Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A Review on Challenges and Future Research Directions for Machine Learning-Based Intrusion Detection System

  • Survey article
  • Published:
Archives of Computational Methods in Engineering Aims and scope Submit manuscript

Abstract

Research in the field of Intrusion Detection is focused on developing an efficient strategy that can identify network attacks. One of the important strategies is to supervise the network events for identifying attacks. Security mechanisms such as Intrusion Detection Systems (IDS) have been used for securing the network infrastructure and network communication against network attacks, wherein Machine Learning (ML) techniques have a notable contribution to design an efficient IDS. However, dependence on modern communication technology and collateral rise in the network attacks affect the performance of ML techniques. In this article, we discuss a detailed overview of intrusion detection using ML techniques. We discuss the steps performed by ML techniques for detecting and classifying intrusions. Moreover, our paper provides a comprehensive overview of state-of-the-art ML techniques used for intrusion detection and classification along with their advantages and limitations. The paper also summarizes research work performed in the field of ML-based IDS. In this paper, we aim to discuss various challenges faced by ML-based IDS. We further discuss future research directions that can be considered for enhancing the efficiency and effectiveness of IDS. Our review will serve as an incentive to novice researchers who aim to work in the field of ML-based IDS.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Abomhara M et al (2015) Cyber security and the Internet of Things: vulnerabilities, threats, intruders and attacks. J Cyber Security Mobil 4(1):65–88

    Article  Google Scholar 

  2. Aburomman AA, Reaz MBI (2016) Survey of learning methods in intrusion detection systems. In: 2016 international conference on advances in electrical, electronic and systems engineering (ICAEES). IEEE, Piscataway, pp 362–365

  3. Agarap AFM (2018) A neural network architecture combining gated recurrent unit (GRU) and support vector machine (SVM) for intrusion detection in network traffic data. In: Proceedings of the 2018 10th international conference on machine learning and computing, pp 26–30

  4. Aggarwal P, Sharma SK (2015) Analysis of KDD dataset attributes-class wise for intrusion detection. Procedia Comput Sci 57:842–851

    Article  Google Scholar 

  5. Agrawal S, Agrawal J (2015) Survey on anomaly detection using data mining techniques. Procedia Comput Sci 60:708–713

    Article  Google Scholar 

  6. Ahmad I, Basheri M, Iqbal MJ, Rahim A (2018) Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6:33789–33795

    Article  Google Scholar 

  7. Ahmad B, Jian W, Ali ZA, Tanvir S, Khan MSA (2019) Hybrid anomaly detection by using clustering for wireless sensor network. Wirel Pers Commun 106(4):1841–1853

    Article  Google Scholar 

  8. Alhajjar E, Maxwell P, Bastian N (2021) Adversarial machine learning in network intrusion detection systems. Expert Syst Appl 186:115782

    Article  Google Scholar 

  9. Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160

    Article  Google Scholar 

  10. Almeida LAA, Santos JCM (2019) Evaluating features selection on NSL-KDD data-set to train a support vector machine-based intrusion detection system. In: 2019 IEEE Colombian conference on applications in computational intelligence (ColCACI). IEEE, Piscataway, pp 1–5

  11. Almseidin M, Alzubi M, Kovacs S, Alkasassbeh M (2017) Evaluation of machine learning algorithms for intrusion detection system. In: 2017 IEEE 15th international symposium on intelligent systems and informatics (SISY), pp. 000277–000282. IEEE, Piscataway, pp 000277-000282

  12. Althubiti S, Nick W, Mason J, Yuan X, Esterline A (2018) Applying long short-term memory recurrent neural network for intrusion detection. SoutheastCon 2018. IEEE, Piscataway, pp 1–5

    Google Scholar 

  13. Aminanto E, Kim K (2016) Deep learning in intrusion detection system: an overview. In: 2016 International Research Conference on Engineering and Technology (2016 IRCET). Higher Education Forum

  14. Azab A, Alazab M, Aiash M (2016) Machine learning based botnet identification traffic. 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, Piscataway, pp 1788–1794

    Chapter  Google Scholar 

  15. Aziz ASA, Sanaa E, Hassanien AE (2017) Comparison of classification techniques applied for network intrusion detection and classification. J Appl Logic 24:109–118

