On the Evaluation and Deployment of Machine Learning Approaches for Intrusion Detection

被引:3
|
作者
Heine, Felix [1 ]
Laue, Tim [1 ]
Kleiner, Carsten [1 ]
机构
[1] Univ Appl Sci & Arts, Fac 4, Dept Comp Sci, Hannover, Germany
关键词
IDS; intrusion detection; machine learning; evaluation; anomaly detection; dataset creation;
D O I
10.1109/BigData50022.2020.9378479
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Machine learning for intrusion detection is an active research field. However, instances of real-world application of methods proposed in the literature are still rare. Although a plethora of papers applying machine learning methods to benchmark data sets report excellent results, these methods seem to be hard to deploy in practice. In this paper, we investigate this gap between research and practical application by focusing on two questions: Firstly, we ask whether the current evaluation methodology is able to adequately forecast the performance of machine learning methods in practice. Secondly, we ask what needs to be done to facilitate the deployment of these methods. As a consequence to our findings, we formulate requirements for future evaluation methodologies and data sets, aiming to help evaluations better reflect actual performance in the field. Additionally, we identify a research road map with respect to the application of machine learning models in network intrusion detection systems, in order to further close the gap.
引用
收藏
页码:4594 / 4603
页数:10
相关论文
共 50 条
  • [1] Network Intrusion Detection using Machine Learning Approaches
    Hossain, Zakir
    Sourov, Md Mahmudur Rahman
    Khan, Musharrat
    Rahman, Parves
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 303 - 307
  • [2] Network Intrusion Detection using Machine Learning Approaches
    Hossain, Zakir
    Sourov, Md Mahmudur Rahman
    Khan, Musharrat
    Rahman, Parves
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 438 - 442
  • [3] A Study: Machine Learning and Deep Learning Approaches for Intrusion Detection System
    Sekhar, C. H.
    Rao, K. Venkata
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 845 - 849
  • [4] Classification of Intrusion Detection Dataset using machine learning Approaches
    Subramanyam, Doodipalli
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 280 - 283
  • [5] Evaluation of Machine Learning Algorithms for Intrusion Detection System
    Almseidin, Mohammad
    Alzubi, Maen
    Kovacs, Szilveszter
    Alkasassbeh, Mouhammd
    2017 IEEE 15TH INTERNATIONAL SYMPOSIUM ON INTELLIGENT SYSTEMS AND INFORMATICS (SISY), 2017, : 277 - 282
  • [6] Evaluation of Machine Learning Techniques for Network Intrusion Detection
    Zaman, Marzia
    Lung, Chung-Horng
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [7] On the Evaluation of Sequential Machine Learning for Network Intrusion Detection
    Corsini, Andrea
    Yang, Shanchieh Jay
    Apruzzese, Giovanni
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [8] Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches
    Magan-Carrion, Roberto
    Urda, Daniel
    Diaz-Cano, Ignacio
    Dorronsoro, Bernabe
    APPLIED SCIENCES-BASEL, 2020, 10 (05):
  • [9] Evaluation of Machine Learning for Intrusion Detection in Microservice Applications
    Araujo, Iury
    Antunes, Nuno
    Vieira, Marco
    PROCEEDINGS OF12TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE AND SECURE COMPUTING, LADC 2023, 2023, : 126 - 135
  • [10] An investigation and comparison of machine learning approaches for intrusion detection in IoMT network
    Adel Binbusayyis
    Haya Alaskar
    Thavavel Vaiyapuri
    M. Dinesh
    The Journal of Supercomputing, 2022, 78 : 17403 - 17422