DOI QR코드

DOI QR Code

Role of Machine Learning in Intrusion Detection System: A Systematic Review

  • Alhasani, Areej (College of Computer and Information Technology, University of Tabuk) ;
  • Al omrani, Faten (College of Computer and Information Technology, University of Tabuk) ;
  • Alzahrani, Taghreed (College of Computer and Information Technology, University of Tabuk) ;
  • alFahhad, Rehab (College of Computer and Information Technology, University of Tabuk) ;
  • Alotaibi, Mohamed (College of Computer and Information Technology, University of Tabuk)
  • 투고 : 2022.03.05
  • 발행 : 2022.03.30

초록

Over the last 10 years, there has been rapid growth in the use of Machine Learning (ML) techniques to automate the process of intrusion threat detection at a scale never imagined before. This has prompted researchers, software engineers, and network specialists to rethink the applications of machine ML techniques particularly in the area of cybersecurity. As a result there exists numerous research documentations on the use ML techniques to detect and block cyber-attacks. This article is a systematic review involving the identification of published scholarly articles as found on IEEE Explore and Scopus databases. The articles exclusively related to the use of machine learning in Intrusion Detection Systems (IDS). Methods, concepts, results, and conclusions as found in the texts are analyzed. A description on the process taken in the identification of the research articles included: First, an introduction to the topic which is followed by a methodology section. A table is used to list identified research articles in the form of title, authors, methodology, and key findings.

키워드

과제정보

We thank the University of Tabuk for providing research support and facilities. We would like to thank all the reference authors of whom their input made this article a reality.

