4.7 Review

Intrusion detection based on Machine Learning techniques in computer networks

Journal

INTERNET OF THINGS
Volume 16, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.iot.2021.100462

Keywords

Network security; Computer security; Cybersecurity; Intrusion detection; Intrusion prevention; Machine learning

Ask authors/readers for more resources

Intrusions in computer networks have been on the rise in the past decade, leading researchers to propose signature-based and anomaly-based intrusion detection methods, with Machine Learning techniques playing a key role. This paper provides a comprehensive critical survey of ML-based intrusion detection approaches in the literature over the last ten years, highlighting some open issues for future research.
Intrusions in computer networks have increased significantly in the last decade, due in part to a profitable underground cyber-crime economy and the availability of sophisticated tools for launching such intrusions. Researchers in industry and academia have been proposing methods and building systems for detecting and preventing such security breaches for more than four decades. Solutions proposed for dealing with network intrusions can be broadly classified as signature-based and anomaly-based. Signature-based intrusion detection systems look for patterns that match known attacks. On the other hand, anomaly-based intrusion detection systems develop a model for distinguishing legitimate users' behavior from that of malicious users' and hence are capable of detecting unknown attacks. One of the approaches used to classify legitimate and anomalous behavior is to use Machine Learning (ML) techniques. Several intrusion detection systems based on ML techniques have been proposed in the literature. In this paper, we present a comprehensive critical survey of ML-based intrusion detection approaches presented in the literature in the last ten years. This survey would serve as a supplement to other general surveys on intrusion detection as well as a reference to recent work done in the area for researchers working in ML-based intrusion detection systems. We also discuss some open issues that need to be addressed.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available