Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Network intrusion detection system: : A systematic study of machine learning and deep learning approaches

Published: 13 January 2021 Publication History

Abstract

The rapid advances in the internet and communication fields have resulted in a huge increase in the network size and the corresponding data. As a result, many novel attacks are being generated and have posed challenges for network security to accurately detect intrusions. Furthermore, the presence of the intruders with the aim to launch various attacks within the network cannot be ignored. An intrusion detection system (IDS) is one such tool that prevents the network from possible intrusions by inspecting the network traffic, to ensure its confidentiality, integrity, and availability. Despite enormous efforts by the researchers, IDS still faces challenges in improving detection accuracy while reducing false alarm rates and in detecting novel intrusions. Recently, machine learning (ML) and deep learning (DL)‐based IDS systems are being deployed as potential solutions to detect intrusions across the network in an efficient manner. This article first clarifies the concept of IDS and then provides the taxonomy based on the notable ML and DL techniques adopted in designing network‐based IDS (NIDS) systems. A comprehensive review of the recent NIDS‐based articles is provided by discussing the strengths and limitations of the proposed solutions. Then, recent trends and advancements of ML and DL‐based NIDS are provided in terms of the proposed methodology, evaluation metrics, and dataset selection. Using the shortcomings of the proposed methods, we highlighted various research challenges and provided the future scope for the research in improving ML and DL‐based NIDS.

Graphical Abstract

(1) A systematic study is conducted to select recent articles on various ML and DL‐based NIDS published during the past 3 years (2017 ‐ April 2020).(2) Extensively discussed various features of papers including proposed methodology, strength, weakness, evaluation metrics, and the used datasets.(3) Based on these observations, recent trends of using AI methods are provided for NIDS, followed by highlighting different challenges in ML/DL‐based NIDS and future directions in this important domain.

