4.7 Review

A Review on Challenges and Future Research Directions for Machine Learning-Based Intrusion Detection System

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey

Ke He et al.

Summary: Network-based Intrusion Detection System (NIDS) is vital for defending against network attacks, but it is susceptible to adversarial attacks that manipulate input examples. This article reviews the literature on NIDS, adversarial attacks, and defence mechanisms, highlighting the challenges in launching and detecting adversarial attacks against NIDS.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2023)

Article Computer Science, Artificial Intelligence

Fusion of statistical importance for feature selection in Deep Neural Network-based Intrusion Detection System

Ankit Thakkar et al.

Summary: This study aims to design a Deep Neural Network-based Intrusion Detection System (IDS) and enhance its performance by proposing a novel feature selection technique. The technique selects features based on the fusion of statistical importance and is evaluated using multiple evaluation metrics and datasets.

INFORMATION FUSION (2023)

Article Computer Science, Theory & Methods

Open-world Machine Learning: Applications, Challenges, and Opportunities

Jitendra Parmar et al.

Summary: Traditional machine learning assumes closed-world learning, where unseen classes are not identified. Open-world Machine Learning (OWML) is a novel technique that deals with unseen classes. This article provides a comprehensive understanding of OWML, including its characteristics, applications, impact, taxonomy, available software packages, open datasets, research gaps, challenges, and future directions.

ACM COMPUTING SURVEYS (2023)

Article Computer Science, Information Systems

Attack Classification of Imbalanced Intrusion Data for IoT Network Using Ensemble-Learning-Based Deep Neural Network

Ankit Thakkar et al.

Summary: With the popularity of IoT and interconnected devices, there is a need to establish effective security mechanisms to handle vulnerabilities and risks. This article proposes an ensemble learning approach for intrusion detection, using a deep neural network as a base estimator and addressing the issue of class imbalance in the intrusion detection data sets. The performance of the proposed approach is evaluated using four intrusion detection data sets, and the results are statistically tested.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations

Muhammad Azmi Umer et al.

Summary: This survey focuses on the application of machine learning in secure Industrial Control Systems, specifically in intrusion and anomaly detection. By comparing and analyzing four types of machine learning methods, the challenges associated with using these methods are identified, and recommendations are made.

INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION (2022)

Article Computer Science, Artificial Intelligence

A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions

Ankit Thakkar et al.

Summary: This paper surveys the current research status of intrusion detection systems (IDS) field, including the application of machine learning, deep learning, and evolutionary algorithms in IDS. The study focuses on the impact of feature selection on performance evaluation and compares and analyzes different IDS datasets.

ARTIFICIAL INTELLIGENCE REVIEW (2022)

Review Computer Science, Interdisciplinary Applications

A Comprehensive Survey on Portfolio Optimization, Stock Price and Trend Prediction Using Particle Swarm Optimization

Ankit Thakkar et al.

Summary: This article discusses the analysis and prediction of stock market data, as well as the advantages and limitations of using PSO algorithm for stock market prediction, researching future research directions.

ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING (2021)

Article Computer Science, Artificial Intelligence

Attack classification using feature selection techniques: a comparative study

Ankit Thakkar et al.

Summary: The main goal of network security is to protect information flow and sensitive data, with Intrusion Detection System (IDS) being a common security mechanism. Our research focuses on the impact of feature selection techniques on IDS performance, utilizing a variety of machine learning techniques for experimentation.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Review Computer Science, Interdisciplinary Applications

A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges

Ankit Thakkar et al.

Summary: The Internet of Things (IoT) technology is widely accepted in various applications such as smart homes, smart cities, and healthcare, but also raises security concerns. Researchers have proposed numerous security solutions, including intrusion detection systems, to address security issues in IoT networks.

ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING (2021)

Article Computer Science, Artificial Intelligence

A survey on video-based Human Action Recognition: recent updates, datasets, challenges, and applications

Preksha Pareek et al.

Summary: This paper discusses various machine learning and deep learning techniques used for Human Action Recognition (HAR) from 2011 to 2019, investigates the characteristics of public datasets, and introduces various action recognition techniques and their applications.

ARTIFICIAL INTELLIGENCE REVIEW (2021)

Article Computer Science, Artificial Intelligence

Fusion in stock market prediction: A decade survey on the necessity, recent developments, and potential future directions

Ankit Thakkar et al.

Summary: Investing in financial markets aims to gain higher benefits, but predicting market dynamics is challenging due to the complex nature of the market. Fusion techniques can integrate data and characteristics to enhance prediction accuracy in stock market applications. Major applications include stock price prediction, risk analysis, index prediction, and portfolio management.

INFORMATION FUSION (2021)

Article Computer Science, Artificial Intelligence

Adversarial machine learning in Network Intrusion Detection Systems

Elie Alhajjar et al.

