Loading…

A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection

Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches. However, they are not very successful in identifying all types of intrusions. In this paper, a detailed investig...

Full description

Saved in:
Bibliographic Details
Published in:IEEE Communications surveys and tutorials 2019, Vol.21 (1), p.686-728
Main Authors: Mishra, Preeti, Varadharajan, Vijay, Tupakula, Uday, Pilli, Emmanuel S.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c361t-9e6d53996fbb93ebef23066a60649587a30d73b235988b5c1715bea202de93583
cites cdi_FETCH-LOGICAL-c361t-9e6d53996fbb93ebef23066a60649587a30d73b235988b5c1715bea202de93583
container_end_page 728
container_issue 1
container_start_page 686
container_title IEEE Communications surveys and tutorials
container_volume 21
creator Mishra, Preeti
Varadharajan, Vijay
Tupakula, Uday
Pilli, Emmanuel S.
description Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches. However, they are not very successful in identifying all types of intrusions. In this paper, a detailed investigation and analysis of various machine learning techniques have been carried out for finding the cause of problems associated with various machine learning techniques in detecting intrusive activities. Attack classification and mapping of the attack features is provided corresponding to each attack. Issues which are related to detecting low-frequency attacks using network attack dataset are also discussed and viable methods are suggested for improvement. Machine learning techniques have been analyzed and compared in terms of their detection capability for detecting the various category of attacks. Limitations associated with each category of them are also discussed. Various data mining tools for machine learning have also been included in the paper. At the end, future directions are provided for attack detection using machine learning techniques.
doi_str_mv 10.1109/COMST.2018.2847722
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2186110265</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8386762</ieee_id><sourcerecordid>2186110265</sourcerecordid><originalsourceid>FETCH-LOGICAL-c361t-9e6d53996fbb93ebef23066a60649587a30d73b235988b5c1715bea202de93583</originalsourceid><addsrcrecordid>eNpNkE1LAzEQhoMoWKt_QC8Bz1vzsfk6lvpVaOnBFryF7O5sm1KzmmyF_nt3bRFPMwzzPsw8CN1SMqKUmIfJYv62HDFC9YjpXCnGztCACsEzrdT7-b_-El2ltCUkZ7khA1SM8SO0zu-gwtPwDan1a9f6JmAXKjwObndIPuGmxqvkwxrPXbnxAfAMXAz9YAnlJvivPSRcN7FjtHGf-nyHhbInXaOL2u0S3JzqEK2en5aT12y2eJlOxrOs5JK2mQFZCW6MrIvCcCigZpxI6SSRuRFaOU4qxQvGhdG6ECVVVBTgGGEVGC40H6L7I_czNv09rd02-9h9kCyjWnaemBTdFjtulbFJKUJtP6P_cPFgKbG9S_vr0vYu7cllF7o7hjwA_AU011JJxn8A7PNwRA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2186110265</pqid></control><display><type>article</type><title>A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection</title><source>IEEE Xplore (Online service)</source><creator>Mishra, Preeti ; Varadharajan, Vijay ; Tupakula, Uday ; Pilli, Emmanuel S.</creator><creatorcontrib>Mishra, Preeti ; Varadharajan, Vijay ; Tupakula, Uday ; Pilli, Emmanuel S.</creatorcontrib><description>Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches. However, they are not very successful in identifying all types of intrusions. In this paper, a detailed investigation and analysis of various machine learning techniques have been carried out for finding the cause of problems associated with various machine learning techniques in detecting intrusive activities. Attack classification and mapping of the attack features is provided corresponding to each attack. Issues which are related to detecting low-frequency attacks using network attack dataset are also discussed and viable methods are suggested for improvement. Machine learning techniques have been analyzed and compared in terms of their detection capability for detecting the various category of attacks. Limitations associated with each category of them are also discussed. Various data mining tools for machine learning have also been included in the paper. At the end, future directions are provided for attack detection using machine learning techniques.</description><identifier>ISSN: 1553-877X</identifier><identifier>EISSN: 1553-877X</identifier><identifier>EISSN: 2373-745X</identifier><identifier>DOI: 10.1109/COMST.2018.2847722</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Anomaly detection ; Artificial intelligence ; attacks ; Cybersecurity ; Data mining ; Decision trees ; intrusion ; Intrusion detection ; Intrusion detection systems ; Machine learning ; Mapping ; Neural networks ; security ; Support vector machines ; Tutorials</subject><ispartof>IEEE Communications surveys and tutorials, 2019, Vol.21 (1), p.686-728</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c361t-9e6d53996fbb93ebef23066a60649587a30d73b235988b5c1715bea202de93583</citedby><cites>FETCH-LOGICAL-c361t-9e6d53996fbb93ebef23066a60649587a30d73b235988b5c1715bea202de93583</cites><orcidid>0000-0002-3809-0887 ; 0000-0002-6056-1147</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8386762$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,4009,27902,27903,27904,54775</link.rule.ids></links><search><creatorcontrib>Mishra, Preeti</creatorcontrib><creatorcontrib>Varadharajan, Vijay</creatorcontrib><creatorcontrib>Tupakula, Uday</creatorcontrib><creatorcontrib>Pilli, Emmanuel S.</creatorcontrib><title>A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection</title><title>IEEE Communications surveys and tutorials</title><addtitle>COMST</addtitle><description>Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches. However, they are not very successful in identifying all types of intrusions. In this paper, a detailed investigation and analysis of various machine learning techniques have been carried out for finding the cause of problems associated with various machine learning techniques in detecting intrusive activities. Attack classification and mapping of the attack features is provided corresponding to each attack. Issues which are related to detecting low-frequency attacks using network attack dataset are also discussed and viable methods are suggested for improvement. Machine learning techniques have been analyzed and compared in terms of their detection capability for detecting the various category of attacks. Limitations associated with each category of them are also discussed. Various data mining tools for machine learning have also been included in the paper. At the end, future directions are provided for attack detection using machine learning techniques.