References

[1]
Tarter A. Importance of cyber security. Community Policing‐A European Perspective: Strategies, Best Practices and Guidelines. New York, NY: Springer; 2017:213‐230.
[2]
Li J, Qu Y, Chao F, Shum HP, Ho ES, Yang L. Machine learning algorithms for network intrusion detection. AI in Cybersecurity. New York, NY: Springer; 2019:151‐179.
[3]
Lunt TF. A survey of intrusion detection techniques. Comput Sec. 1993;12(4):405‐418. https://doi.org/10.1016/0167-4048(93)90029-5.
[4]
Anderson JP. Computer Security Threat Monitoring and Surveillance. Fort Washington, PA: James P Anderson Co; 1980.
[5]
Debar H, Dacier M, Wespi A. Towards a taxonomy of intrusion‐detection systems. Comput Netw. 1999;31(8):805‐822. https://doi.org/10.1016/S1389-1286(98)00017-6.
[6]
Hoque MS, Mukit M, Bikas M, Naser A, An implementation of intrusion detection system using genetic algorithm; 2012. arXiv preprint arXiv:1204.1336.
[7]
Prasad R, Rohokale V. Artificial intelligence and machine learning in cyber security. Cyber Security: The Lifeline of Information and Communication Technology. New York, NY: Springer; 2020:231‐247.
[8]
Lew J, Shah DA, Pati S, et al. Analyzing machine learning workloads using a detailed GPU simulator. Paper presented at: Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). Madison, WI, USA: IEEE; 2019:151‐152.
[9]
Najafabadi MM, Villanustre F, Khoshgoftaar TM, Seliya N, Wald R, Muharemagic E. Deep learning applications and challenges in big data analytics. J Big Data. 2015;2(1):1. https://doi.org/10.1186/s40537-014-0007-7.
[10]
Dong B, Wang X. Comparison deep learning method to traditional methods using for network intrusion detection. Paper presented at: Proceedings of the 8th IEEE International Conference on Communication Software and Networks (ICCSN). Beijing, China: IEEE; 2016:581‐585.
[11]
Vasilomanolakis E, Karuppayah S, Mühlhäuser M, Fischer M. Taxonomy and survey of collaborative intrusion detection. ACM Comput Surv. 2015;47(4):1‐33. https://doi.org/10.1145/2716260.
[12]
Buczak AL, Guven E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor. 2015;18(2):1153‐1176. https://doi.org/10.1109/COMST.2015.2494502.
[13]
Thomas R, Pavithran D. A survey of intrusion detection models based on NSL‐KDD data set. Paper presented at: Proceedings of the 5th HCT Information Technology Trends (ITT). Dubai, United Arab Emirates: IEEE; 2018:286‐291.
[14]
Liu H, Lang B. Machine learning and deep learning methods for intrusion detection systems: a survey. Appl Sci. 2019;9(20):4396. https://doi.org/10.3390/app9204396.
[15]
Khraisat A, Gondal I, Vamplew P, Kamruzzaman J. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019;2(1):20. https://doi.org/10.1186/s42400-019-0038-7.
[16]
DKA C, Papa JP, Lisboa CO, Munoz R, DVHC A. Internet of Things: a survey on machine learning‐based intrusion detection approaches. Comput Netw. 2019;151:147‐157. https://doi.org/10.1016/j.comnet.2019.01.023.
[17]
Keele S, Guidelines for Performing Systematic Literature Reviews in Software Engineering. Technical Report, Technical Report, Ver. 2.3, EBSE Technical Report. vol. 5, EBSE; 2007.
[18]
Scopus Preview Welcome to Scopus Preview; 2020. https://www.scopus.com/. Accessed June 25, 2020.
[19]
Mukkamala S, Janoski G, Sung A. Intrusion detection using neural networks and support vector machines. Paper presented at: Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No. 02CH37290). Honolulu, HI, USA: IEEE; vol. 2, 2002:1702‐1707.
[20]
Garcia‐Teodoro P, Diaz‐Verdejo J, Maciá‐Fernández G, Vázquez E. Anomaly‐based network intrusion detection: techniques systems and challenges. Comput Secur. 2009;28(1‐2):18‐28. https://doi.org/10.1016/j.cose.2008.08.003.
[21]
Denning DE. An intrusion‐detection model. IEEE Trans Softw Eng. 1987;2:222‐232. https://doi.org/10.1109/TSE.1987.232894.
[22]
Verwoerd T, Hunt R. Intrusion detection techniques and approaches. Comput Commun. 2002;25(15):1356‐1365. https://doi.org/10.1016/S0140-3664(02)00037-3.
[23]
Kabiri P, Ghorbani AA. Research on intrusion detection and response: a survey. Int J Netw Secur. 2005;1(2):84‐102. https://doi.org/10.6633/IJNS.200509.1(2).05.
[24]
Zhang Y, Lee W, Huang YA. Intrusion detection techniques for mobile wireless networks. Wirel Netw. 2003;9(5):545‐556. https://doi.org/10.1023/A:1024600519144.
[25]
Axelsson S. Intrusion Detection Systems: A Survey and Taxonomy. Technical Report 99‐15. Department of Computer Engineering, Chalmers University; 2000.
[26]
Ahmim A, Derdour M, Ferrag MA. An intrusion detection system based on combining probability predictions of a tree of classifiers. Int J Commun Syst. 2018;31(9):e3547. https://doi.org/10.1002/dac.3547.
[27]
Uddin M, Rahman AA, Uddin N, Memon J, Alsaqour RA, Kazi S. Signature‐based multi‐layer distributed intrusion detection system using mobile agents. Int J Netw Secur. 2013;15(2):97‐105. https://doi.org/10.6633/IJNS.201303.15(2).03.
