Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey

被引:439
作者
Liu, Hongyu [1 ]
Lang, Bo [1 ]
机构
[1] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2019年 / 9卷 / 20期
关键词
machine learning; deep learning; intrusion detection system; cyber security; DATA INJECTION ATTACKS; NETWORK; CLASSIFICATION; BOTNET;
D O I
10.3390/app9204396
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Networks play important roles in modern life, and cyber security has become a vital research area. An intrusion detection system (IDS) which is an important cyber security technique, monitors the state of software and hardware running in the network. Despite decades of development, existing IDSs still face challenges in improving the detection accuracy, reducing the false alarm rate and detecting unknown attacks. To solve the above problems, many researchers have focused on developing IDSs that capitalize on machine learning methods. Machine learning methods can automatically discover the essential differences between normal data and abnormal data with high accuracy. In addition, machine learning methods have strong generalizability, so they are also able to detect unknown attacks. Deep learning is a branch of machine learning, whose performance is remarkable and has become a research hotspot. This survey proposes a taxonomy of IDS that takes data objects as the main dimension to classify and summarize machine learning-based and deep learning-based IDS literature. We believe that this type of taxonomy framework is fit for cyber security researchers. The survey first clarifies the concept and taxonomy of IDSs. Then, the machine learning algorithms frequently used in IDSs, metrics, and benchmark datasets are introduced. Next, combined with the representative literature, we take the proposed taxonomic system as a baseline and explain how to solve key IDS issues with machine learning and deep learning techniques. Finally, challenges and future developments are discussed by reviewing recent representative studies.
引用
收藏
页数:28
相关论文
共 93 条
[21]  
[Anonymous], 2019, ARXIV190107949
[22]  
[Anonymous], P 2017 IEEE 4 INT C
[23]  
Bapat Rohan, 2018, 2018 Systems and Information Engineering Design Symposium (SIEDS), P266, DOI 10.1109/SIEDS.2018.8374749
[24]   Intrusion Detection in Enterprise Systems by Combining and Clustering Diverse Monitor Data [J].
Bohara, Atul ;
Thakore, Uttam ;
Sanders, William H. .
SYMPOSIUM AND BOOTCAMP ON THE SCIENCE OF SECURITY, 2016, :7-16
[25]   Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks [J].
Bontemps, Loic ;
Van Loi Cao ;
McDermott, James ;
Nhien-An Le-Khac .
FUTURE DATA AND SECURITY ENGINEERING, FDSE 2016, 2016, 10018 :141-152
[26]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[27]  
Chung J, 2014, Em-
[28]   Sparse Autoencoder-based Feature Transfer Learning for Speech Emotion Recognition [J].
Deng, Jun ;
Zhang, Zixing ;
Marchi, Erik ;
Schuller, Bjoern .
2013 HUMAINE ASSOCIATION CONFERENCE ON AFFECTIVE COMPUTING AND INTELLIGENT INTERACTION (ACII), 2013, :511-516
[29]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[30]   Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications [J].
Diro, Abebe ;
Chilamkurti, Naveen .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (09) :124-130