Research Connect
Research PapersAboutContact

Network intrusion detection system: A systematic study of machine learning and deep learning approaches

Published in Transactions on Emerging Telecommu... (2020-10-16)
aionlincourseaionlincourseaionlincourseaionlincourseaionlincourse
Generate GraphDownload

On This Page

  • TL;DR
  • Abstract
  • Authors
  • Datasets
  • References
TL

TL;DR

The concept of IDS is clarified and the taxonomy based on the notable ML and DL techniques adopted in designing network‐based IDS (NIDS) systems is provided, which highlights various research challenges and provided the future scope for the research in improving ML andDL‐based NIDS.

Abstract

The rapid advances in the internet and communication fields have resulted in a huge increase in the network size and the corresponding data. As a result, many novel attacks are being generated and have posed challenges for network security to accurately detect intrusions. Furthermore, the presence of the intruders with the aim to launch various attacks within the network cannot be ignored. An intrusion detection system (IDS) is one such tool that prevents the network from possible intrusions by inspecting the network traffic, to ensure its confidentiality, integrity, and availability. Despite enormous efforts by the researchers, IDS still faces challenges in improving detection accuracy while reducing false alarm rates and in detecting novel intrusions. Recently, machine learning (ML) and deep learning (DL)‐based IDS systems are being deployed as potential solutions to detect intrusions across the network in an efficient manner. This article first clarifies the concept of IDS and then provides the taxonomy based on the notable ML and DL techniques adopted in designing network‐based IDS (NIDS) systems. A comprehensive review of the recent NIDS‐based articles is provided by discussing the strengths and limitations of the proposed solutions. Then, recent trends and advancements of ML and DL‐based NIDS are provided in terms of the proposed methodology, evaluation metrics, and dataset selection. Using the shortcomings of the proposed methods, we highlighted various research challenges and provided the future scope for the research in improving ML and DL‐based NIDS.

Authors

Zeeshan Ahmad

1 Paper

A. Khan

1 Paper

W. Cheah

1 Paper

References150 items

1

Machine Learning and Deep Learning Methods for Cybersecurity

2

UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)

3

A detailed analysis of the KDD CUP 99 data set

4

An Optimization Method for Intrusion Detection Classification Model Based on Deep Belief Network

5

A Practical Guide to Training Restricted Boltzmann Machines

Research Impact

620

Citations

150

References

0

Datasets

5

J. Abdullah

1 Paper

Farhan Ahmad

1 Paper

6

Deep learning applications and challenges in big data analytics

7

A Fast Learning Algorithm for Deep Belief Nets

8

Deep Learning

9

Long Short-Term Memory

10

SMOTE: Synthetic Minority Over-sampling Technique

11

Learning

12

Extreme learning machine: Theory and applications

13

Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey

14

Deep Learning Approach for Intelligent Intrusion Detection System

15

A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

16

Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization

17

Explaining and Harnessing Adversarial Examples

18

Internet of Things: A survey on machine learning-based intrusion detection approaches

19

A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks

20

A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

21

Improving deep neural networks for LVCSR using rectified linear units and dropout

22

An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks

23

Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems

24

Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection

25

An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units

26

Deep Learning-Based Intrusion Detection With Adversaries

27

A deep auto-encoder based approach for intrusion detection system

28

A Deep Learning Approach to Network Intrusion Detection

29

Taxonomy and Survey of Collaborative Intrusion Detection

30

Distributed Abnormal Behavior Detection Approach Based on Deep Belief Network and Ensemble SVM Using Spark

31

Performing systematic literature reviews in software engineering

32

Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling

33

Enhanced Network Anomaly Detection Based on Deep Neural Networks

34

Toward an Online Anomaly Intrusion Detection System Based on Deep Learning

35

Speech recognition with deep recurrent neural networks

36

The Limitations of Deep Learning in Adversarial Settings

Computer ScienceMathematics
37

Towards Deep Neural Network Architectures Robust to Adversarial Examples

38

Analysis of security and energy efficiency for shortest route discovery in low‐energy adaptive clustering hierarchy protocol using Levenberg‐Marquardt neural network and gated recurrent unit for intrusion detection system