[28]
Neri F. Comparing local search with respect to genetic evolution to detect intrusions in computer networks. Paper presented at: Proceedings of the Proceedings of the 2000 Congress on Evolutionary Computation. CEC00 (Cat. No. 00TH8512). La Jolla, CA, USA: IEEE; vol. 1, 2000:238‐243.
[29]
Ma W. Analysis of anomaly detection method for Internet of things based on deep learning. Trans Emerg Telecommun Technol. 2020;e3893. https://doi.org/10.1002/ett.3893.
[30]
Zhang Z, Shen H, Sang Y. An observation‐centric analysis on the modeling of anomaly‐based intrusion detection. Int J Netw Secur. 2007;4(3):292‐305. https://doi.org/10.6633/IJNS.200705.4(3).08.
[31]
Guo C, Ping Y, Liu N, Luo SS. A two‐level hybrid approach for intrusion detection. Neurocomputing. 2016;214:391‐400. https://doi.org/10.1016/j.neucom.2016.06.021.
[32]
Chandola V, Banerjee A, Kumar V. Anomaly detection: a survey. ACM Comput Surv. 2009;41(3):1‐58. https://doi.org/10.1145/1541880.1541882.
[33]
Mehmood Y, Ahmad F, Yaqoob I, Adnane A, Imran M, Guizani S. Internet‐of‐Things‐based smart cities: recent advances and challenges. IEEE Commun Mag. 2017;55(9):16‐24. https://doi.org/10.1109/MCOM.2017.1600514.
[34]
Ahmad F, Ahmad Z, Kerrache CA, Kurugollu F, Adnane A, Barka E. Blockchain in Internet‐of‐Things: architecture, applications and research directions. Paper presented at: Proceedings of the IEEE International Conference on Computer and Information Sciences (ICCIS). Sakaka, Saudi Arabia: IEEE; 2019:1‐6.
[35]
Meng W. Intrusion detection in the era of IoT: building trust via traffic filtering and sampling. Computer. 2018;51(7):36‐43. https://doi.org/10.1109/MC.2018.3011034.
[36]
Shah SA, Seker DZ, Hameed S, Draheim D. The rising role of big data analytics and IoT in disaster management: recent advances taxonomy and prospects. IEEE Access. 2019;7:54595‐54614. https://doi.org/10.1109/ACCESS.2019.2913340.
[37]
Lazarescu MT. Wireless sensor networks for the Internet of Things: barriers and synergies. Components and Services for IoT Platforms. New York, NY: Springer; 2017:155‐186.
[38]
Haseeb K, Almogren A, Islam N, Ud Din I, Jan Z. An energy‐efficient and secure routing protocol for intrusion avoidance in IoT‐based WSN. Energies. 2019;12(21):4174. https://doi.org/10.3390/en12214174.
[39]
Roman R, Zhou J, Lopez J. Applying intrusion detection systems to wireless sensor networks. Paper presented at: Proceedings of the IEEE Consumer Communications & Networking Conference (CCNC 2006). Las Vegas (USA); 2006.
[40]
Hortelano J, Ruiz JC, Manzoni P. Evaluating the usefulness of watchdogs for intrusion detection in VANETs. Paper presented at: Proceedings of the IEEE International Conference on Communications Workshops. Capetown, South Africa: IEEE; 2010:1‐5.
[41]
Krzysztoń M, Marks M. Simulation of watchdog placement for cooperative anomaly detection in bluetooth mesh intrusion detection system. Simul Model Pract Theory. 2020;101:102041. https://doi.org/10.1016/j.simpat.2019.102041.
[42]
Chen H, Wu H, Hu J, Gao C. Event‐based trust framework model in wireless sensor networks. Paper presented at: Proceedings of the International Conference on Networking, Architecture, and Storage. Chongqing, China: IEEE; 2008:359‐364.
[43]
Meng Y, Li W. Evaluation of detecting malicious nodes using Bayesian model in wireless intrusion detection. Paper presented at: Proceedings of the International Conference on Network and System Security; 2013:40‐53; Springer, New York, NY.
[44]
Shen S, Yue G, Cao Q, Yu F. A survey of game theory in wireless sensor networks security. J Netw. 2011;6(3):521. https://doi.org/10.4304/jnw.6.3.521-532.
[45]
Abdalzaher MS, Muta O. A game‐theoretic approach for enhancing security and data trustworthiness in IoT applications. IEEE IoT J. 2020. https://doi.org/10.1109/JIOT.2020.2996671.
[46]
Khan ZA, Herrmann P. A trust based distributed intrusion detection mechanism for internet of things. Paper presented at: Proceedings of the IEEE 31st International Conference on Advanced Information Networking and Applications (AINA). Taipei, Taiwan: IEEE; 2017:1169‐1176.
[47]
Ahmad F, Kurugollu F, Adnane A, Hussain R, Hussain F. MARINE: man‐in‐the‐middle attack resistant trust model in connected vehicles. IEEE IoT J. 2020;7(4):3310‐3322. https://doi.org/10.1109/JIOT.2020.2967568.
[48]
Abdalzaher MS, Muta O. Employing game theory and TDMA protocol to enhance security and manage power consumption in wsns‐based cognitive radio. IEEE Access. 2019;7:132923‐132936. https://doi.org/10.1109/ACCESS.2019.2940699.
[49]
Abdalzaher MS, Seddik K, Muta O. An effective stackelberg game for high‐assurance of data trustworthiness in wsns. Paper presented at: Proceedings of the IEEE Symposium on Computers and Communications (ISCC). Heraklion, Greece: IEEE; 2017:1257‐1262.
