A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies

被引:20
作者
Rabbani, Mahdi [1 ]
Wang, Yongli [1 ]
Khoshkangini, Reza [2 ]
Jelodar, Hamed [3 ]
Zhao, Ruxin [1 ]
Bagheri Baba Ahmadi, Sajjad [1 ]
Ayobi, Seyedvalyallah [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
[2] Halmstad Univ, Ctr Appl Intelligent Syst Res CAISR, S-30118 Halmstad, Sweden
[3] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 4R2, Canada
基金
中国国家自然科学基金;
关键词
machine learning; classifier systems; malicious behavior detection systems; dataset; data pre-processing; INTRUSION DETECTION SYSTEM; ANOMALY DETECTION TECHNIQUES; MALWARE DETECTION; ENSEMBLE; CLASSIFICATION; DATASET;
D O I
10.3390/e23050529
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Network anomaly detection systems (NADSs) play a significant role in every network defense system as they detect and prevent malicious activities. Therefore, this paper offers an exhaustive overview of different aspects of anomaly-based network intrusion detection systems (NIDSs). Additionally, contemporary malicious activities in network systems and the important properties of intrusion detection systems are discussed as well. The present survey explains important phases of NADSs, such as pre-processing, feature extraction and malicious behavior detection and recognition. In addition, with regard to the detection and recognition phase, recent machine learning approaches including supervised, unsupervised, new deep and ensemble learning techniques have been comprehensively discussed; moreover, some details about currently available benchmark datasets for training and evaluating machine learning techniques are provided by the researchers. In the end, potential challenges together with some future directions for machine learning-based NADSs are specified.
引用
收藏
页数:41
相关论文
共 136 条
  • [11] [Anonymous], 2018, A taxonomy and survey of intrusion detection system design techniques, network threats and datasets
  • [12] [Anonymous], 2019, ACSC THREAT REPORT
  • [13] [Anonymous], 2009, DARPA98 KDDCUP99 DAT
  • [14] [Anonymous], 2013, ADFA Intrusion Detection Datasets
  • [15] [Anonymous], 2007, CAIDA DATASET
  • [16] [Anonymous], 2012, ISCX DATASET
  • [17] [Anonymous], 2016, LBNL DATASET
  • [18] [Anonymous], 2002, DEFCON DATASET
  • [19] [Anonymous], 2013, CTU 13 DATASET
  • [20] [Anonymous], 2017, Network Traffic Anomaly Detection and Prevention, DOI [DOI 10.1007/978-3-319-65188-0_4, 10.1007/978-3-319-65188-0_4]