Ensemble based collaborative and distributed intrusion detection systems: A survey

被引:94
作者
Folino, Gianluigi [1 ]
Sabatino, Pietro [1 ]
机构
[1] ICAR CNR Ist Calcolo & Reti Ad Alte Prestaz, Via P Bucci, I-87036 Arcavacata Di Rende, CS, Italy
关键词
RANDOM-FORESTS; CATEGORIZATION; INFORMATION; ALGORITHM; SUPPORT;
D O I
10.1016/j.jnca.2016.03.011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Modern network intrusion detection systems must be able to handle large and fast changing data, often also taking into account real-time requirements. Ensemble-based data mining algorithms and their distributed implementations are a promising approach to these issues. Therefore, this work presents the current state of the art of the ensemble-based methods used in modern intrusion detection systems, with a particular attention to distributed approaches and implementations. This review also consider supervised and unsupervised data mining algorithms, more suitable to work in an environment that requires the analysis of data streams in real-time. Sharing knowledge across multiple nodes is another of the key points in designing appropriate NIDSs and for this reason, collaborative IDS were also included in this work. Finally, we discuss some open issues and lessons learned from this review, which can help researchers to design more efficient NIDSs. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 109 条
[91]   An intrusion detection system using network traffic profiling and online sequential extreme learning machine [J].
Singh, Raman ;
Kumar, Harish ;
Singla, R. K. .
EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (22) :8609-8624
[92]   Toward a more practical unsupervised anomaly detection system [J].
Song, Jungsuk ;
Takakura, Hiroki ;
Okabe, Yasuo ;
Nakao, Koji .
INFORMATION SCIENCES, 2013, 231 :4-14
[93]   Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM [J].
Song, Jungsuk ;
Takakura, Hiroki ;
Okabe, Yasuo ;
Kwon, Yongjin .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2009, E92B (06) :1981-1990
[94]  
Song Y., 2009, Network and Distributed System Security Symposium 2009: February 8-11, 2009, San Diego, California: Proceedings, P121
[95]   An Overview of IP Flow-Based Intrusion Detection [J].
Sperotto, Anna ;
Schaffrath, Gregor ;
Sadre, Ramin ;
Morariu, Cristian ;
Pras, Aiko ;
Stiller, Burkhard .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2010, 12 (03) :343-356
[96]  
Vasiliadis G, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P297
[97]   Taxonomy and Survey of Collaborative Intrusion Detection [J].
Vasilomanolakis, Emmanouil ;
Karuppayah, Shankar ;
Muehlhaeuser, Max ;
Fischer, Mathias .
ACM COMPUTING SURVEYS, 2015, 47 (04)
[98]   A Survey of parallel intrusion detection on graphical processors [J].
Vokorokos, Liberios ;
Ennert, Michal ;
Cajkovsky, Marek ;
Radusovsky, Jan .
OPEN COMPUTER SCIENCE, 2014, 4 (04) :222-230
[99]  
Vokorokos L, 2013, 2013 11TH IEEE INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA 2013), P311, DOI 10.1109/ICETA.2013.6674449
[100]  
Wang K, 2006, LECT NOTES COMPUT SC, V3858, P227