[50]
Abdalzaher MS, Seddik K, Muta O. Using repeated game for maximizing high priority data trustworthiness in wireless sensor networks. Paper presented at: Proceedings of the IEEE Symposium on Computers and Communications (ISCC). Heraklion, Greece: IEEE; 2017:552‐557.
[51]
Berry MW, Mohamed A, Yap BW. Supervised and Unsupervised Learning for Data Science. New York, NY: Springer; 2019.
[52]
Zanero S, Serazzi G. Unsupervised learning algorithms for intrusion detection. Paper presented at: Proceedings of the IEEE Network Operations and Management Symposium. Salvador, Bahia, Brazil: IEEE; 2008:1043‐1048.
[53]
Imamverdiyev Y, Abdullayeva F. Deep learning method for denial of service attack detection based on restricted Boltzmann machine. Big Data. 2018;6(2):159‐169. https://doi.org/10.1089/big.2018.0023.
[54]
Alsughayyir B, Qamar AM, Khan R. Developing a network attack detection system using deep learning. Paper presented at: Proceedings of the International Conference on Computer and Information Sciences (ICCIS). Sakaka, Saudi Arabia: IEEE; 2019:1‐5.
[55]
Xin Y, Kong L, Liu Z, et al. Machine learning and deep learning methods for cybersecurity. IEEE Access. 2018;6:35365‐35381. https://doi.org/10.1109/ACCESS.2018.2836950.
[56]
Chary S, Rama B. A survey on comparative analysis of decision tree algorithms in data mining, International Journal of Advanced Scientific Technologies, Engineering and Management Sciences; vol. 3, 2017:91‐95.
[57]
Sahani R, Rout C, Badajena JC, Jena AK, Das H. Classification of intrusion detection using data mining techniques. Progress in Computing, Analytics and Networking. New York, NY: Springer; 2018:753‐764.
[58]
Rai K, Devi MS, Guleria A. Decision tree based algorithm for intrusion detection. Int J Adv Netw Appl. 2016;7(4):2828.
[59]
Farnaaz N, Jabbar M. Random forest modeling for network intrusion detection system. Proc Comput Sci. 2016;89(1):213‐217. https://doi.org/10.1016/j.procs.2016.06.047.
[60]
Dhaliwal SS, Nahid AA, Abbas R. Effective intrusion detection system using XGBoost. Information. 2018;9(7):149. https://doi.org/10.3390/info9070149.
[61]
Ma Z, Kaban A. K‐Nearest‐Neighbours with a novel similarity measure for intrusion detection. Paper presented at: Proceedings of the 13th UK Workshop on Computational Intelligence (UKCI). Guildford, UK: IEEE; 2013:266‐271.
[62]
Zhang Y, Cao G, Wang B, Li X. A novel ensemble method for k‐nearest neighbor. Pattern Recogn. 2019;85:13‐25. https://doi.org/10.1016/j.patcog.2018.08.003.
[63]
Karatas G, Demir O, Sahingoz OK. Increasing the performance of machine learning‐based IDSs on an imbalanced and up‐to‐date dataset. IEEE Access. 2020;8:32150‐32162. https://doi.org/10.1109/ACCESS.2020.2973219.
[64]
Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP. SMOTE synthetic minority over‐sampling technique. J Artif Intell Res. 2002;16:321‐357. https://doi.org/10.1613/jair.953.
[65]
Chen WH, Hsu SH, Shen HP. Application of SVM and ANN for intrusion detection. Comput Oper Res. 2005;32(10):2617‐2634. https://doi.org/10.1016/j.cor.2004.03.019.
[66]
Roopa Devi E, Suganthe R. Enhanced transductive support vector machine classification with grey wolf optimizer cuckoo search optimization for intrusion detection system. Concurr Comput Pract Exp. 2020;32(4):e4999. https://doi.org/10.1002/cpe.4999.
[67]
Yan B, Han G. Effective feature extraction via stacked sparse autoencoder to improve intrusion detection system. IEEE Access. 2018;6:41238‐41248. https://doi.org/10.1109/ACCESS.2018.2858277.
[68]
Ghanem K, Aparicio‐Navarro FJ, Kyriakopoulos KG, Lambotharan S, Chambers JA. Support vector machine for network intrusion and cyber‐attack detection. Paper presented at: Proceedings of the Sensor Signal Processing for Defence Conference (SSPD). London, UK: IEEE; 2017:1‐5. https://doi.org/10.1109/SSPD.2017.8233268.
[69]
Kumari R, Singh M, Jha R, Singh N. Anomaly detection in network traffic using K‐mean clustering. Paper presented at: Proceedings of the 3rd International Conference on Recent Advances in Information Technology (RAIT). Dhanbad, India; 2016:387‐393.
[70]
Li Z, Li Y, Xu L. Anomaly intrusion detection method based on k‐means clustering algorithm with particle swarm optimization. Paper presented at: Proceedings of the International Conference of Information Technology, Computer Engineering and Management Sciences. Nanjing, Jiangsu, China: IEEE; vol. 2; 2011:157‐161.
[71]
Munther A, Razif R, AbuAlhaj M, Anbar M, Nizam S. A preliminary performance evaluation of K‐means, KNN and EM unsupervised machine learning methods for network flow classification. Int J Electr Comput Eng. 2016;6(2):778‐784. https://doi.org/10.11591/ijece.v6i2.8909.
[72]