    Article  MathSciNet  Google Scholar 

  16. Belavagi MC, Muniyal B (2016) Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Comput Sci 89(2016):117–123

    Article  Google Scholar 

  17. Benaddi H, Ibrahimi K, Benslimane A (2018) Improving the intrusion detection system for nsl-kdd dataset based on PCC-fuzzy clustering-KNN. In: 2018 6th International conference on wireless networks and mobile communications (WINCOM). IEEE, Piscataway, pp 1–6

  18. Bhandari S, Gupta R, Laxmi V, Gaur MS, Zemmari A, Anikeev M (2015) DRACO: Droid analyst combo an android malware analysis framework. In: Proceedings of the 8th international conference on security of information and networks. ACM, New York, pp 283–289

  19. Biswas SK (2018) Intrusion detection using machine learning: a comparison study. Int J Pure Appl Math 118(19):101–114

    Google Scholar 

  20. Buczak AL, Guven E (2015) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18(2):1153–1176

    Article  Google Scholar 

  21. Carrasco J, García S, Rueda M, Das S, Herrera F (2020) Recent trends in the use of statistical tests for comparing swarm and evolutionary computing algorithms: practical guidelines and a critical review. Swarm Evol Comput 54:100665

    Article  Google Scholar 

  22. Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutor 21(3):2671–2701

    Article  Google Scholar 

  23. Chang Y, Li W, Yang Z (2017) Network intrusion detection based on random forest and support vector machine. In: 2017 IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), vol 1. IEEE, Piscataway, pp 635–638

  24. Chaudhari K, Thakkar A (2019) A comprehensive survey on travel recommender systems. Arch Comput Methods Eng 27(3):1–27

    Google Scholar 

  25. Chen F, Ye Z, Wang C, Yan L, Wang R (2018) A feature selection approach for network intrusion detection based on tree-seed algorithm and k-nearest neighbor. In: 2018 IEEE 4th international symposium on wireless systems within the international conferences on intelligent data acquisition and advanced computing systems (IDAACS-SWS). IEEE, Piscataway, pp 68–72

  26. Cieslak DA, Chawla NV (2008) Learning decision trees for unbalanced data. In: Joint European conference on machine learning and knowledge discovery in databases. Springer, Cham, pp 241–256

  27. Deng L, Yu D (2014) Deep learning: methods and applications. Found Trends Signal Process 7(3–4):197–387

    Article  MathSciNet  MATH  Google Scholar 

  28. Desai S, Thakkar A (2019) The fog computing paradigm: a rising need of IoT world. In: Proceedings of the 2nd international conference on data engineering and communication technology. Springer, pp 387–393

  29. Devi KS, Murugan AS, Sivaranjani A, Srinivasan P (2017) Development of interactive fashion design support system: Using ids (interactive display on any surface)-a case study. In: 2017 4th International conference on advanced computing and communication systems (ICACCS). IEEE, Piscataway, pp 1–6

  30. Dhanabal L, Shantharajah S (2015) A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int J Adv Res Comput Commun Eng 4(6):446–452

    Google Scholar 

  31. Dong B, Wang X (2016) Comparison deep learning method to traditional methods using for network intrusion detection. In: 2016 8th IEEE international conference on communication software and networks (ICCSN). IEEE, Piscataway, pp 581–585

  32. Dueck D (2009) Affinity propagation: clustering data by passing messages. Citeseer

  33. Ektefa M, Memar S, Sidi F, Affendey LS (2010) Intrusion detection using data mining techniques. In: 2010 International conference on information retrieval & knowledge management (CAMP). IEEE, Piscataway, pp 200–203

  34. Farnaaz N, Jabbar M (2016) Random forest modeling for network intrusion detection system. Procedia Comput Sci 89(1):213–217

    Article  Google Scholar 

  35. Fernández A, Garcia S, Herrera F, Chawla NV (2018) Smote for learning from imbalanced data: progress and challenges, marking the 15-year anniversary. J Artif Intell Res 61:863–905

    Article  MathSciNet  MATH  Google Scholar 

  36. Gao X, Shan C, Hu C, Niu Z, Liu Z (2019) An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7:82512–82521

    Article  Google Scholar 

  37. Geetha S, Maniyosai R (2019) An improved naive bayes classifier on imbalanced attributes. Int J Organ Collect Intell (IJOCI) 9(2):1–15