</description><subject>Anomaly detection</subject><subject>Artificial intelligence</subject><subject>attacks</subject><subject>Cybersecurity</subject><subject>Data mining</subject><subject>Decision trees</subject><subject>intrusion</subject><subject>Intrusion detection</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Mapping</subject><subject>Neural networks</subject><subject>security</subject><subject>Support vector machines</subject><subject>Tutorials</subject><issn>1553-877X</issn><issn>1553-877X</issn><issn>2373-745X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNpNkE1LAzEQhoMoWKt_QC8Bz1vzsfk6lvpVaOnBFryF7O5sm1KzmmyF_nt3bRFPMwzzPsw8CN1SMqKUmIfJYv62HDFC9YjpXCnGztCACsEzrdT7-b_-El2ltCUkZ7khA1SM8SO0zu-gwtPwDan1a9f6JmAXKjwObndIPuGmxqvkwxrPXbnxAfAMXAz9YAnlJvivPSRcN7FjtHGf-nyHhbInXaOL2u0S3JzqEK2en5aT12y2eJlOxrOs5JK2mQFZCW6MrIvCcCigZpxI6SSRuRFaOU4qxQvGhdG6ECVVVBTgGGEVGC40H6L7I_czNv09rd02-9h9kCyjWnaemBTdFjtulbFJKUJtP6P_cPFgKbG9S_vr0vYu7cllF7o7hjwA_AU011JJxn8A7PNwRA</recordid><startdate>2019</startdate><enddate>2019</enddate><creator>Mishra, Preeti</creator><creator>Varadharajan, Vijay</creator><creator>Tupakula, Uday</creator><creator>Pilli, Emmanuel S.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-3809-0887</orcidid><orcidid>https://orcid.org/0000-0002-6056-1147</orcidid></search><sort><creationdate>2019</creationdate><title>A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection</title><author>Mishra, Preeti ; Varadharajan, Vijay ; Tupakula, Uday ; Pilli, Emmanuel S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c361t-9e6d53996fbb93ebef23066a60649587a30d73b235988b5c1715bea202de93583</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Anomaly detection</topic><topic>Artificial intelligence</topic><topic>attacks</topic><topic>Cybersecurity</topic><topic>Data mining</topic><topic>Decision trees</topic><topic>intrusion</topic><topic>Intrusion detection</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Mapping</topic><topic>Neural networks</topic><topic>security</topic><topic>Support vector machines</topic><topic>Tutorials</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mishra, Preeti</creatorcontrib><creatorcontrib>Varadharajan, Vijay</creatorcontrib><creatorcontrib>Tupakula, Uday</creatorcontrib><creatorcontrib>Pilli, Emmanuel S.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE/IET Electronic Library</collection><collection>CrossRef</collection><jtitle>IEEE Communications surveys and tutorials</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mishra, Preeti</au><au>Varadharajan, Vijay</au><au>Tupakula, Uday</au><au>Pilli, Emmanuel S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection</atitle><jtitle>IEEE Communications surveys and tutorials</jtitle><stitle>COMST</stitle><date>2019</date><risdate>2019</risdate><volume>21</volume><issue>1</issue><spage>686</spage><epage>728</epage><pages>686-728</pages><issn>1553-877X</issn><eissn>1553-877X</eissn><eissn>2373-745X</eissn><abstract>Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches. However, they are not very successful in identifying all types of intrusions. In this paper, a detailed investigation and analysis of various machine learning techniques have been carried out for finding the cause of problems associated with various machine learning techniques in detecting intrusive activities. Attack classification and mapping of the attack features is provided corresponding to each attack. Issues which are related to detecting low-frequency attacks using network attack dataset are also discussed and viable methods are suggested for improvement. Machine learning techniques have been analyzed and compared in terms of their detection capability for detecting the various category of attacks. Limitations associated with each category of them are also discussed. Various data mining tools for machine learning have also been included in the paper. At the end, future directions are provided for attack detection using machine learning techniques.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/COMST.2018.2847722</doi><tpages>43</tpages><orcidid>https://orcid.org/0000-0002-3809-0887</orcidid><orcidid>https://orcid.org/0000-0002-6056-1147</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1553-877X
ispartof IEEE Communications surveys and tutorials, 2019, Vol.21 (1), p.686-728
issn 1553-877X
1553-877X
2373-745X
language eng
recordid cdi_proquest_journals_2186110265
source IEEE Xplore (Online service)
subjects Anomaly detection
Artificial intelligence
attacks
Cybersecurity
Data mining
Decision trees
intrusion
Intrusion detection
Intrusion detection systems
Machine learning
Mapping
Neural networks
security
Support vector machines
Tutorials
title A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T16%3A10%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Detailed%20Investigation%20and%20Analysis%20of%20Using%20Machine%20Learning%20Techniques%20for%20Intrusion%20Detection&rft.jtitle=IEEE%20Communications%20surveys%20and%20tutorials&rft.au=Mishra,%20Preeti&rft.date=2019&rft.volume=21&rft.issue=1&rft.spage=686&rft.epage=728&rft.pages=686-728&rft.issn=1553-877X&rft.eissn=1553-877X&rft_id=info:doi/10.1109/COMST.2018.2847722&rft_dat=%3Cproquest_cross%3E2186110265%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c361t-9e6d53996fbb93ebef23066a60649587a30d73b235988b5c1715bea202de93583%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2186110265&rft_id=info:pmid/&rft_ieee_id=8386762&rfr_iscdi=true