Summary: This paper investigates the adversarial problem in Network Intrusion Detection Systems (NIDS), exploring techniques for generating adversarial examples and evading machine learning models, using evolutionary computation and deep learning as tools. The results demonstrate high misclassification rates in multiple machine learning models and a voting classifier, highlighting the vulnerability of machine learning-based NIDS to adversarial perturbations.

EXPERT SYSTEMS WITH APPLICATIONS (2021)

Article Computer Science, Artificial Intelligence

Analyzing fusion of regularization techniques in the deep learning-based intrusion detection system

Ankit Thakkar et al.

Summary: This paper examines the fusion of various regularization techniques with dropout regularization for analyzing and enhancing the performance of DNN-based IDS. The experimental results demonstrate that the fusion of dropout with other regularization techniques outperforms individual L1, L2, and elastic net regularization techniques.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)

Article Computer Science, Information Systems

Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection

Mohammad Noor Injadat et al.

Summary: The paper introduces an optimized machine learning-based network intrusion detection system, which improves performance through comparison of different techniques and hyper-parameter optimization. Experimental results show that the model significantly reduces training sample and feature set size, achieving detection accuracies over 99%.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)

Review Computer Science, Information Systems

Application Domains, Evaluation Data Sets, and Research Challenges of IoT: A Systematic Review

Ritika Lohiya et al.

Summary: IoT is evolving towards the Internet of Everything, encompassing wireless networks, sensors, cloud servers, smart devices, and advanced technologies. Its applications span various sectors such as transportation, healthcare, and agriculture. Challenges in IoT research and commercial solutions developed in IoT application domains are highlighted in this article.

IEEE INTERNET OF THINGS JOURNAL (2021)

Proceedings Paper Computer Science, Theory & Methods

Intrusion Detection Using Deep Neural Network with AntiRectifier Layer

Ritika Lohiya et al.

Summary: Data security is a critical challenge in the fast-growing internet world, and IDS based on DNN outperforms traditional ML techniques. The use of AntiRectifier layer and dropout variants helps address the challenges in DNN technology.

APPLIED SOFT COMPUTING AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Artificial Intelligence

Application of deep reinforcement learning to intrusion detection for supervised problems

Manuel Lopez-Martin et al.

EXPERT SYSTEMS WITH APPLICATIONS (2020)

Article Chemistry, Multidisciplinary

A New Method of Fuzzy Support Vector Machine Algorithm for Intrusion Detection

Wei Liu et al.

APPLIED SCIENCES-BASEL (2020)

Article Computer Science, Artificial Intelligence

Role of swarm and evolutionary algorithms for intrusion detection system: A survey

Ankit Thakkar et al.

SWARM AND EVOLUTIONARY COMPUTATION (2020)

Article Computer Science, Information Systems

Unsupervised feature selection and cluster center initialization based arbitrary shaped clusters for intrusion detection

Mahendra Prasad et al.

COMPUTERS & SECURITY (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Performance Analysis of Single- and Ensemble-Based Classifiers for Intrusion Detection

R. Hariharan et al.

SOFT COMPUTING FOR PROBLEM SOLVING, SOCPROS 2018, VOL 2 (2020)

Proceedings Paper Computer Science, Artificial Intelligence

CREST: Cross-Reference to Exchange-based Stock Trend Prediction using Long Short-Term Memory

Ankit Thakkar et al.

INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE (2020)

Proceedings Paper Computer Science, Artificial Intelligence

A Review of the Advancement in Intrusion Detection Datasets

Ankit Thakkar et al.

INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE (2020)

Article Telecommunications

Hybrid Anomaly Detection by Using Clustering for Wireless Sensor Network

Bilal Ahmad et al.

WIRELESS PERSONAL COMMUNICATIONS (2019)

Article Computer Science, Information Systems

MSML: A Novel Multilevel Semi-Supervised Machine Learning Framework for Intrusion Detection System

Haipeng Yao et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection

Fadi Salo et al.

COMPUTER NETWORKS (2019)

Proceedings Paper Computer Science, Information Systems

Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks

Olakunle Ibitoye et al.

2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) (2019)

Article Computer Science, Information Systems

Network Intrusion Detection for IoT Security Based on Learning Techniques

Nadia Chaabouni et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Artificial Intelligence

A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers

Ahmed I. Saleh et al.

ARTIFICIAL INTELLIGENCE REVIEW (2019)

Article Computer Science, Information Systems

An Adaptive Ensemble Machine Learning Model for Intrusion Detection

Xianwei Gao et al.

IEEE ACCESS (2019)

Article Computer Science, Theory & Methods

A Survey of Random Forest Based Methods for Intrusion Detection Systems

Paulo Angelo Alves Resende et al.

ACM COMPUTING SURVEYS (2018)

Article Mathematics, Interdisciplinary Applications

Nearest neighbors based density peaks approach to intrusion detection

Lixiang Li et al.