    Article  Google Scholar 

  38. Gharib A, Sharafaldin I, Lashkari AH, Ghorbani AA (2016) An evaluation framework for intrusion detection dataset. In: 2016 International conference on information science and security (ICISS). IEEE, Piscataway, pp 1–6

  39. Grieco G, Grinblat GL, Uzal L, Rawat S, Feist J, Mounier L (2016) Toward large-scale vulnerability discovery using machine learning. In: Proceedings of the 6th ACM conference on data and application security and privacy, pp 85–96

  40. Halilovic M, Subasi A (2012) Intrusion detection on smartphones. arXiv preprint. arXiv:1211.6610

  41. Halimaa A, Sundarakantham K (2019) Machine learning based intrusion detection system. In: 2019 3rd International conference on trends in electronics and informatics (ICOEI). IEEE, Piscataway, pp 916–920

  42. Hammoodi MS, Stahl F, Badii A (2018) Real-time feature selection technique with concept drift detection using adaptive micro-clusters for data stream mining. Knowl Based Syst 161:205–239

    Article  Google Scholar 

  43. Hao Z (2018) Application research of k-nearest neighbor algorithm in intrusion detection system. J Electron Components Inf Technol 6:3

    Google Scholar 

  44. Hariharan R, Thaseen IS, Devi GU (2020) Performance analysis of single-and ensemble-based classifiers for intrusion detection. Soft computing for problem solving. Springer, Singapore, pp 759–770

    Chapter  Google Scholar 

  45. Hashem SH (2017) Denial of service intrusion detection system (IDS) based on naïve Bayes classifier using NSL KDD and KDD cup 99 datasets. Al-Rafidain Univ College Sci 40:206–231

    Google Scholar 

  46. He K, Kim DD, Asghar MR (2023) Adversarial machine learning for network intrusion detection systems: a comprehensive survey. IEEE Commun Surv Tutor 25(1):1–1

    Article  Google Scholar 

  47. Hindy H, Brosset D, Bayne E, Seeam A, Tachtatzis C, Atkinson R, Bellekens X (2018) A taxonomy and survey of intrusion detection system design techniques, network threats and datasets. arXiv preprint. arXiv:1806.03517

  48. Hodo E, Bellekens X, Hamilton A, Tachtatzis C, Atkinson R (2017) Shallow and deep networks intrusion detection system: a taxonomy and survey. arXiv preprint. arXiv:1701.02145

  49. Ibitoye O, Shafiq O, Matrawy A (2019) Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. In: 2019 IEEE global communications conference (GLOBECOM). IEEE, Piscataway, pp 1–6

  50. Ingre B, Yadav A (2015) Performance analysis of NSL-KDD dataset using ANN. In: 2015 International conference on signal processing and communication engineering systems. IEEE, Piscataway, pp 92–96

  51. Injadat M, Moubayed A, Nassif AB, Shami A (2020) Multi-stage optimized machine learning framework for network intrusion detection. IEEE Trans Netw Serv Manag 18(2):1803–1816

    Article  Google Scholar 

  52. Jin C, De-Lin L, Fen-Xiang M (2009) An improved ID3 decision tree algorithm. In: 2009 4th International conference on computer science & education. IEEE, Piscataway, pp 127–130

  53. Jouad M, Diouani S, Houmani H, Zaki A (2015) Security challenges in intrusion detection. In: 2015 international conference on cloud technologies and applications (CloudTech). IEEE, Piscataway, pp 1–11

  54. Kanimozhi V, Jacob TP (2019) Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset cse-cic-ids2018 using cloud computing. In: 2019 International conference on communication and signal processing (ICCSP). IEEE, Piscataway, pp 0033–0036

  55. Karim A, Salleh R, Khan MK (2016) SMARTbot: a behavioral analysis framework augmented with machine learning to identify mobile Botnet applications. PLoS ONE 11(3):e015007

    Article  Google Scholar 

  56. Kelleher JD, Mac Namee B, D’arcy A (2020) Fundamentals of machine learning for predictive data analytics: algorithms, worked examples, and case studies. MIT, Cambridge

    MATH  Google Scholar 

  57. Khan FA, Gumaei A (2019) A comparative study of machine learning classifiers for network intrusion detection. In: International conference on artificial intelligence and security. Springer, pp 75–86