39

Simulation of watchdog placement for cooperative anomaly detection in Bluetooth Mesh Intrusion Detection System

40

Analysis of anomaly detection method for Internet of things based on deep learning

41

MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles

42

Multi-Channel Deep Feature Learning for Intrusion Detection

43

An Intrusion Detection Method Using Few-Shot Learning

44

DL-IDS: a deep learning-based intrusion detection framework for securing IoT

45

A Game-Theoretic Approach for Enhancing Security and Data Trustworthiness in IoT Applications

46

An Energy-Efficient and Secure Routing Protocol for Intrusion Avoidance in IoT-Based WSN

47

Cyber Security: The Lifeline of Information and Communication Technology

48

Employing Game Theory and TDMA Protocol to Enhance Security and Manage Power Consumption in WSNs-Based Cognitive Radio

49

Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure

50

A Multiple-Layer Representation Learning Model for Network-Based Attack Detection

51

Survey of intrusion detection systems: techniques, datasets and challenges

52

Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification Over Encrypted Wi-Fi Traffic

53

The Rising Role of Big Data Analytics and IoT in Disaster Management: Recent Advances, Taxonomy and Prospects

54

MSML: A Novel Multilevel Semi-Supervised Machine Learning Framework for Intrusion Detection System

55

Blockchain in Internet-of-Things: Architecture, Applications and Research Directions

56

Developing a Network Attack Detection System Using Deep Learning

57

Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection

58

Performance Analysis of ANN and Naive Bayes Classification Algorithm for Data Classification

59

PiNcH: An effective, efficient, and robust solution to drone detection via network traffic analysis

60

Network intrusion detection algorithm based on deep neural network

61

A novel ensemble method for k-nearest neighbor

62

Analyzing Machine Learning Workloads Using a Detailed GPU Simulator

63

A Survey of Intrusion Detection Models based on NSL-KDD Data Set

64

Evolving Artificial Neural Networks Using Opposition Based Particle Swarm Optimization Neural Network for Data Classification

65

Enhanced transductive support vector machine classification with grey wolf optimizer cuckoo search optimization for intrusion detection system

66

Machine Learning Algorithms for Network Intrusion Detection

67

Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling

68

Effective Intrusion Detection System Using XGBoost

69

An intrusion detection system based on combining probability predictions of a tree of classifiers

70

Deep Learning Method for Denial of Service Attack Detection Based on Restricted Boltzmann Machine

71

An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection

72

A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization

73

An Empirical Evaluation of Deep Learning for Network Anomaly Detection

74

Support Vector Machine for Network Intrusion and Cyber-Attack Detection

75

Internet-of-Things-Based Smart Cities: Recent Advances and Challenges

76

Using repeated game for maximizing high priority data trustworthiness in Wireless Sensor Networks

77

An effective Stackelberg game for high-assurance of data trustworthiness in WSNs

78

Human Activity Recognition Using Recurrent Neural Networks

79

Multidimensional Intrusion Detection System for IEC 61850-Based SCADA Networks

80

A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things

81

A two-level hybrid approach for intrusion detection

82

Towards Evaluating the Robustness of Neural Networks

83

Comparison deep learning method to traditional methods using for network intrusion detection

84

An improved method to construct basic probability assignment based on the confusion matrix for classification problem

85

A Preliminary Performance Evaluation of K-means, KNN and EM Unsupervised Machine Learning Methods for Network Flow Classification

86

The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set

87

Anomaly detection in network traffic using K-mean clustering

88

An intrusion detection system using network traffic profiling and online sequential extreme learning machine

89

DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks

90

Using Recurrent Neural Networks for Slot Filling in Spoken Language Understanding

91

Importance of Cyber Security

92

K-Nearest-Neighbours with a novel similarity measure for intrusion detection

93

Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection

94

Fast learning network: a novel artificial neural network with a fast learning speed

