A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies

被引:15
|
作者
Rabbani, Mahdi [1 ]
Wang, Yongli [1 ]
Khoshkangini, Reza [2 ]
Jelodar, Hamed [3 ]
Zhao, Ruxin [1 ]
Bagheri Baba Ahmadi, Sajjad [1 ]
Ayobi, Seyedvalyallah [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
[2] Halmstad Univ, Ctr Appl Intelligent Syst Res CAISR, S-30118 Halmstad, Sweden
[3] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 4R2, Canada
基金
中国国家自然科学基金;
关键词
machine learning; classifier systems; malicious behavior detection systems; dataset; data pre-processing; INTRUSION DETECTION SYSTEM; ANOMALY DETECTION TECHNIQUES; MALWARE DETECTION; ENSEMBLE; CLASSIFICATION; DATASET;
D O I
10.3390/e23050529
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Network anomaly detection systems (NADSs) play a significant role in every network defense system as they detect and prevent malicious activities. Therefore, this paper offers an exhaustive overview of different aspects of anomaly-based network intrusion detection systems (NIDSs). Additionally, contemporary malicious activities in network systems and the important properties of intrusion detection systems are discussed as well. The present survey explains important phases of NADSs, such as pre-processing, feature extraction and malicious behavior detection and recognition. In addition, with regard to the detection and recognition phase, recent machine learning approaches including supervised, unsupervised, new deep and ensemble learning techniques have been comprehensively discussed; moreover, some details about currently available benchmark datasets for training and evaluating machine learning techniques are provided by the researchers. In the end, potential challenges together with some future directions for machine learning-based NADSs are specified.
引用
收藏
页数:41
相关论文
共 50 条
  • [1] Detection of Encrypted Malicious Network Traffic using Machine Learning
    De Lucia, Michael J.
    Cotton, Chase
    [J]. MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [2] A review on emerging technologies and machine learning approaches for sustainable production of biofuel from biomass waste
    Sharmila, V. Godvin
    Shanmugavel, Surya Prakash
    Banu, J. Rajesh
    [J]. BIOMASS & BIOENERGY, 2024, 180
  • [3] Evaluation of Machine Learning Algorithms for Detection of Malicious Traffic in SCADA Network
    Rajesh, L.
    Satyanarayana, Penke
    [J]. JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2022, 17 (02) : 913 - 928
  • [4] Applying machine learning techniques for detection of malicious code in network traffic
    Elovici, Yuval
    Shabtai, Asaf
    Moskovitch, Robert
    Tahan, Gil
    Glezer, Chanan
    [J]. KI 2007: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2007, 4667 : 44 - +
  • [5] Evaluation of Machine Learning Algorithms for Detection of Malicious Traffic in SCADA Network
    L. Rajesh
    Penke Satyanarayana
    [J]. Journal of Electrical Engineering & Technology, 2022, 17 : 913 - 928
  • [6] Machine Learning Approaches to Malicious PowerShell Scripts Detection and Feature Combination Analysis
    Hung, Hsiang-Hua
    Chen, Jiann-Liang
    Ma, Yi-Wei
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2024, 25 (01): : 167 - 173
  • [7] Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study
    Wang, Zihao
    Fok, Kar Wai
    Thing, Vrizlynn L. L.
    [J]. COMPUTERS & SECURITY, 2022, 113
  • [8] Machine Learning and Education in the Human Age: A Review of Emerging Technologies
    Bacos, Catherine A.
    [J]. ADVANCES IN COMPUTER VISION, VOL 2, 2020, 944 : 536 - 543
  • [9] Network Intrusion Detection using Machine Learning Approaches
    Hossain, Zakir
    Sourov, Md Mahmudur Rahman
    Khan, Musharrat
    Rahman, Parves
    [J]. PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 438 - 442
  • [10] Network Intrusion Detection using Machine Learning Approaches
    Hossain, Zakir
    Sourov, Md Mahmudur Rahman
    Khan, Musharrat
    Rahman, Parves
    [J]. PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 303 - 307