Machine Learning For Intrusion Detection in Cyber Security: Applications, Challenges, and Recommendations
Machine Learning For Intrusion Detection in Cyber Security: Applications, Challenges, and Recommendations
Article QR
Author (s): Aqib Ali1, Samreen Naeem1, Sania Anam2, Muhammad Munawar Ahmed3
Affiliation (s):
1
College of Automation, Southeast University, Nanjing, China.
2
Govt Associate College for Women Ahmadpur East, Bahawalpur, Pakistan.
3
Islamia University Bahawalpur, Bahawalpur, Pakistan.
DOI: https://doi.org/10.32350.icr.22.03
History: Received: October 10, 2022, Revised: November 11, 2022, Accepted: December 2, 2022
Citation: A. Ali, S. Naeem, S. Anam, and M. M. Ahmed, “Machine learning for intrusion
detection in cyber security: Applications, challenges, and recommendations,”
UMT Artif. Intell. Rev., vol. 2, no. 2, pp. 41-64, 2022, doi:
https://doi.org/10.32350.icr.22.03
Copyright: © The Authors
Licensing: This article is open access and is distributed under the terms of
Creative Commons Attribution 4.0 International License
Conflict of
Interest: Author(s) declared no conflict of interest
A publication of
School of Systems and Technology
University of Management and Technology, Lahore, Pakistan
Machine Learning for Intrusion Detection in Cyber
Security: Applications, Challenges, and Recommendations
Aqib Ali1 *, Samreen Naeem1, Sania Anam2, and Muhammad Munawar
0F
Ahmed3
1
College of Automation, Southeast University, Nanjing, China.
2
Department of Computer Science, Govt. Associate College for Women
Ahmadpur East, Bahawalpur, Pakistan.
3
Department of Information Technology, Islamia University Bahawalpur,
Pakistan.
Abstract-Modern life revolves critical dimension to classify and
around networks and cybersecurity summarize the IDS literature. This
has emerged as a critical study field. form of classification structure is
The health of the software and appropriate for cyber security
hardware running on a network is researchers.
monitored by an Intrusion Detection
Index Terms-classification, feature
System (IDS) which is a fundamental
optimization, Intrusion Detection
cybersecurity approach. After
System, machine Learning
decades of research, the existing IDSs
Classification
have developed the capability to
confront hurdles in order to improve I. Introduction
detection accuracy, reduce false
alarm rates, and detect unexpected The Internet has become a vital
attacks. Many academics have aspect of modern lives as the digital
concentrated on designing such IDSs world has grown considerably [1].
that employ machine learning With the emergence of smart cities,
approaches to overcome the self-driving cars, health monitoring
aforementioned difficulties. Machine via wearables, and mobile banking,
learning approaches are capable to among many other things, internet
discover important distinctions that addiction is on the rise. While these
exist between normal and aberrant technologies assist individuals and
data with great accuracy. Moreover, societies at a large scale, they also
these approaches are also very
pose several concerns [2]. For
generalizable which allows them to
detect unknown attacks. The survey instance, hackers could take
conducted in the current study offers advantage of weaknesses, resulting
ataxonomy of IDS based on machine in theft and sabotage that harm
learning that uses data objects as the people worldwide. Cyberattacks
*
Corresponding Author: aqibcsit@gmail.com
divided into two kinds based on how hole, and Sybil attacks are common
it works and they are as follows: types of IoT attacks. The Reference
[13] proposed supervised light
A. Active IDS
intrusion detection. SVM was
Active IDS are similar to created to identify attacks (DDoS
passive IDS in that they prevent target).
attacks by blocking suspicious
traffic.
B. Passive IDS
These IDS merely monitor and
analyze traffic by notifying the
administrator of attacks and
vulnerabilities [11].
II. Applications of Intrusion
Detection Systems
Intrusion Detection Systems are
vital to prevent cyber-attacks. All
transactions and data processing
occurs through the Internet, which is
very susceptible to fraudulent
activities. It is essential that the Fig. 2. Application of IDS
Information security must be B. IDS of Smart City
emphasized. Fig. 2 summarizes the
IDS based applications. The Reference [14] described
the intelligent city intrusion
A. IDS for Internet of Things detection. The author utilized an
The Internet of Things (IoT) is a intelligent water distribution system
network of things or devices that can dataset. Smart city DDoS attacks
detect, collect, and transmit data must be detected. The approach
without human or computer suggested in the current paper
interaction. Low-power IoT devices consists of two parts, that is, RBM
use lightweight protocols. The and classifier. This RBM model
Reference [12] discussed smart grid helps unsupervised high-level
IoT devices. Attackers may learning. Classification is used to
manipulate the sensor data. differentiate DDOS attacks. The
Physical, side channel, FFNN, AFNN, RF, and SVM
environmental, cryptanalysis, black classifiers were employed. RBM
School of System and Technology
45
Volume 2 Issue 2, Fall 2022
Machine Learning for Intrusion Detection...
was carried out using KDD99. The study compared the results of
data collection was proportioned. classifiers using all 41 features vs.