  58. Khanal BP, Hammerle EJ, Mukerji A (2018) Detecting network flow states for network traffic analysis. US Patent 15/585,887

  59. Kim G, Lee S, Kim S (2014) A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst Appl 41(4):1690–1700

    Article  MathSciNet  Google Scholar 

  60. Kovarasan RK, Rajkumar M (2019) An effective intrusion detection system using flawless feature selection, outlier detection and classification. In: Progress in advanced computing and intelligent engineering. Springer, pp 203–213

  61. Lee W, Stolfo SJ (2000) A framework for constructing features and models for intrusion detection systems. ACM Trans Inf Syst Security (TiSSEC) 3(4):227–261

    Article  Google Scholar 

  62. Li H, Xu Z, Zhu H, Ma D, Li S, Xing K (2016) Demographics inference through wi-fi network traffic analysis. In: IEEE INFOCOM 2016–the 35th annual IEEE international conference on computer communications. IEEE, Piscataway, pp 1–9

  63. Li G, Yan Z, Fu Y, Chen H (2018) Data fusion for network intrusion detection: a review. Security Commun Netw 2018:1–16

    Google Scholar 

  64. Li L, Zhang H, Peng H, Yang Y (2018) Nearest neighbors based density peaks approach to intrusion detection. Chaos Solitons Fractals 110:33–40

    Article  MathSciNet  Google Scholar 

  65. Liu W, Ci L, Liu L (2020) A new method of fuzzy support vector machine algorithm for intrusion detection. Appl Sci 10(3):1065

    Article  Google Scholar 

  66. Lohiya R, Thakkar A (2020) Application domains, evaluation datasets, and research challenges of IoT: a systematic review. IEEE Internet Things J 8(11):8774–8798

    Article  Google Scholar 

  67. Lohiya R, Thakkar A (2021) Intrusion detection using deep neural network with antirectifier layer. In: Applied soft computing and communication networks. Springer, pp 89–105

  68. Lopez-Martin M, Carro B, Sanchez-Esguevillas A (2020) Application of deep reinforcement learning to intrusion detection for supervised problems. Expert Syst Appl 141:112963

    Article  Google Scholar 

  69. Malialis K, Kudenko D (2015) Distributed response to network intrusions using multiagent reinforcement learning. Eng Appl Artif Intell 41:270–284

    Article  Google Scholar 

  70. Mansour N, Chehab MI, Faour A (2010) Filtering intrusion detection alarms. Clust Comput 13(1):19–29

    Google Scholar 

  71. Marpaung JA, Sain M, Lee HJ (2012) Survey on malware evasion techniques: state of the art and challenges. In: 2012 14th International conference on advanced communication technology (ICACT). IEEE, Piscataway, pp 744–749

  72. Meidan Y, Bohadana M, Shabtai A, Guarnizo JD, Ochoa M, Tippenhauer NO, Elovici Y (2017) Profiliot: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the symposium on applied computing, pp 506–509

  73. Mishra P, Varadharajan V, Tupakula U, Pilli ES (2018) A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun Surv Tutor 21(1):686–728

    Article  Google Scholar 

  74. Mkuzangwe NN, Nelwamondo F (2017) Ensemble of classifiers based network intrusion detection system performance bound. In: 2017 4th international conference on systems and informatics (ICSAI). IEEE, Piscataway, pp 970–974

  75. Mohri M, Rostamizadeh A, Talwalkar A (2018) Foundations of machine learning. MIT, Cambridge

    MATH  Google Scholar 

  76. Mulak P, Gaikwad D, Talhar N (2016) K-nearest neighbor and boundary cutting algorithm for intrusion detection system. In: Information systems design and intelligent applications. Springer, pp 269–278

  77. Mungra D, Agrawal A, Thakkar A (2020) A voting-based sentiment classification model. In: Intelligent communication, control and devices. Springer, pp 551–558

  78. Nanda M, Parinitha B (2019) Machine learning and deep learning methods for cybersecurity. IEEE Access 6:35365–35381

    Google Scholar 

  79. Niranjan A, Prakash A, Veena N, Geetha M, Shenoy PD, Venugopal K (2017) EBJRV: an ensemble of bagging, J48 and random committee by voting for efficient classification of intrusions. In: 2017 IEEE International WIE conference on electrical and computer engineering (WIECON-ECE). IEEE, Piscataway, pp 51–54