CHAOS SOLITONS & FRACTALS (2018)

Article Computer Science, Information Systems

Abstracting massive data for lightweight intrusion detection in computer networks

Wei Wang et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Artificial Intelligence

SMOTE for Learning from Imbalanced Data: Progress and Challenges, Marking the 15-year Anniversary

Alberto Fernandez et al.

JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH (2018)

Article Computer Science, Information Systems

Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment

Kai Peng et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2018)

Article Computer Science, Interdisciplinary Applications

Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model

Shadi Aljawarneh et al.

JOURNAL OF COMPUTATIONAL SCIENCE (2018)

Article Computer Science, Artificial Intelligence

Real-time feature selection technique with concept drift detection using adaptive micro-clusters for data stream mining

Mahmood Shakir Hammoodi et al.

KNOWLEDGE-BASED SYSTEMS (2018)

Proceedings Paper Computer Science, Theory & Methods

Intrusion detection in network systems through hybrid supervised and unsupervised machine learning process: a case study on the ISCX dataset

Saeid Soheily-Khah et al.

2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018) (2018)

Article Computer Science, Theory & Methods

Intrusion detection model using machine learning algorithm on Big Data environment

Suad Mohammed Othman et al.

JOURNAL OF BIG DATA (2018)

Proceedings Paper Computer Science, Artificial Intelligence

A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data

Abien Fred M. Agarap

PROCEEDINGS OF 2018 10TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (ICMLC 2018) (2018)

Article Computer Science, Artificial Intelligence

Comparison of classification techniques applied for network intrusion detection and classification

Amira Sayed A. Aziz et al.

JOURNAL OF APPLIED LOGIC (2017)

Article Computer Science, Artificial Intelligence

An efficient instance selection algorithm for k nearest neighbor regression

Yunsheng Song et al.

NEUROCOMPUTING (2017)

Proceedings Paper Computer Science, Theory & Methods

Network intrusion detection based on random forest and support vector machine

Yaping Chang et al.

2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1 (2017)

Article Computer Science, Artificial Intelligence

Characterizing concept drift

Geoffrey I. Webb et al.

DATA MINING AND KNOWLEDGE DISCOVERY (2016)

Article Computer Science, Theory & Methods

Secure searching on cloud storage enhanced by homomorphic indexing

Shu Qin Ren et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Computer Science, Information Systems

A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

Anna L. Buczak et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Theory & Methods

Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks

Mengyuan Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Proceedings Paper Computer Science, Artificial Intelligence

K-Nearest Neighbor and Boundary Cutting Algorithm for Intrusion Detection System

Punam Mulak et al.

INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 2, INDIA 2016 (2016)

Proceedings Paper Computer Science, Information Systems

Toward Large-Scale Vulnerability Discovery using Machine Learning

Gustavo Grieco et al.

CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (2016)

Proceedings Paper Computer Science, Artificial Intelligence

Random Forest Modeling for Network Intrusion Detection System

Nabila Farnaaz et al.

TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016 (2016)

Proceedings Paper Computer Science, Artificial Intelligence

Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection

Manjula C. Belavagi et al.

TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016 (2016)

Proceedings Paper Computer Science, Artificial Intelligence

Intrusion Detection Model Using Chi Square Feature Selection and Modified Naive Bayes Classifier

I. Sumaiya Thaseen et al.

PROCEEDINGS OF THE 3RD INTERNATIONAL SYMPOSIUM ON BIG DATA AND CLOUD COMPUTING CHALLENGES (ISBCC - 16') (2016)

Article Automation & Control Systems

Distributed response to network intrusions using multiagent reinforcement learning

Kleanthis Malialis et al.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2015)

Proceedings Paper Computer Science, Theory & Methods

Analysis of KDD Dataset Attributes - Class wise For Intrusion Detection

Preeti Aggarwal et al.

3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015) (2015)

Proceedings Paper Computer Science, Artificial Intelligence

Survey on Anomaly Detection using Data Mining Techniques

Shikha Agrawal et al.

KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015 (2015)

Article Computer Science, Artificial Intelligence

A novel hybrid intrusion detection method integrating anomaly detection with misuse detection

Gisung Kim et al.

EXPERT SYSTEMS WITH APPLICATIONS (2014)

Article Engineering, Electrical & Electronic

Deep Learning: Methods and Applications

Li Deng et al.

FOUNDATIONS AND TRENDS IN SIGNAL PROCESSING (2013)

Article Computer Science, Artificial Intelligence

Andromaly: a behavioral malware detection framework for android devices

Asaf Shabtai et al.

JOURNAL OF INTELLIGENT INFORMATION SYSTEMS (2012)

Article Computer Science, Information Systems

Practical real-time intrusion detection using machine learning approaches

Phurivit Sangkatsanee et al.

COMPUTER COMMUNICATIONS (2011)

Article Computer Science, Information Systems

A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm

Gina C. Tjhai et al.

COMPUTERS & SECURITY (2010)