Yao H, Fu D, Zhang P, Li M, Liu Y. MSML: a novel multilevel semi‐supervised machine learning framework for intrusion detection system. IEEE IoT J. 2018;6(2):1949‐1959. https://doi.org/10.1109/JIOT.2018.2873125.
[73]
Saritas MM, Yasar A. Performance analysis of ANN and Naive Bayes classification algorithm for data classification. Int J Intell Syst Appl Eng. 2019;7(2):88‐91. https://doi.org/10.18201//ijisae.2019252786.
[74]
Anderson JA. An Introduction to Neural Networks. Cambridge, MA: MIT Press; 1995.
[75]
Bangyal WH, Ahmad J, Rauf HT, Shakir R. Evolving artificial neural networks using opposition based particle swarm optimization neural network for data classification. Paper presented at: Proceedings of the International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT). Sakhier, Bahrain; 2018:1‐6.
[76]
Huang GB, Zhu QY, Siew CK. Extreme learning machine: theory and applications. Neurocomputing. 2006;70(1‐3):489‐501. https://doi.org/10.1016/j.neucom.2005.12.126.
[77]
Li G, Niu P. An enhanced extreme learning machine based on ridge regression for regression. Neural Comput Appl. 2013;22(3‐4):803‐810. https://doi.org/10.1007/s00521-011-0771-7.
[78]
Li G, Niu P, Duan X, Zhang X. Fast learning network: a novel artificial neural network with a fast learning speed. Neural Comput Appl. 2014;24(7‐8):1683‐1695. https://doi.org/10.1007/s00521-013-1398-7.
[79]
Ali MH, Al Mohammed BAD, Ismail A, Zolkipli MF. A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access. 2018;6:20255‐20261. https://doi.org/10.1109/ACCESS.2018.2820092.
[80]
Bai Q. Analysis of particle swarm optimization algorithm. Comput Inf Sci. 2010;3(1):180.
[81]
Shen Y, Zheng K, Wu C, Zhang M, Niu X, Yang Y. An ensemble method based on selection using bat algorithm for intrusion detection. Comput J. 2018;61(4):526‐538. https://doi.org/10.1093/comjnl/bxx101.
[82]
Gao X, Shan C, Hu C, Niu Z, Liu Z. An adaptive ensemble machine learning model for intrusion detection. IEEE Access. 2019;7:82512‐82521. https://doi.org/10.1109/ACCESS.2019.2923640.
[83]
Graves A, Mohamed A, Hinton G. Speech recognition with deep recurrent neural networks. Paper presented at: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing. Vancouver, BC, Canada: IEEE; 2013:6645‐6649.
[84]
Singh D, Merdivan E, Psychoula I, et al. Human activity recognition using recurrent neural networks. Paper presented at: Proceedings of the International Cross‐Domain Conference for Machine Learning and Knowledge Extraction; 2017:267‐274; Springer, New York, NY.
[85]
Nishide S, Okuno HG, Ogata T, Tani J. Handwriting prediction based character recognition using recurrent neural network. Paper presented at: Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics. Anchorage, AK, USA: IEEE; 2011:2549‐2554.
[86]
Mesnil G, Dauphin Y, Yao K, et al. Using recurrent neural networks for slot filling in spoken language understanding. IEEE/ACM Trans Audio Speech Lang Process. 2014;23(3):530‐539. https://doi.org/10.1109/TASLP.2014.2383614.
[87]
Liu X, Gherbi A, Li W, Cheriet M. Multi features and multi‐time steps LSTM based methodology for bike sharing availability prediction. Proc Comput Sci. 2019;155:394‐401. https://doi.org/10.1016/j.procs.2019.08.055.
[88]
Hochreiter S, Schmidhuber J. Long short‐term memory. Neural Comput. 1997;9(8):1735‐1780. https://doi.org/10.1162/neco.1997.9.8.1735.
[89]
Chung J, Gulcehre C, Cho K, Bengio Y. Empirical evaluation of gated recurrent neural networks on sequence modeling; 2014. arXiv preprint arXiv:1412.3555.
[90]
Mittal M, Iwendi C, Khan S, Rehman JA. Analysis of security and energy efficiency for shortest route discovery in low‐energy adaptive clustering hierarchy protocol using Levenberg‐Marquardt neural network and gated recurrent unit for intrusion detection system. Trans Emerg Telecommun Technol. 2020;e3997. https://doi.org/10.1002/ett.3997.
[91]
Yin C, Zhu Y, Fei J, He X. A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access. 2017;5:21954‐21961. https://doi.org/10.1109/ACCESS.2017.2762418.
[92]
Sheikhan M, Jadidi Z, Farrokhi A. Intrusion detection using reduced‐size RNN based on feature grouping. Neural Comput Appl. 2012;21(6):1185‐1190. https://doi.org/10.1007/s00521-010-0487-0.
[93]
Xu C, Shen J, Du X, Zhang F. An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access. 2018;6:48697‐48707. https://doi.org/10.1109/ACCESS.2018.2867564.
[94]
Naseer S, Saleem Y, Khalid S, et al. Enhanced network anomaly detection based on deep neural networks. IEEE Access. 2018;6:48231‐48246. https://doi.org/10.1109/ACCESS.2018.2863036.
[95]
Farahnakian F, Heikkonen J. A deep auto‐encoder based approach for intrusion detection system. Paper presented at: Proceedings of the 20th International Conference on Advanced Communication Technology (ICACT). Chuncheon‐si Gangwon‐do, Korea (South): IEEE; 2018:178‐183.
[96]
Goodfellow I, Bengio Y, Courville A. Deep Learning. MIT Press. 2016. http://www.deeplearningbook.org.