  80. Nuti G, Rugama LAJ, Cross AI (2019) A bayesian decision tree algorithm. arXiv preprint. arXiv:1901.03214

  81. Othman SM, Ba-Alwi FM, Alsohybe NT, Al-Hashida AY (2018) Intrusion detection model using machine learning algorithm on big data environment. J Big Data 5(1):34

    Article  Google Scholar 

  82. Özgür A, Erdem H (2016) A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015. PeerJ Preprints 4:e1954v1

  83. Panigrahi R, Borah S (2018) A detailed analysis of CICIDS2017 dataset for designing intrusion detection systems. Int J Eng Technol 7(3.24):479–482

  84. Pareek P, Thakkar A (2020) A survey on video-based human action recognition: recent updates, datasets, challenges, and applications. Artif Intell Rev 54(3):2259–2322

    Article  Google Scholar 

  85. Park S, Seo S, Jeong C, Kim J (2018) Network intrusion detection through online transformation of eigenvector reflecting concept drift. In: Proceedings of the first international conference on data science, E-learning and information systems, pp 1–4

  86. Parmar J, Chouhan S, Raychoudhury V, Rathore S (2023) Open-world machine learning: applications, challenges, and opportunities. ACM Comput Surv 55(10):1–37

    Article  Google Scholar 

  87. Patel R, Patel CI, Thakkar A (2012) Aggregate features approach for texture analysis. In: 2012 Nirma University international conference on engineering (NUiCONE). IEEE, Piscataway, pp 1–5

  88. Peng K, Leung V, Zheng L, Wang S, Huang C, Lin T (2018) Intrusion detection system based on decision tree over big data in fog environment. Wirel Commun Mobile Comput. https://doi.org/10.1155/2018/4680867

    Article  Google Scholar 

  89. Pole A, West M, Harrison J (2018) Applied Bayesian forecasting and time series analysis. Chapman and Hall/CRC, Boca Raton

    Book  MATH  Google Scholar 

  90. Prasad M, Tripathi S, Dahal K (2020) Unsupervised feature selection and cluster center initialization based arbitrary shaped clusters for intrusion detection. Comput Security 99:102062

    Article  Google Scholar 

  91. Priyam A, Abhijeeta G, Rathee A, Srivastava S (2013) Comparative analysis of decision tree classification algorithms. Int J Curr Eng Technol 3(2):334–337

    Google Scholar 

  92. Rajput D, Thakkar A (2019) A survey on different network intrusion detection systems and countermeasure. In: Emerging research in computing, information, communication and applications. Springer, pp 497–506

  93. Ravipati RD, Abualkibash M (2019) Intrusion detection system classification using different machine learning algorithms on kdd-99 and nsl-kdd datasets-a review paper. Int J Comput Sci Inf Technol (IJCSIT) 11(3):1–16

    Google Scholar 

  94. Ren SQ, Tan BHM, Sundaram S, Wang T, Ng Y, Chang V, Aung KMM (2016) Secure searching on cloud storage enhanced by homomorphic indexing. Future Gen Comput Syst 65:102–110

    Article  Google Scholar 

  95. Resende PAA, Drummond AC (2018) A survey of random forest based methods for intrusion detection systems. ACM Comput Surv (CSUR) 51(3):1–36

    Article  Google Scholar 

  96. Revathi S, Malathi A (2013) A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int J Eng Res Technol (IJERT) 2(12):1848–1853

    Google Scholar 

  97. Saleh AI, Talaat FM, Labib LM (2019) A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers. Artif Intell Rev 51(3):403–443

    Article  Google Scholar 

  98. Salo F, Nassif AB, Essex A (2019) Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Comput Netw 148:164–175

    Article  Google Scholar 

  99. Sangkatsanee P, Wattanapongsakorn N, Charnsripinyo C (2011) Practical real-time intrusion detection using machine learning approaches. Comput Commun 34(18):2227–2235

    Article  Google Scholar 

  100. Seok S, Kim H (2016) Visualized malware classification based-on convolutional neural network. J Korea Inst Inf Security Cryptol 26(1):197–208

