4.7 Review

Intrusion detection based on Machine Learning techniques in computer networks

期刊

INTERNET OF THINGS
卷 16, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.iot.2021.100462

关键词

Network security; Computer security; Cybersecurity; Intrusion detection; Intrusion prevention; Machine learning

向作者/读者索取更多资源

Intrusions in computer networks have been on the rise in the past decade, leading researchers to propose signature-based and anomaly-based intrusion detection methods, with Machine Learning techniques playing a key role. This paper provides a comprehensive critical survey of ML-based intrusion detection approaches in the literature over the last ten years, highlighting some open issues for future research.
Intrusions in computer networks have increased significantly in the last decade, due in part to a profitable underground cyber-crime economy and the availability of sophisticated tools for launching such intrusions. Researchers in industry and academia have been proposing methods and building systems for detecting and preventing such security breaches for more than four decades. Solutions proposed for dealing with network intrusions can be broadly classified as signature-based and anomaly-based. Signature-based intrusion detection systems look for patterns that match known attacks. On the other hand, anomaly-based intrusion detection systems develop a model for distinguishing legitimate users' behavior from that of malicious users' and hence are capable of detecting unknown attacks. One of the approaches used to classify legitimate and anomalous behavior is to use Machine Learning (ML) techniques. Several intrusion detection systems based on ML techniques have been proposed in the literature. In this paper, we present a comprehensive critical survey of ML-based intrusion detection approaches presented in the literature in the last ten years. This survey would serve as a supplement to other general surveys on intrusion detection as well as a reference to recent work done in the area for researchers working in ML-based intrusion detection systems. We also discuss some open issues that need to be addressed.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据