A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

被引:1404
|
作者
Buczak, Anna L. [1 ]
Guven, Erhan [1 ]
机构
[1] Johns Hopkins Univ, Appl Phys Lab, Johns Hopkins Rd, Laurel, MD 20723 USA
来源
关键词
Cyber analytics; data mining; machine learning; SYSTEMS; MODEL;
D O I
10.1109/COMST.2015.2494502
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This survey paper describes a focused literature survey of machine learning (ML) and data mining (DM) methods for cyber analytics in support of intrusion detection. Short tutorial descriptions of each ML/DM method are provided. Based on the number of citations or the relevance of an emerging method, papers representing each method were identified, read, and summarized. Because data are so important in ML/DM approaches, some well-known cyber data sets used in ML/DM are described. The complexity of ML/DM algorithms is addressed, discussion of challenges for using ML/DM for cyber security is presented, and some recommendations on when to use a given method are provided.
引用
收藏
页码:1153 / 1176
页数:24
相关论文
共 50 条
  • [1] Machine learning methods for cyber security intrusion detection: Datasets and comparative study
    Kilincer, Ilhan Firat
    Ertam, Fatih
    Sengur, Abdulkadir
    [J]. COMPUTER NETWORKS, 2021, 188
  • [2] IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model
    Sarker, Iqbal H.
    Abushark, Yoosef B.
    Alsolami, Fawaz
    Khan, Asif Irshad
    [J]. SYMMETRY-BASEL, 2020, 12 (05):
  • [3] Survey of Intrusion Detection Methods Based on Data Mining Algorithms
    Jin, Zichuan
    Cui, Yanpeng
    Yan, Zheng
    [J]. BDE 2019: 2019 INTERNATIONAL CONFERENCE ON BIG DATA ENGINEERING, 2019, : 92 - 100
  • [4] Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey
    Liu, Hongyu
    Lang, Bo
    [J]. APPLIED SCIENCES-BASEL, 2019, 9 (20):
  • [5] Machine Learning and Deep Learning Methods for Intrusion Detection Systems in IoMT: A survey
    Rbah, Yahya
    Mahfoudi, Mohammed
    Balboul, Younes
    Fattah, Mohammed
    Mazer, Said
    Elbekkali, Moulhime
    Bernoussi, Benaissa
    [J]. 2022 2ND INTERNATIONAL CONFERENCE ON INNOVATIVE RESEARCH IN APPLIED SCIENCE, ENGINEERING AND TECHNOLOGY (IRASET'2022), 2022, : 740 - 748
  • [6] A Survey of Deep Learning Methods for Cyber Security
    Berman, Daniel S.
    Buczak, Anna L.
    Chavis, Jeffrey S.
    Corbett, Cherita L.
    [J]. INFORMATION, 2019, 10 (04)
  • [7] Cyber Security Intrusion Detection and Bot Data Collection using Deep Learning in the IoT
    Alotaibi, Fahad Ali
    Mishra, Shailendra
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (03) : 421 - 432
  • [8] Data Curation and Quality Evaluation for Machine Learning-Based Cyber Intrusion Detection
    Tran, Ngan
    Chen, Haihua
    Bhuyan, Jay
    Ding, Junhua
    [J]. IEEE ACCESS, 2022, 10 : 121900 - 121923
  • [9] A comparative study of unsupervised machine learning and data mining techniques for intrusion detection
    Sadoddin, Reza
    Ghorbani, Ali A.
    [J]. MACHINE LEARNING AND DATA MINING IN PATTERN RECOGNITION, PROCEEDINGS, 2007, 4571 : 404 - +
  • [10] Data Mining for the Security of Cyber Physical Systems Using Deep-Learning Methods
    Nath, Bhagawan
    Hamaleinen, Timo
    Ezekiel, Soundararajan
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 591 - 598