    Google Scholar 

  101. Servin A, Kudenko D (2008) Multi-agent reinforcement learning for intrusion detection: a case study and evaluation. In: German conference on multiagent system technologies. Springer, pp 159–170

  102. Shabtai A, Kanonov U, Elovici Y, Glezer C, Weiss Y (2012) “andromaly’’: a behavioral malware detection framework for android devices. J Intell Inf Syst 38(1):161–190

    Article  Google Scholar 

  103. Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp 108–116

  104. Sharma R, Rajvaidya H, Pareek P, Thakkar A (2019) A comparative study of machine learning techniques for emotion recognition. In: Emerging research in computing, information, communication and applications. Springer, pp 459–464

  105. Sikder AK, Aksu H, Uluagac AS (2017) 6thsense: a context-aware sensor-based attack detector for smart devices. In: 26th \(\{\)USENIX$\}$ security symposium (\(\{\)USENIX$\}$ security 17), pp 397–414

  106. Singh I, Kumar N, Srinivasa K, Sharma T, Kumar V, Singhal S (2020) Database intrusion detection using role and user behavior based risk assessment. J Inf Security Appl 55:102654

    Google Scholar 

  107. Soheily-Khah S, Marteau PF, Béchet N (2018) Intrusion detection in network systems through hybrid supervised and unsupervised machine learning process: a case study on the iscx dataset. In: 2018 1st International conference on data intelligence and security (ICDIS). IEEE, Piscataway, pp 219–226

  108. Song Y, Liang J, Lu J, Zhao X (2017) An efficient instance selection algorithm for k nearest neighbor regression. Neurocomputing 251:26–34

    Article  Google Scholar 

  109. Sun S, Ye Z, Yan L, Su J, Wang R (2018) Wrapper feature selection based on lightning attachment procedure optimization and support vector machine for intrusion detection. In: 2018 IEEE 4th international symposium on wireless systems within the international conferences on intelligent data acquisition and advanced computing systems (IDAACS-SWS). IEEE, Piscataway, pp 41–46

  110. Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the kdd cup 99 data set. 2009 IEEE symposium on computational intelligence for security and defense applications. IEEE, Piscataway, pp 1–6

    Google Scholar 

  111. Thakkar A, Chaudhari K (2020) A comprehensive survey on portfolio optimization, stock price and trend prediction using particle swarm optimization. Arch Comput Methods Eng 28:2133–2164

    Article  MathSciNet  Google Scholar 

  112. Thakkar A, Chaudhari K (2020) Crest: Cross-reference to exchange-based stock trend prediction using long short-term memory. Procedia Comput Sci 167:616–625

    Article  Google Scholar 

  113. Thakkar A, Lohiya R (2020) Role of swarm and evolutionary algorithms for intrusion detection system: a survey. Swarm Evol Comput 53:100631

    Article  Google Scholar 

  114. Thakkar A, Lohiya R (2020) A review on machine learning and deep learning perspectives of ids for IoT: Recent updates, security issues, and challenges. Arch Comput Methods Eng. https://doi.org/10.1007/s11831-020-09496-0

    Article  Google Scholar 

  115. Thakkar A, Lohiya R (2020) A review of the advancement in intrusion detection datasets. Procedia Comput Sci 167:636–645

    Article  Google Scholar 

  116. Thakkar A, Lohiya R (2020) Attack classification using feature selection techniques: a comparative study. J Ambient Intell Human Comput 12:1249–1266

    Article  Google Scholar 

  117. Thakkar A, Lohiya R (2021) Analyzing fusion of regularization techniques in the deep learning-based intrusion detection system. Int J Intell Syst 36(12):7340–7388

    Article  Google Scholar 

  118. Thakkar A, Chaudhari K (2021) Fusion in stock market prediction: a decade survey on the necessity, recent developments, and potential future directions. Inf Fusion 65:95–107

    Article  Google Scholar 

  119. Thakkar A, Lohiya R (2021) A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions. Artif Intell Rev 55:453–563

    Article  Google Scholar 

  120. Thakkar A, Lohiya R (2023) Fusion of statistical importance for feature selection in deep neural network-based intrusion detection system. Inf Fusion 90:353–363

    Article  Google Scholar 

  121. Thakkar A, Lohiya R (2023) Attack classification of imbalanced intrusion data for IoT network using ensemble learning-based deep neural network. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2023.3244810