[97]
Shone N, Ngoc TN, Phai VD, Shi Q. A deep learning approach to network intrusion detection. IEEE Trans Emerg Top Comput Intell. 2018;2(1):41‐50. https://doi.org/10.1109/TETCI.2017.2772792.
[98]
Alrawashdeh K, Purdy C. Toward an online anomaly intrusion detection system based on deep learning. Paper presented at: Proceedings of the 15th IEEE International Conference on Machine Learning and Applications (ICMLA). Anaheim, CA, USA: IEEE; 2016:195‐200.
[99]
Al‐Qatf M, Lasheng Y, Al‐Habib M, Al‐Sabahi K. Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access. 2018;6:52843‐52856. https://doi.org/10.1109/ACCESS.2018.2869577.
[100]
Papamartzivanos D, Mármol FG, Kambourakis G. Introducing deep learning self‐adaptive misuse network intrusion detection systems. IEEE Access. 2019;7:13546‐13560. https://doi.org/10.1109/ACCESS.2019.2893871.
[101]
Raina R, Battle A, Lee H, Packer B, Ng AY. Self‐taught learning: transfer learning from unlabeled data. Paper presented at: Proceedings of the 24th International Conference on Machine Learning. Corvalis Oregon USA; 2007:759‐766.
[102]
Kephart JO, Chess DM. The vision of autonomic computing. Computer. 2003;36(1):41‐50. https://doi.org/10.1109/MC.2003.1160055.
[103]
Khan FA, Gumaei A, Derhab A, Hussain A. A novel two‐stage deep learning model for efficient network intrusion detection. IEEE Access. 2019;7:30373‐30385. https://doi.org/10.1109/ACCESS.2019.2899721.
[104]
Malaiya RK, Kwon D, Suh SC, Kim H, Kim I, Kim J. An empirical evaluation of deep learning for network anomaly detection. IEEE Access. 2019;7:140806‐140817. https://doi.org/10.1109/ACCESS.2019.2943249.
[105]
Fontugne R, Borgnat P, Abry P, Fukuda K. Mawilab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking. Paper presented at: Proceedings of the 6th International Conference on Emerging Networking Experiments And Technologies (Co‐Next); 2010:1‐12; ACM, New York, NY.
[106]
Yang Y, Zheng K, Wu B, Yang Y, Wang X. Network intrusion detection based on supervised adversarial variational auto‐encoder with regularization. IEEE Access. 2020;8:42169‐42184. https://doi.org/10.1109/ACCESS.2020.2977007.
[107]
Andresini G, Appice A, Di Mauro N, Loglisci C, Malerba D. Multi‐channel deep feature learning for intrusion detection. IEEE Access. 2020;8:53346‐53359. https://doi.org/10.1109/ACCESS.2020.2980937.
[108]
Gu S, Rigazio L. Towards deep neural network architectures robust to adversarial examples; 2014. arXiv preprint arXiv:1412.5068.
[109]
Jia Y, Wang M, Wang Y. Network intrusion detection algorithm based on deep neural network. IET Inf Secur. 2018;13(1):48‐53. https://doi.org/10.1049/iet-ifs.2018.5258.
[110]
Dahl GE, Sainath TN, Hinton GE. Improving deep neural networks for LVCSR using rectified linear units and dropout. Paper presented at: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing. Vancouver, BC, Canada: IEEE; 2013:8609‐8613.
[111]
Wang Z. Deep learning‐based intrusion detection with adversaries. IEEE Access. 2018;6:38367‐38384. https://doi.org/10.1109/ACCESS.2018.2854599.
[112]
Goodfellow IJ, Shlens J, Szegedy C. Explaining and harnessing adversarial examples; 2014. arXiv preprint arXiv:1412.6572.
[113]
Papernot N, McDaniel P, Jha S, Fredrikson M, Celik ZB, Swami A. The limitations of deep learning in adversarial settings. Paper presented at: Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P). Saarbrucken, Germany: IEEE; 2016:372‐387.
[114]
Moosavi‐Dezfooli SM, Fawzi A, Frossard P. Deepfool: a simple and accurate method to fool deep neural networks. Paper presented at: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. Las Vegas, NV, USA; 2016:2574‐2582.
[115]
Carlini N, Wagner D. Towards evaluating the robustness of neural networks. Paper presented at: Proceedings of the IEEE Symposium on Security and Privacy (sp). San Jose, CA, USA: IEEE; 2017:39‐57.
[116]
Vinayakumar R, Alazab M, Soman K, Poornachandran P, Al‐Nemrat A, Venkatraman S. Deep learning approach for intelligent intrusion detection system. IEEE Access. 2019;7:41525‐41550. https://doi.org/10.1109/ACCESS.2019.2895334.
[117]
Vinayakumar R, Poornachandran P, Soman K. Scalable framework for cyber threat situational awareness based on domain name systems data analysis. Big Data in Engineering Applications. New York, NY: Springer; 2018:113‐142.
[118]
Hinton GE. A practical guide to training restricted Boltzmann machines. Neural Networks: Tricks of the Trade. New York, NY: Springer; 2012:599‐619.
[119]
Hinton GE, Osindero S, Teh YW. A fast learning algorithm for deep belief nets. Neural Comput. 2006;18(7):1527‐1554. https://doi.org/10.1162/neco.2006.18.7.1527.
[120]
Marir N, Wang H, Feng G, Li B, Jia M. Distributed abnormal behavior detection approach based on deep belief network and ensemble svm using spark. IEEE Access. 2018;6:59657‐59671. https://doi.org/10.1109/ACCESS.2018.2875045.
