4.6 Article

Machine Learning for Misuse-Based Network Intrusion Detection: Overview, Unified Evaluation and Feature Choice Comparison Framework

期刊

IEEE ACCESS
卷 9, 期 -, 页码 63995-64015

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3075066

关键词

Network intrusion detection; Measurement; Anomaly detection; Machine learning algorithms; Feature extraction; Wireless sensor networks; Hidden Markov models; Intrusion detection; machine learning; neural networks; security

资金

  1. COllective Research NETworking (CORNET)
  2. VLAIO [HBC.2018.0491]
  3. CyberSecurity Research Flanders [VR20192203]

向作者/读者索取更多资源

Network intrusion detection systems are essential for protecting advanced communication networks. Machine learning algorithms and two new evaluation metrics have been proposed to improve performance and reliability. A workflow for converting raw packet flows into machine learning features allows for quick comparison of algorithms across different datasets.
Network Intrusion detection systems are essential for the protection of advanced communication networks. Originally, these systems were hard-coded to identify specific signatures, patterns and rule violations; now artificial intelligence and machine learning algorithms provide promising alternatives. However, in the literature, various outdated datasets as well as a plethora of different evaluation metrics are used to prove algorithm efficacy. To enable a global comparison, this study compiles algorithms for different configurations to create common ground and proposes two new evaluation metrics. These metrics, the detection score and the identification score, together reliably present the performance of a network intrusion detection system to allow for practical comparison on a large scale. Additionally, we present a workflow to process raw packet flows into input features for machine learning. This framework quickly implements different algorithms for the various datasets and allows systematic performance comparison between those algorithms. Our experimental results, matching and surpassing the state-of-the-art, indicate the potential of this approach. As raw traffic input features are much easier and cheaper to extract when compared to traditional features, they show promise for application in real-time deep learning-based systems.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据