Open Access   Article Go Back

Machine Learning in Intrusion Detection – A Survey

P. Anitha1 , D. Rajesh2 , K. Venkata Ratnam3

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-3 , Page no. 112-119, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i3.112119

Online published on Mar 31, 2019

Copyright © P. Anitha, D. Rajesh, K. Venkata Ratnam . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Anitha, D. Rajesh, K. Venkata Ratnam, “Machine Learning in Intrusion Detection – A Survey,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.112-119, 2019.

MLA Style Citation: P. Anitha, D. Rajesh, K. Venkata Ratnam "Machine Learning in Intrusion Detection – A Survey." International Journal of Computer Sciences and Engineering 7.3 (2019): 112-119.

APA Style Citation: P. Anitha, D. Rajesh, K. Venkata Ratnam, (2019). Machine Learning in Intrusion Detection – A Survey. International Journal of Computer Sciences and Engineering, 7(3), 112-119.

BibTex Style Citation:
@article{Anitha_2019,
author = {P. Anitha, D. Rajesh, K. Venkata Ratnam},
title = {Machine Learning in Intrusion Detection – A Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {112-119},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3806},
doi = {https://doi.org/10.26438/ijcse/v7i3.112119}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.112119}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3806
TI - Machine Learning in Intrusion Detection – A Survey
T2 - International Journal of Computer Sciences and Engineering
AU - P. Anitha, D. Rajesh, K. Venkata Ratnam
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 112-119
IS - 3
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
516 354 downloads 208 downloads
  
  
           

Abstract

With the huge expansion of internet based services and important information on networks, network protection and security is a very significant task. Intrusion Detection system (IDS) is the standard component in network security framework and is essential to protect computer systems and network from different attacks. IDSs is designed to detect both known and unknown attacks in computer systems and networks. This paper presents different Machine Learning techniques of IDS for protecting computers and networks. This study analyzes different machine learning methods in IDS. It reviews related studies focusing on single, hybrid and ensemble classifiers with relevant datasets.

Key-Words / Index Term

Machine Learning, intrusion detection, Single Classifiers, Hybrid Classifiers, Ensemble Classifiers.