[121]
Wei P, Li Y, Zhang Z, Hu T, Li Z, Liu D. An optimization method for intrusion detection classification model based on deep belief network. IEEE Access. 2019;7:87593‐87605. https://doi.org/10.1109/ACCESS.2019.2925828.
[122]
Lawrence S, Giles CL, Tsoi AC, Back AD. Face recognition: a convolutional neural‐network approach. IEEE Trans Neural Netw. 1997;8(1):98‐113. https://doi.org/10.1109/72.554195.
[123]
Xiao Y, Xing C, Zhang T, Zhao Z. An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access. 2019;7:42210‐42219. https://doi.org/10.1109/ACCESS.2019.2904620.
[124]
Zhang X, Chen J, Zhou Y, Han L, Lin J. A multiple‐layer representation learning model for network‐based attack detection. IEEE Access. 2019;7:91992‐92008. https://doi.org/10.1109/ACCESS.2019.2927465.
[125]
Jiang K, Wang W, Wang A, Network Intrusion WH. Detection combined hybrid sampling with deep hierarchical network. IEEE Access. 2020;8:32464‐32476. https://doi.org/10.1109/ACCESS.2020.2973730.
[126]
Yu Y, Bian N. An intrusion detection method using few‐shot learning. IEEE Access. 2020;8:49730‐49740. https://doi.org/10.1109/ACCESS.2020.2980136.
[127]
Wang Y, Yao Q, Kwok J, Ni LM. Generalizing from a few examples: a survey on few‐shot learning; 2019. arXiv: 1904.05046.
[128]
Deng X, Liu Q, Deng Y, Mahadevan S. An improved method to construct basic probability assignment based on the confusion matrix for classification problem. Inf Sci. 2016;340:250‐261. https://doi.org/10.1016/j.ins.2016.01.033.
[129]
Bay S. The UCI KDD Archive [http://kdd. ics. uci. edu]. Irvine, CA: University of California, Department of Computer Science; 1999.
[130]
Song J, Takakura H, Okabe Y, Eto M, Inoue D, Nakao K. Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. Paper presented at: Proceedings of the 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. Salzburg Austria; 2011:29‐36.
[131]
Tavallaee M, Bagheri E, Lu W, Ghorbani AA. A detailed analysis of the KDD CUP 99 data set. Paper presented at: Proceedings of the IEEE Symposium on Computational Intelligence for Security and Defense Applications. Ottawa, ON, Canada: IEEE; 2009:1‐6.
[132]
Moustafa N, Slay J. UNSW‐NB15: a comprehensive data set for network intrusion detection systems (UNSW‐NB15 network data set). Paper presented at: Proceedings of the Military Communications and Information Systems Conference (MilCIS). Canberra, ACT, Australia: IEEE; 2015:1‐6.
[133]
Sharafaldin I, Lashkari AH, Ghorbani AA. Toward generating a new intrusion detection dataset and intrusion traffic characterization. Paper presented at: Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP). Madeira, Portugal; 2018:108‐116.
[134]
Singh R, Kumar H, Singla R. An intrusion detection system using network traffic profiling and online sequential extreme learning machine. Expert Syst Appl. 2015;42(22):8609‐8624. https://doi.org/10.1016/j.eswa.2015.07.015.
[135]
Moustafa N, Slay J. The evaluation of network anomaly detection systems: statistical analysis of the UNSW‐NB15 data set and the comparison with the KDD99 data set. Inf Sec J A Global Perspect. 2016;25(1‐3):18‐31. https://doi.org/10.1080/19393555.2015.1125974.
[136]
Lashkari AH, Draper‐Gil G, Mamun MSI, Ghorbani AA. Characterization of tor traffic using time based features. Paper presented at: Proceedings of the 3rd International Conference on Information Systems Security and Privacy(ICISSP). Porto, Portugal; 2017:253‐262.
[137]
Abdulhammed R, Musafer H, Alessa A, Faezipour M, Abuzneid A. Features dimensionality reduction approaches for machine learning based network intrusion detection. Electronics. 2019;8(3):322. https://doi.org/10.3390/electronics8030322.
[138]
Otoum Y, Liu D, Nayak A. DL‐IDS: a deep learning–based intrusion detection framework for securing IoT. Trans Emerg Telecomm Technol. 2019;e3803. https://doi.org/10.1002/ett.3803.
[139]
Yang Y, Xu HQ, Gao L, Yuan YB, McLaughlin K, Sezer S. Multidimensional intrusion detection system for IEC 61850‐based SCADA networks. IEEE Trans Power Deliv. 2016;32(2):1068‐1078. https://doi.org/10.1109/TPWRD.2016.2603339.
[140]
Barka E, Kerrache CA, Benkraouda H, Shuaib K, Ahmad F, Kurugollu F. Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure. Trans Emerg Telecommun Technol. 2019;e3706. https://doi.org/10.1002/ett.3706.
[141]
Alipour‐Fanid A, Dabaghchian M, Wang N, Wang P, Zhao L, Zeng K. Machine learning‐based delay‐aware UAV detection and operation mode identification over encrypted Wi‐Fi traffic. IEEE Trans Inf Forens Secur. 2019;15:2346‐2360. https://doi.org/10.1109/TIFS.2019.2959899.
[142]
Sciancalepore S, Ibrahim OA, Oligeri G, Di Pietro R. PiNcH: an effective, efficient, and robust solution to drone detection via network traffic analysis. Comput Netw. 2020;168:107044. https://doi.org/10.1016/j.comnet.2019.107044.

