Intrusion detection by machine learning: A review

被引:536
|
作者
Tsai, Chih-Fong [4 ]
Hsu, Yu-Feng [3 ]
Lin, Chia-Ying [2 ]
Lin, Wei-Yang [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Minsyong, Taiwan
[2] Natl Chung Cheng Univ, Dept Accounting & Informat Technol, Minsyong, Taiwan
[3] Natl Sun Yat Sen Univ, Dept Informat Management, Kaohsiung, Taiwan
[4] Natl Cent Univ, Dept Informat Management, Taipei, Taiwan
关键词
Intrusion detection; Machine learning; Hybrid classifiers; Ensemble classifiers; ALGORITHM; CLASSIFIER; IDS;
D O I
10.1016/j.eswa.2009.05.029
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The popularity of using Internet contains some risks of network attacks. Intrusion detection is one major research problem in network security, whose aim is to identify unusual access or attacks to secure internal networks. In literature, intrusion detection systems have been approached by various machine learning techniques. However, there is no a review paper to examine and understand the current status of using machine learning techniques to solve the intrusion detection problems. This chapter reviews 55 related studies in the period between 2000 and 2007 focusing on developing single, hybrid, and ensemble classifiers. Related studies are compared by their classifier design, datasets used, and other experimental setups. Current achievements and limitations in developing intrusion detection systems by machine learning are present and discussed. A number of future research directions are also provided. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:11994 / 12000
页数:7
相关论文
共 50 条
  • [31] A Review of Intrusion Detection System in IoT with Machine Learning Approach: Current and Future Research
    Nugroho, Eddy Prasetyo
    Djatna, Taufik
    Sitanggang, Imas Sukaesih
    Buono, Agus
    Hermadi, Irman
    [J]. 2020 6TH INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH): EMBRACING INDUSTRY 4.0: TOWARDS INNOVATION IN DISASTER MANAGEMENT, 2020, : 138 - 143
  • [32] IoT Intrusion Detection System Based on Machine Learning
    Xu, Bayi
    Sun, Lei
    Mao, Xiuqing
    Ding, Ruiyang
    Liu, Chengwei
    [J]. ELECTRONICS, 2023, 12 (20)
  • [33] A Fused Machine Learning Approach for Intrusion Detection System
    Farooq, Muhammad Sajid
    Abbas, Sagheer
    Sultan, Kiran
    Atta-ur-Rahman, Muhammad Adnan
    Khan, Muhammad Adnan
    Mosavi, Amir
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 2607 - 2623
  • [34] Machine learning techniques for web intrusion detection - a comparison
    Truong Son Pham
    Tuan Hao Hoang
    Van Canh Vu
    [J]. 2016 EIGHTH INTERNATIONAL CONFERENCE ON KNOWLEDGE AND SYSTEMS ENGINEERING (KSE), 2016, : 291 - 297
  • [35] Adversarial machine learning in Network Intrusion Detection Systems
    Alhajjar, Elie
    Maxwell, Paul
    Bastian, Nathaniel
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2021, 186
  • [36] Evaluation of Machine Learning Techniques for Network Intrusion Detection
    Zaman, Marzia
    Lung, Chung-Horng
    [J]. NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [37] Machine Learning Techniques for Intrusion Detection: A Comparative Analysis
    Hamid, Yasir
    Sugumaran, M.
    Journaux, Ludovic
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [38] Evaluation of Machine Learning Algorithms for Intrusion Detection System
    Almseidin, Mohammad
    Alzubi, Maen
    Kovacs, Szilveszter
    Alkasassbeh, Mouhammd
    [J]. 2017 IEEE 15TH INTERNATIONAL SYMPOSIUM ON INTELLIGENT SYSTEMS AND INFORMATICS (SISY), 2017, : 277 - 282
  • [39] Intrusion Detection Study and Enhancement Using Machine Learning
    Mliki, Hela
    Kaceam, Abir Hadj
    Chaari, Lamia
    [J]. RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2019), 2020, 12026 : 263 - 278
  • [40] Network intrusion detection system: A machine learning approach
    Panda, Mrutyunjaya
    Abraham, Ajith
    Das, Swagatam
    Patra, Manas Ranjan
    [J]. INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS, 2011, 5 (04): : 347 - 356