute to this field.
引用
收藏
页数:28
相关论文
共 164 条
[21]   A Novel PCA-Firefly Based XGBoost Classification Model for Intrusion Detection in Networks Using GPU [J].
Bhattacharya, Sweta ;
Krishnan, Siva Rama S. ;
Maddikunta, Praveen Kumar Reddy ;
Kaluri, Rajesh ;
Singh, Saurabh ;
Gadekallu, Thippa Reddy ;
Alazab, Mamoun ;
Tariq, Usman .
ELECTRONICS, 2020, 9 (02)
[22]  
Biswas Kamanshis., 2007, Security Threats in Mobile Ad Hoc Network
[23]   Modification of supervised OPF-based intrusion detection systems using unsupervised learning and social network concept [J].
Bostani, Hamid ;
Sheikhan, Mansour .
PATTERN RECOGNITION, 2017, 62 :56-72
[24]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[25]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282
[26]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[27]  
Chandrasekhar A. M., 2014, 2014 International Conference on Communications and Signal Processing (ICCSP), P672, DOI 10.1109/ICCSP.2014.6949927
[28]   The cyber threat landscape: Challenges and future research directions [J].
Choo, Kim-Kwang Raymond .
COMPUTERS & SECURITY, 2011, 30 (08) :719-731
[29]  
Dalal Kushal Rashmikant., 2020, P IEEE INT C EL SUST, P75
[30]  
Daniya T., 2021, Mater. Today Proc., V3, P1, DOI [10.1016/j.matpr.2021.03.353, DOI 10.1016/J.MATPR.2021.03.353]