    Article  Google Scholar 

  122. Thakkar A, Jivani N, Padasumbiya J, Patel CI (2013) A new hybrid method for face recognition. In: 2013 Nirma University international conference on engineering (NUiCONE). IEEE, Piscataway, pp 1–9

  123. Thakkar A, Mungra D, Agrawal A (2020) Sentiment analysis: an empirical comparison between various training algorithms for artificial neural network. Int J Innov Comput Appl 11(1):9–29

    Article  Google Scholar 

  124. Thaseen IS, Kumar CA (2016) Intrusion detection model using chi square feature selection and modified naïve bayes classifier. In: Proceedings of the 3rd International symposium on big data and cloud computing challenges (ISBCC–16’). Springer, pp 81–91

  125. Tjhai GC, Furnell SM, Papadaki M, Clarke NL (2010) A preliminary two-stage alarm correlation and filtering system using som neural network and k-means algorithm. Comput Security 29(6):712–723

    Article  Google Scholar 

  126. Ugochukwu CJ, Bennett E, Harcourt P (2018) An intrusion detection system using machine learning algorithm. Int J Comput Sci Math Theory 4(1):2545–5699

    Google Scholar 

  127. Umbaugh SE (2023) Digital image processing and analysis: computer vision and image analysis. CRC Press, Boca Raton

    Google Scholar 

  128. Umer MA, Junejo KN, Jilani MT, Mathur AP (2022) Machine learning for intrusion detection in industrial control systems: applications, challenges, and recommendations. Int J Crit Infrastruct Protect 38:100516

    Article  Google Scholar 

  129. Ventures C (2019) Cybercrime damages SPSSlashDollar6 trillion by 2021. Cybersecurity Ventures Official Annual Cybercrime Report

  130. Vora K, Shah S, Harsoda H, Sheth J, Agarwal S, Thakkar A, Mankad SH (2019) Emotion recognition from sensory and bio-signals: a survey. In: Proceedings of the 2nd International conference on data engineering and communication technology. Springer, pp 345–355

  131. Wang H, Xiao Y, Long Y (2017) Research of intrusion detection algorithm based on parallel SVM on spark. In: 2017 7th IEEE international conference on electronics information and emergency communication (ICEIEC). IEEE, Piscataway, pp 153–156

  132. Wang W, Liu J, Pitsilis G, Zhang X (2018) Abstracting massive data for lightweight intrusion detection in computer networks. Inf Sci 433:417–430

    Article  MathSciNet  Google Scholar 

  133. Webb GI, Hyde R, Cao H, Nguyen HL, Petitjean F (2016) Characterizing concept drift. Data Min Knowl Discov 30(4):964–994

    Article  MathSciNet  MATH  Google Scholar 

  134. Xu X, Xie T (2005) A reinforcement learning approach for host-based intrusion detection using sequences of system calls. In: International conference on intelligent computing. Springer, pp 995–1003

  135. Yang K, Liu J, Zhang C, Fang Y (2018) Adversarial examples against the deep learning based network intrusion detection systems. In: MILCOM 2018–2018 IEEE military communications conference (MILCOM). IEEE, Piscataway, pp 559–564

  136. Yao H, Fu D, Zhang P, Li M, Liu Y (2018) MSML: a novel multilevel semi-supervised machine learning framework for intrusion detection system. IEEE Internet Things J 6(2):1949–1959

    Article  Google Scholar 

  137. Zhang M, Wang L, Jajodia S, Singhal A, Albanese M (2016) Network diversity: a security metric for evaluating the resilience of networks against zero-day attacks. IEEE Trans Inf Forensics Security 11(5):1071–1086

    Article  Google Scholar 

  138. Zolanvari M, Teixeira MA, Gupta L, Khan KM, Jain R (2019) Machine learning-based network vulnerability analysis of industrial internet of things. IEEE Internet Things J 6(4):6822–6834

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ritika Lohiya.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thakkar, A., Lohiya, R. A Review on Challenges and Future Research Directions for Machine Learning-Based Intrusion Detection System. Arch Computat Methods Eng 30, 4245–4269 (2023). https://doi.org/10.1007/s11831-023-09943-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11831-023-09943-8