Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey

被引:439
作者
Liu, Hongyu [1 ]
Lang, Bo [1 ]
机构
[1] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2019年 / 9卷 / 20期
关键词
machine learning; deep learning; intrusion detection system; cyber security; DATA INJECTION ATTACKS; NETWORK; CLASSIFICATION; BOTNET;
D O I
10.3390/app9204396
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Networks play important roles in modern life, and cyber security has become a vital research area. An intrusion detection system (IDS) which is an important cyber security technique, monitors the state of software and hardware running in the network. Despite decades of development, existing IDSs still face challenges in improving the detection accuracy, reducing the false alarm rate and detecting unknown attacks. To solve the above problems, many researchers have focused on developing IDSs that capitalize on machine learning methods. Machine learning methods can automatically discover the essential differences between normal data and abnormal data with high accuracy. In addition, machine learning methods have strong generalizability, so they are also able to detect unknown attacks. Deep learning is a branch of machine learning, whose performance is remarkable and has become a research hotspot. This survey proposes a taxonomy of IDS that takes data objects as the main dimension to classify and summarize machine learning-based and deep learning-based IDS literature. We believe that this type of taxonomy framework is fit for cyber security researchers. The survey first clarifies the concept and taxonomy of IDSs. Then, the machine learning algorithms frequently used in IDSs, metrics, and benchmark datasets are introduced. Next, combined with the representative literature, we take the proposed taxonomic system as a baseline and explain how to solve key IDS issues with machine learning and deep learning techniques. Finally, challenges and future developments are discussed by reviewing recent representative studies.
引用
收藏
页数:28
相关论文
共 93 条
[1]  
Abdelhamid N, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P72, DOI 10.1109/ISI.2017.8004877
[2]   Survey on Anomaly Detection using Data Mining Techniques [J].
Agrawal, Shikha ;
Agrawal, Jitendra .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :708-713
[3]   A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models [J].
Ahmim, Ahmed ;
Maglaras, Leandros ;
Ferrag, Mohamed Amine ;
Derdour, Makhlouf ;
Janicke, Helge .
2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2019, :228-233
[4]  
Alkasassbeh M, 2016, INT J ADV COMPUT SC, V7, P436
[5]  
Alrawashdeh K, 2016, 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), P195, DOI [10.1109/ICMLA.2016.0040, 10.1109/ICMLA.2016.167]
[6]  
Alseiari FAA, 2015, INT CONF SMART GR C, P148, DOI 10.1109/ICSGCE.2015.7454287
[7]  
Ammar A., 2015, Journal of Computer and Communications, V3, P52
[8]  
Anderson James P., 1980, Tech. Rep
[9]  
[Anonymous], 2008, P 25 INT C MACH LEAR
[10]   Design and Implementation of Intrusion Detection System using Convolutional Neural Network for DoS Detection [J].
Nguyen, Sinh-Ngoc ;
Nguyen, Van-Quyet ;
Choi, Jintae ;
Kim, Kyungbaek .
2ND INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND SOFT COMPUTING (ICMLSC 2018), 2015, :34-38