A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies

被引:20
作者
Rabbani, Mahdi [1 ]
Wang, Yongli [1 ]
Khoshkangini, Reza [2 ]
Jelodar, Hamed [3 ]
Zhao, Ruxin [1 ]
Bagheri Baba Ahmadi, Sajjad [1 ]
Ayobi, Seyedvalyallah [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
[2] Halmstad Univ, Ctr Appl Intelligent Syst Res CAISR, S-30118 Halmstad, Sweden
[3] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 4R2, Canada
基金
中国国家自然科学基金;
关键词
machine learning; classifier systems; malicious behavior detection systems; dataset; data pre-processing; INTRUSION DETECTION SYSTEM; ANOMALY DETECTION TECHNIQUES; MALWARE DETECTION; ENSEMBLE; CLASSIFICATION; DATASET;
D O I
10.3390/e23050529
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Network anomaly detection systems (NADSs) play a significant role in every network defense system as they detect and prevent malicious activities. Therefore, this paper offers an exhaustive overview of different aspects of anomaly-based network intrusion detection systems (NIDSs). Additionally, contemporary malicious activities in network systems and the important properties of intrusion detection systems are discussed as well. The present survey explains important phases of NADSs, such as pre-processing, feature extraction and malicious behavior detection and recognition. In addition, with regard to the detection and recognition phase, recent machine learning approaches including supervised, unsupervised, new deep and ensemble learning techniques have been comprehensively discussed; moreover, some details about currently available benchmark datasets for training and evaluating machine learning techniques are provided by the researchers. In the end, potential challenges together with some future directions for machine learning-based NADSs are specified.
引用
收藏
页数:41
相关论文
共 136 条
  • [1] A survey of intrusion detection systems based on ensemble and hybrid classifiers
    Aburomman, Abdulla Amin
    Reaz, Mamun Bin Ibne
    [J]. COMPUTERS & SECURITY, 2017, 65 : 135 - 152
  • [2] A novel SVM-kNN-PSO ensemble method for intrusion detection system
    Aburomman, Abdulla Amin
    Reaz, Mamun Bin Ibne
    [J]. APPLIED SOFT COMPUTING, 2016, 38 : 360 - 372
  • [3] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31
  • [4] A survey of anomaly detection techniques in financial domain
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Islam, Md. Rafiqul
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 278 - 288
  • [5] Ahvanooey M.T., 2020, ARXIV200109406
  • [6] Identification of malicious activities in industrial internet of things based on deep learning models
    AL-Hawawreh, Muna
    Moustafa, Nour
    Sitnikova, Elena
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 1 - 11
  • [7] Profiling and classifying the behavior of malicious codes
    Alazab, Mamoun
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 100 : 91 - 102
  • [8] Alom MZ, 2015, PROC NAECON IEEE NAT, P339, DOI 10.1109/NAECON.2015.7443094
  • [9] Altwaijry H., 2013, IAENG Transactions on Engineering Technologies, P29
  • [10] Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
    Ambusaidi, Mohammed A.
    He, Xiangjian
    Nanda, Priyadarsi
    Tan, Zhiyuan
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) : 2986 - 2998