Abstract
The rapid growth of the Internet and communications has resulted in a huge increase in transmitted data. These data are coveted by attackers and they continuously create novel attacks to steal or corrupt these data. The growth of these attacks is an issue for the security of our systems and represents one of the biggest challenges for intrusion detection. An intrusion detection system (IDS) is a tool that helps to detect intrusions by inspecting the network traffic. Although many researchers have studied and created new IDS solutions, IDS still needs improving in order to have good detection accuracy while reducing false alarm rates. In addition, many IDS struggle to detect zero-day attacks. Recently, machine learning algorithms have become popular with researchers to detect network intrusion in an efficient manner and with high accuracy. This paper presents the concept of IDS and provides a taxonomy of machine learning methods. The main metrics used to assess an IDS are presented and a review of recent IDS using machine learning is provided where the strengths and weaknesses of each solution is outlined. Then, details of the different datasets used in the studies are provided and the accuracy of the results from the reviewed work is discussed. Finally, observations, research challenges and future trends are discussed.
Funder
Science Foundation Ireland
HEA HCI-Pillar 3
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference42 articles.
1. Anderson, P. (2022, May 19). Computer Security Threat Monitoring and Surveillance, Available online: https://csrc.nist.gov/csrc/media/publications/conference-paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-papers/ande80.pdf.
2. ThreatStack (2022, May 19). The History of Intrusion Detection Systems (IDS)—Part 1. Available online: https://www.threatstack.com/blog/the-history-of-intrusion-detection-systems-ids-part-1.
3. Checkpoint (2022, May 19). What Is an Intrusion Detection System?. Available online: https://www.checkpoint.com/cyber-hub/network-security/what-is-an-intrusion-detection-system-ids/.
4. Sabahi, F., and Movaghar, A. (2008, January 26–31). Intrusion Detection: A Survey. Proceedings of the 2008 Third International Conference on Systems and Networks Communications, Sliema, Malta.
5. IBM Cloud Education (2022, May 19). Machine Learning. Available online: https://www.ibm.com/cloud/learn/machine-learning.
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献