Cited By

View all
  • (2024)Multi-Pattern GPU Accelerated Collision-Less Rabin-Karp for NIDSInternational Journal of Distributed Systems and Technologies10.4018/IJDST.34126915:1(1-16)Online publication date: 9-Apr-2024
  • (2024)An early discovery of intrusion attack using novel optimized deep learning for internet of thingsJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-22135146:2(5455-5463)Online publication date: 14-Feb-2024
  • (2024)Enhancing intrusion detection: a hybrid machine and deep learning approachJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-024-00685-x13:1Online publication date: 17-Jul-2024
  • Show More Cited By

Index Terms

  1. Network intrusion detection system: A systematic study of machine learning and deep learning approaches
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image Transactions on Emerging Telecommunications Technologies
          Transactions on Emerging Telecommunications Technologies  Volume 32, Issue 1
          January 2021
          636 pages
          ISSN:2161-3915
          EISSN:2161-3915
          DOI:10.1002/ett.v32.1
          Issue’s Table of Contents
          This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

          Publisher

          John Wiley & Sons, Inc.

          United States

          Publication History

          Published: 13 January 2021

          Author Tags

          1. Deep learning
          2. Machine learning
          3. Network anomaly detection
          4. Network intrusion detection system
          5. Network security

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 10 Oct 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Multi-Pattern GPU Accelerated Collision-Less Rabin-Karp for NIDSInternational Journal of Distributed Systems and Technologies10.4018/IJDST.34126915:1(1-16)Online publication date: 9-Apr-2024
          • (2024)An early discovery of intrusion attack using novel optimized deep learning for internet of thingsJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-22135146:2(5455-5463)Online publication date: 14-Feb-2024
          • (2024)Enhancing intrusion detection: a hybrid machine and deep learning approachJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-024-00685-x13:1Online publication date: 17-Jul-2024
          • (2024)A fog-edge-enabled intrusion detection system for smart gridsJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-024-00609-913:1Online publication date: 14-Feb-2024
          • (2024)A Novel Hybrid Feature Selection with Cascaded LSTMWireless Communications & Mobile Computing10.1155/2024/55224312024Online publication date: 1-Jan-2024
          • (2024)Anomaly-Based Intrusion Detection System in Wireless Sensor Networks Using Machine Learning AlgorithmsApplied Computational Intelligence and Soft Computing10.1155/2024/26259222024Online publication date: 1-Jan-2024
          • (2024)Toward Deep Learning based Intrusion Detection System: A SurveyProceedings of the 2024 6th International Conference on Big Data Engineering10.1145/3688574.3688578(25-32)Online publication date: 24-Jul-2024
          • (2024)Multidimensional data fusion detection method based on time series data modelProceedings of the 2024 8th International Conference on High Performance Compilation, Computing and Communications10.1145/3675018.3675026(114-119)Online publication date: 7-Jun-2024
          • (2024)Enhancing Network Security Through Granular Computing: A Clustering-by-Time Approach to NetFlow Traffic AnalysisProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670882(1-8)Online publication date: 30-Jul-2024
          • (2024)VORTEX : Visual phishing detectiOns aRe Through EXplanationsACM Transactions on Internet Technology10.1145/365466524:2(1-24)Online publication date: 6-May-2024
          • Show More Cited By

          View Options

          View options

          Get Access

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media