참고문헌

  1. M. Wu and Y. B. Moon, "Intrusion Detection System for Cyber Manufacturing System," J. Manuf. Sci. Eng., vol. 141, no. 3, p. 031007, Jan. 2019. https://doi.org/10.1115/1.4042053
  2. Hoque MS, Mukit M, Bikas M, Naser A," An implementation of intrusion detection system using genetic algorithm;" 2012. arXiv preprint arXiv:1204.1336.
  3. Prasad R, Rohokale V. "Artificial intelligence and machine learning in cyber security. Cyber Security: The Lifeline of Information and Communication Technology". New York, NY: Springer; 2020:231-247.
  4. Najafabadi MM, Villanustre F, Khoshgoftaar TM, Seliya N, Wald R, Muharemagic E. Deep learning applications and challenges in big data analytics. J Big Data. 2015;2(1):1. https://doi.org/10.1186/s40537-014-0007-7.
  5. Amouri, Amar, Vishwa T. Alaparthy, and Salvatore D. Morgera. "A machine learning based intrusion detection system for mobile Internet of Things." Sensors 20, no. 2 pp 461, 2020. https://doi.org/10.3390/s20020461
  6. Alrowaily, Mohammed, Freeh Alenezi, and Zhuo Lu. "Effectiveness of machine learning based intrusion detection systems." In International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 277-288. Springer, Cham, 2019.
  7. Alqahtani, Hamed, Iqbal H. Sarker, Asra Kalim, Syed Md Minhaz Hossain, Sheikh Ikhlaq, and Sohrab Hossain. "Cyber Intrusion Detection Using Machine Learning Classification Techniques." In International Conference on Computing Science, Communication and Security, pp. 121-131. Springer, Singapore, 2020.
  8. Belouch, Mustapha, Salah El Hadaj, and Mohamed Idhammad. "Performance evaluation of intrusion detection based on machine learning using Apache Spark." Procedia Computer Science 127, pp 1-6, 2019. https://doi.org/10.1016/j.procs.2018.01.091
  9. Biswas, Saroj Kr. "Intrusion detection using machine learning: A comparison study." International Journal of pure and applied mathematics 118, no. 19, pp 101-114, 2019.
  10. Cavusoglu, unal. "A new hybrid approach for intrusion detection using machine learning methods." Applied Intelligence 49, no. 7, pp 2735-2761, 2019. https://doi.org/10.1007/s10489-018-01408-x
  11. Ever, Yoney Kirsal, Boran Sekeroglu, and Kamil Dimililer. "Classification analysis of intrusion detection on NSL-KDD using machine learning algorithms." In International Conference on Mobile Web and Intelligent Information Systems, pp. 111-122. Springer, Cham, 2019.
  12. Liu, Hongyu, and Bo Lang. "Machine learning and deep learning methods for intrusion detection systems: A survey." applied sciences 9, no. 20, pp 4396, 2019. https://doi.org/10.3390/app9204396
  13. Kilincer, Ilhan Firat, Fatih Ertam, and Abdulkadir Sengur. "Machine learning methods for cyber security intrusion detection: Datasets and comparative study." Computer Networks 1,pp 188-198, 2021.
  14. Kumar, Gulshan, Kutub Thakur, and Maruthi Rohit Ayyagari. "MLEsIDSs: machine learning-based ensembles for intrusion detection systems-a review." The Journal of Supercomputing, pp 1-34, 2020.
  15. Magan-Carrion, Roberto, Daniel Urda, Ignacio Diaz-Cano, and Bernabe Dorronsoro. "Towards a reliable comparison and evaluation of network intrusion detection systems based on machine learning approaches." Applied Sciences 10, no. 5, pp 1775, 2020. https://doi.org/10.3390/app10051775
  16. Maseer, Ziadoon Kamil, Robiah Yusof, Nazrulazhar Bahaman, Salama A. Mostafa, and Cik Feresa Mohd Foozy. "Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset." IEEE Access 9, pp 50-70, 2021.
  17. Mishrati, Vijay Varadharajan, Uday Tupakula, and Emmanuel S. Pilli. "A detailed investigation and analysis of using machine learning techniques for intrusion detection." IEEE Communications Surveys & Tutorials 21, no. 1, pp 686-728, 2019. https://doi.org/10.1109/COMST.2018.2847722
  18. Othman, Suad Mohammed, Fadl Mutaher Ba-Alwi, Nabeel T. Alsohybe, and Amal Y. Al-Hashida. "Intrusion detection model using machine learning algorithm on Big Data environment." Journal of Big Data 5, no. 1, pp 1-12, 2019.
  19. Pawlicki, Marek, Michal Choras, and Rafal Kozik. "Defending network intrusion detection systems against adversarial evasion attacks." Future Generation Computer Systems 110, pp 148-154, 2020. https://doi.org/10.1016/j.future.2020.04.013
  20. Thakur, Soumyadeep, Anuran Chakraborty, Rajonya De, Neeraj Kumar, and Ram Sarkar. "Intrusion detection in cyber-physical systems using a generic and domain specific deep autoencoder model." Computers & Electrical Engineering 91, pp 44, 2021.
  21. Shah, Syed Ali Raza, and Biju Issac. "Performance comparison of intrusion detection systems and application of machine learning to Snort system." Future Generation Computer Systems 80, pp 157-170, 2019. https://doi.org/10.1016/j.future.2017.10.016
  22. Sultana, Nasrin, Naveen Chilamkurti, Wei Peng, and Rabei Alhadad. "Survey on SDN based network intrusion detection system using machine learning approaches." Peer-to-Peer Networking and Applications 12, no. 2, pp 493-501, 2019. https://doi.org/10.1007/s12083-017-0630-0
  23. Verma, Abhishek, and Virender Ranga. "Machine learning based intrusion detection systems for IoT applications." Wireless Personal Communications 111, no. 4, pp 2287-2310, 2020. https://doi.org/10.1007/s11277-019-06986-8
  24. Vimala, S., V. Khanaa, and C. Nalini. "A study on supervised machine learning algorithm to improvise intrusion detection systems for mobile ad hoc networks." Cluster Computing 22, no. 2, pp 4065-4074, 2019. https://doi.org/10.1007/s10586-018-2686-x
  25. Wang, Yu, Weizhi Meng, Enjoin Li, Zhe Liu, Yang Liu, and Hanxiao Xue. "Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems." Concurrency and Computation: Practice and Experience 31, no. 19, e5101, 2019. https://doi.org/10.1002/cpe.5101
  26. Wang, Maonan, Kangfeng Zheng, Yanqing Yang, and Xiujuan Wang. "An explainable machine learning framework for intrusion detection systems." IEEE Access 8, pp 27-42, 2020.