95

Signature-based Multi-Layer Distributed Intrusion Detection System using Mobile Agents

96

Intrusion detection using reduced-size RNN based on feature grouping

97

An Implementation of Intrusion Detection System Using Genetic Algorithm

98

An enhanced extreme learning machine based on ridge regression for regression

99

Handwriting prediction based character recognition using recurrent neural network

100

Anomaly Intrusion Detection Method Based on K-Means Clustering Algorithm with Particle Swarm Optimization

101

Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation

102

A Survey of Game Theory in Wireless Sensor Networks Security

103

MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking

104

Evaluating the Usefulness of Watchdogs for Intrusion Detection in VANETs

105

Analysis of Particle Swarm Optimization Algorithm

106

Anomaly detection: A survey

107

Anomaly-based network intrusion detection: Techniques, systems and challenges

108

Event-based Trust Framework Model in Wireless Sensor Networks

109

Unsupervised learning algorithms for intrusion detection

110

Self-taught learning: transfer learning from unlabeled data

111

An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection

112

Applying intrusion detection systems to wireless sensor networks

113

Application of SVM and ANN for intrusion detection

114

Intrusion Detection Techniques for Mobile Wireless Networks

115

Intrusion detection using neural networks and support vector machines

116

Comparing local search with respect to genetic evolution to detect intrusions in computer networks

117

Towards a taxonomy of intrusion-detection systems

118

A survey of intrusion detection techniques

119

An Intrusion-Detection Model

120

Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization

121

Increasing the Performance of Machine Learning-Based IDSs on an Imbalanced and Up-to-Date Dataset

122

Supervised and Unsupervised Learning for Data Science

123

Network Intrusion Detection Combined Hybrid Sampling With Deep Hierarchical Network

124

Network intrusion detection system: A systematic study of machine learning and deep learning approaches

125

Scopus Preview Welcome to Scopus

126

Artificial Intelligence and Machine Learning in Cyber Security

127

Multi Features and Multi-time steps LSTM Based Methodology for Bike Sharing Availability Prediction

128

An Adaptive Ensemble Machine Learning Model for Intrusion Detection

129

Generalizing from a few examples: a survey on few-shot

130

Effective Feature Extraction via Stacked Sparse Autoencoder to Improve Intrusion Detection System

131

Classification of Intrusion Detection Using Data Mining Techniques

132

Scalable Framework for Cyber Threat Situational Awareness Based on Domain Name Systems Data Analysis

133

Wireless Sensor Networks for the Internet of Things: Barriers and Synergies

134

Importance of Cyber Security

135

Characterization of Tor Traffic using Time based Features

136

Components and Services for IoT Platforms

137

A survey on comparative analysis of decision tree algorithms in data mining

138

Random Forest Modeling for Network Intrusion Detection System

139

Decision Tree Based Algorithm for Intrusion Detection

140

An Implementation Of Intrusion Detection System Using Genetic Algorithm Pdf

141

Proceedings of the 2013 International Joint Conference on Neural Networks

142

Research on Intrusion Detection and Response: A Survey

143

The Vision of Autonomic Computing

144

Intrusion Detection: Techniques and Approaches

145

Intrusion Detection Systems: A Survey and Taxonomy

146

Proceedings Of The 2000 Congress On Evolutionary Computation

147

The UCI KDD Archive

148

An Introduction To Neural Networks

149

Face recognition: a convolutional neural-network approach

150

Computer Security Threat Monitoring and Surveillance

Authors

Field of Study

Computer Science

Journal Information

Name

Transactions on Emerging Telecommunications Technologies

Volume

32

Venue Information

Name

Transactions on Emerging Telecommunications Technologies

Type

journal

URL

http://www3.interscience.wiley.com/cgi-bin/jhome/104087069

Alternate Names

  • European Transactions on Telecommunications
  • Eur Trans Telecommun
  • TETT
  • Trans Emerg Telecommun Technol