A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection

被引:342
|
作者
Mishra, Preeti [1 ,2 ]
Varadharajan, Vijay [3 ,4 ]
Tupakula, Uday [3 ,4 ]
Pilli, Emmanuel S. [5 ]
机构
[1] MNIT, Jaipur 302017, Rajasthan, India
[2] Graph Era Deemed Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[3] Univ Newcastle, Fac Engn & Built Environm, Callaghan, NSW 2308, Australia
[4] Univ Newcastle, Adv Cyber Secur Res Ctr, Callaghan, NSW 2308, Australia
[5] Malaviya Natl Inst Technol, Dept Comp Sci & Engn, Jaipur 302017, Rajasthan, India
来源
关键词
Machine learning; intrusion; attacks; security; SUPPORT VECTOR MACHINES; FEATURE-SELECTION; ANOMALY DETECTION; SWARM INTELLIGENCE; GENETIC ALGORITHM; NAIVE BAYES; NETWORK; SYSTEM; ATTACKS; SVM;
D O I
10.1109/COMST.2018.2847722
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches. However, they are not very successful in identifying all types of intrusions. In this paper, a detailed investigation and analysis of various machine learning techniques have been carried out for finding the cause of problems associated with various machine learning techniques in detecting intrusive activities. Attack classification and mapping of the attack features is provided corresponding to each attack. Issues which are related to detecting low-frequency attacks using network attack dataset are also discussed and viable methods are suggested for improvement. Machine learning techniques have been analyzed and compared in terms of their detection capability for detecting the various category of attacks. Limitations associated with each category of them are also discussed. Various data mining tools for machine learning have also been included in the paper. At the end, future directions are provided for attack detection using machine learning techniques.
引用
收藏
页码:686 / 728
页数:43
相关论文
共 50 条
  • [31] An investigation in detection and mitigation of smishing using machine learning techniques
    Shoaib, Mohd
    Umar, Mohammad Sarosh
    [J]. SOCIAL NETWORK ANALYSIS AND MINING, 2023, 13 (01)
  • [32] An investigation in detection and mitigation of smishing using machine learning techniques
    Mohd Shoaib
    Mohammad Sarosh Umar
    [J]. Social Network Analysis and Mining, 13
  • [33] A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques
    Singh G.
    Khare N.
    [J]. International Journal of Computers and Applications, 2022, 44 (07) : 659 - 669
  • [34] Video summarization using deep learning techniques: a detailed analysis and investigation
    Parul Saini
    Krishan Kumar
    Shamal Kashid
    Ashray Saini
    Alok Negi
    [J]. Artificial Intelligence Review, 2023, 56 : 12347 - 12385
  • [35] Video summarization using deep learning techniques: a detailed analysis and investigation
    Saini, Parul
    Kumar, Krishan
    Kashid, Shamal
    Saini, Ashray
    Negi, Alok
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (11) : 12347 - 12385
  • [36] USING MACHINE LEARNING FOR INTRUSION DETECTION SYSTEMS
    Quang-Vinh Dang
    [J]. COMPUTING AND INFORMATICS, 2022, 41 (01) : 12 - 33
  • [37] Adaptive Intrusion Detection Using Machine Learning
    Neethu, B.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (03): : 118 - 124
  • [38] Extensive Analysis of Intrusion Detection System Using Deep Learning Techniques
    Patil, Nishit Bhaskar
    Joshi, Shubhalaxmi
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS, ICISA 2022, 2023, 959 : 191 - 205
  • [39] Performance Analysis of Network Intrusion Detection System using Machine Learning
    Alsaeedi, Abdullah
    Khan, Mohammad Zubair
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (12) : 671 - 678
  • [40] Intrusion detection based on behavior mining and machine learning techniques
    Mukkamala, Srinivas
    Xu, Dennis
    Sung, Andrew H.
    [J]. ADVANCES IN APPLIED ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2006, 4031 : 619 - 628