The results revealed that 70% 11, 12, 13, and 15 feature sets. The
testing and 30% training proved best reduction of characteristics
for accuracy and false alarm rate. enhanced precision in the
The hybrid model achieved 99.1% experiment. Random Forest
of accuracy. Classification Algorithm performed
better with the DoS class at 99.63%
The Reference [44] updated the
accuracy.
electricity smart grid to identify
regular harmful attacks. A Hybrid The Reference [47] developed
Decision Trees (HDTs) approach an intrusion detection system
was devised to identify the attacks. employing a random forest
The proposed hybrid method's classifier with PCA scaling.
presentation was also compared Decision trees, naive Bayes, and
with SVM. The trials demonstrated SVM were compared to the
that the proposed strategy (HDT) suggested technique. The proposed
was more efficient with a measuring approach obtained the maximum
accuracy of 97.2193% using accuracy of 96.78 percent, an error
NSLKDD. rate of 0.21 percent, and built the
3.42 model which proved to be the
The Reference [45] suggested a
fastest.
DDoS detection approach to
increase network security in 2020. The Reference [48] provided a
The classification was carried out technique for anomalous IDS based
using K-Nearest Neighbor and Nave on ML classifier. The CSE-CIC-
Bayes, while feature extraction IDS2018 dataset model showed 80
employed correlation. The proposed features. This ensemble feature
model was compared against NSL- optimization approach used Chi-
KDD and KDD Cup 99 learning square to calculate high feature rank
models. The eight-character KNN correlation. The hybrid technique
technique surpassed Naive Bayes. picked 23 of 80 features. The
Performance was calculated to be suggested model outperformed the
98.51 percent and accuracy 98.9%. three overall classifiers' accuracy of
98.8%.
The Reference [46] explained
the usage of feature reduction in the
classification model. Intelligent
IDS were presented employing
various ML classifiers. The current
School of System and Technology
53
Volume 2 Issue 2, Fall 2022
Machine Learning for Intrusion Detection...
95.00%
90.00%
85.00%
80.00%
75.00%
70.00%
neural https://doi.org/10.1016/j.ipm.2
network,” Neurocomput., vol. 021.102540
452, pp. 705–715, 2021, doi: [28] R. Kajal, D. Syamala, and G.
https://doi.org/10.1016/j.neuco Ajay, “Decision tree-based
m.2020.07.138 Algorithm for Intrusion
[24] M. Ajdani and H. Ghaffary, Detection,” Int. J. Adv. Netw.
“Design network intrusion Appl., vol. 7, no. 4, pp. 2828–
detection system using support 2834, 2021.
vector machine,” Int. J. [29] N. Kaur, M. Bansal, and S. S.
Commun. Syst., vol. 34, no. 3, Sran, “Scrutinizing attacks and
Art. no. 4689, 2021, doi: evaluating performance
https://doi.org/10.1002/dac.46 appraisal parameters via
89 feature selection in intrusion
[25] M. Mohammadi, T. A. Rashid, detection system,” Res. Squ.,
S. H. T. Karim, et al, “A vol. 10, pp. 1–14, 2021, doi: :
comprehensive survey and https://doi.org/10.21203/rs.3.rs
taxonomy of the SVM-based -748765/v1
intrusion detection systems,” J. [30] Q. V. Dang, “Studying the
Netw. Comput. Appl., vol. 178, fuzzy clustering algorithm for
Art. no. 102983, 2021, doi: intrusion detection on the
https://doi.org/10.1016/j.jnca.2 attacks to the domain name
021.102983 system,” in 2021 5th World
[26] M. Zubair, A. Ali, S. Naeem, F. Conf. Smart Trends Syst. Secur.
Jamal and C. Chesneau, Sustainab. (WorldS4), London,
“Emotion recognition from United Kingdom, 29–30 July,
facial expression using 2021, IEEE, pp. 271–274, doi:
machine vision approach,” J. https://doi.org/10.1109/World
Appl. Emerg. Sci., vol. 10, no. S451998.2021.9514038
1, pp. 12–21, 2020. [31] M. Almseidin, J. Al-Sawwa,
[27] X. Duan, S. Ying, W. Yuan, H. and M. Alkasassbeh,
Cheng, and X. Yin, “QLLog: A “Anomaly-based Intrusion
log anomaly detection method Detection System Using Fuzzy
based on Q-learning Logic,” in 2021 Int. Conf.
algorithm,” Info. Process. Inform. Technol., IEEE,
Manag., vol. 58, no. 3, Art. no. Amman, Jordan, July 14–15,
102540, 2021, doi: 2021, pp. 290-295, doi: