4.6 Article

Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges

Journal

SOFT COMPUTING
Volume 25, Issue 15, Pages 9731-9763

Publisher

SPRINGER
DOI: 10.1007/s00500-021-05893-0

Keywords

Intrusion detection system; Deep learning; Deep belief network; Recurrent neural network; Network intrusion detection system

Ask authors/readers for more resources

The paper provides a comprehensive overview of the applications and research status of machine learning methods and deep learning methods in intrusion detection. It discusses their performance, advantages, and experimental results. Moreover, it also explores the current research challenges and issues in the field, aiming to assist fellow researchers in the area.
Deep learning (DL) is gaining significant prevalence in every field of study due to its domination in training large data sets. However, several applications are utilizing machine learning (ML) methods from the past several years and reported good performance. However, their limitations in terms of data complexity give rise to DL methods. Intrusion detection is one of the prominent areas in which researchers are extending DL methods. Even though several excellent surveys cover the growing body of research on this subject, the literature lacks a detailed comparison of ML methods such as ANN, SVM, fuzzy approach, swarm intelligence and evolutionary computation methods in intrusion detection, particularly on recent research. In this context, the present paper deals with the systematic review of ML methods and DL methods in intrusion detection. In addition to reviewing ML and DL methods, this paper also focuses on benchmark datasets, performance evaluation measures and various applications of DL methods for intrusion detection. The present paper summarizes the recent work, compares their experimental results for detecting network intrusions. Furthermore, current research challenges are identified for helping fellow researchers in the era of DL-based intrusion detection.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available