References

[1]. Guide to Intrusion Detection and Prevention Systems (IDPS), National Institute of Standards and Technology, Gaithersburg
[2]. D. E. Denning, “An intrusion-detection model”, IEEE Trans. Softw. Eng., vol. 13, no. 2, pp. 222–232, Feb, 1987.
[3]. C. Guo, Y.-J. Zhou, Y. Ping, S.-S. Luo, Y.-P. Lai, and Z.-K. Zhang, “Efficient intrusion detection using representative instances,” Computers & Security, vol. 39, pp. 255–267, 2013.
[4]. F. Amiri , M. M. Rezaei Yousefi , CaroLucas , A.Shakery and NasserYazdani, “Mutual information-based feature selection for intrusion detection systems” Journal of Network and Computer Applications 34 , 1184–1199, 2011.
[5]. S. Soni1 , P. Sharma, “Review of Hybrid Intrusion Detection System”, International Journal of Computer Sciences and Engineering, Vol.-6, Issue-6, pp 1100-1104, 2018.
[6]. Uzair Bashir and Manzoor Chachoo, “Intrusion Detection and Prevention System: Challenges & Opportunities” IEEE ,pp. 806-809, 2014.
[7]. J. R. Quinlan, “Introduction of Decision Trees”, Machine Learning vol. 1.
[8]. Xiao-Bai Li, “A scalable decision tree system and its application in pattern recognition and intrusion detections”, Decision Support Systems 41 ,pp 112–130, 2005.
[9]. Chih-Fong Tsai, Yu-Feng Hsu, Chia-Ying Lin and Wei-Yang Lin, “Intrusion detection by machine learning: A review”, Expert Systems with Applications, vol.36,11994–12000, 2009.
[10]. Whitley, Darrell, “A Genetic Algorithm Tutorial.” Statistics and Computing vol 4, 65-85, 1994.
[11]. Meng Jianliang, Shang Haikun and Bian Ling, “The Application on Intrusion Detection Based on K means Cluster Algorithm”, International Forum on Information Technology and Applications, IEEE , 2009.
[12]. Shengfeng Tian, Chuanhuan Yin, and Shaomin Mu, “High-Order Markov Kernels for Network Intrusion Detection”, Springer-Verlag Berlin Heidelberg, pp. 184 –191, 2006.
[13]. Ping yi , Yue Wu , “A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network”, Journal of Electrical and Computer Engineering, 2014.
[14]. C. M. Bishop, “Pattern Recognition and Machine Learning”, Springer, 2006.
[15]. C. Amali Pushpam , J. Gnana Jayanthi,” A Review on effect of SVM in Intrusion Detection System”, International Journal of Computer Sciences and Engineering, Vol. 6, Issue.12,pp.471-474, 2018.
[16]. Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set”, Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications (CISDA`09), IEEE Press, Piscataway, NJ, USA, p. 53-58, 2009.
[17]. L.Dhanabal, Dr. S.P. Shantharajah, “A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, June, pp 446-452, 2015.
[18]. Hossein Shirazi, “Anomaly intrusion detection system using information theory, K-NN and KMC algorithms”, Aus tralian Journal of Bas ic and Applied Sciences, Vol. 3, pp- 2581-2597, 2009.
[19]. Ahmad, I., Abdullah, A., Alghamdi, A., & Hussain, M, “Optimized intrusion detection mechanism using soft computing techniques”. Telecommunication Systems, Vol. 52(4), 2187–2195, 2013.
[20]. W.L. Al-Yaseen, Zulaiha Ali Othman, and Mohd Zakree Ahmad Nazri, “Hybrid Modified-Means with C4. 5 for Intrusion Detection Systems in Multiagent Systems”, The Scientific World Journal, 2015.
[21]. G. Wang, J. Hao, J. Ma, and L. Huang, “A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering,” Expert systems with applications, vol. 37, no. 9, pp. 6225-6232, 2010.
[22]. S.S. Sindhu, S.G. Sivatha, and A. Kannan, “Decision tree based light weight intrusion detection using a wrapper approach,” Expert Systems with applications, vol. 39, no. 1, pp. 129-141, 2012.
[23]. Reda M. Elbasiony , Elsayed A. Sallam , Tarek E. Eltobely , And Mahmoud M. Fahmy, “A hybrid network intrusion detection framework based on random forests and weighted k-means” Ain Shams Engineering Journal , 753–762, 2013.
[24]. 23 A. Sultana, and M.A. Jabbar, “Intelligent network intrusion detection system using data mining techniques,” In the Proceedings of 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), pp. 329-333, 2016.
[25]. M.S.M. Pozi, M.N. Sulaiman, N. Mustapha, T. Perumal, “Improving anomalous rare attack detection rate for intrusion detection system using support vector machine and genetic programming,” Neural Processing Letters, vol. 44, no. 2, pp. 279-290, 2016.
[26]. Ahmed I. Saleh , FatmaM. Talaat, LabibM. Labib, “A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers”, Artif Intell Rev, 2017.
[27]. Oladeji Patrick Akomolafe and Adeleke Ifeoluwa Adegboyega, “An Improved KNN Classifier for Anomaly Intrusion Detection System Using Cluster Optimization”, International Journal of Computer Science and Telecommunications (IJCST) Vol. 8, Issue 2, 2017.
[28]. B. M. Aslahi-Shahri, R. Rahmani, M. Chizari, A. Maralani, M. Eslami, M. J. Golkar, and A. Ebrahimi, “A hybrid method consisting of GA and SVM for intrusion detection system”, The Natural Computing Applications Forum 27 ,1669–1676, 2016.
[29]. Yassine Maleh, Abdellah Ezzati, Youssef Qasmaoui, Mohamed Mbida, 2015 ,“A Global Hybrid Intrusion Detection System for Wireless Sensor Networks”, Procedia Computer Science vol. 52, pp 1047 – 1052.
[30]. Jabez J , Dr.B.Muthukumar, “Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach”, Procedia Computer Science, vol. 48 , 338 – 346, 2015.
[31]. R. A. R. Ashfaq, X. Wang, J. Z. Huang , H. Abbas , and Yu-Lin He, “ Fuzziness based semi-supervised learning approach for intrusion detection system”, Information Sciences, vol.378 , pp 484–497, 2016.