Loading…
A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection
Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches. However, they are not very successful in identifying all types of intrusions. In this paper, a detailed investig...
Saved in:
Published in: | IEEE Communications surveys and tutorials 2019, Vol.21 (1), p.686-728 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c361t-9e6d53996fbb93ebef23066a60649587a30d73b235988b5c1715bea202de93583 |
---|---|
cites | cdi_FETCH-LOGICAL-c361t-9e6d53996fbb93ebef23066a60649587a30d73b235988b5c1715bea202de93583 |
container_end_page | 728 |
container_issue | 1 |
container_start_page | 686 |
container_title | IEEE Communications surveys and tutorials |
container_volume | 21 |
creator | Mishra, Preeti Varadharajan, Vijay Tupakula, Uday Pilli, Emmanuel S. |
description | Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches. However, they are not very successful in identifying all types of intrusions. In this paper, a detailed investigation and analysis of various machine learning techniques have been carried out for finding the cause of problems associated with various machine learning techniques in detecting intrusive activities. Attack classification and mapping of the attack features is provided corresponding to each attack. Issues which are related to detecting low-frequency attacks using network attack dataset are also discussed and viable methods are suggested for improvement. Machine learning techniques have been analyzed and compared in terms of their detection capability for detecting the various category of attacks. Limitations associated with each category of them are also discussed. Various data mining tools for machine learning have also been included in the paper. At the end, future directions are provided for attack detection using machine learning techniques. |
doi_str_mv | 10.1109/COMST.2018.2847722 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2186110265</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8386762</ieee_id><sourcerecordid>2186110265</sourcerecordid><originalsourceid>FETCH-LOGICAL-c361t-9e6d53996fbb93ebef23066a60649587a30d73b235988b5c1715bea202de93583</originalsourceid><addsrcrecordid>eNpNkE1LAzEQhoMoWKt_QC8Bz1vzsfk6lvpVaOnBFryF7O5sm1KzmmyF_nt3bRFPMwzzPsw8CN1SMqKUmIfJYv62HDFC9YjpXCnGztCACsEzrdT7-b_-El2ltCUkZ7khA1SM8SO0zu-gwtPwDan1a9f6JmAXKjwObndIPuGmxqvkwxrPXbnxAfAMXAz9YAnlJvivPSRcN7FjtHGf-nyHhbInXaOL2u0S3JzqEK2en5aT12y2eJlOxrOs5JK2mQFZCW6MrIvCcCigZpxI6SSRuRFaOU4qxQvGhdG6ECVVVBTgGGEVGC40H6L7I_czNv09rd02-9h9kCyjWnaemBTdFjtulbFJKUJtP6P_cPFgKbG9S_vr0vYu7cllF7o7hjwA_AU011JJxn8A7PNwRA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2186110265</pqid></control><display><type>article</type><title>A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection</title><source>IEEE Xplore (Online service)</source><creator>Mishra, Preeti ; Varadharajan, Vijay ; Tupakula, Uday ; Pilli, Emmanuel S.</creator><creatorcontrib>Mishra, Preeti ; Varadharajan, Vijay ; Tupakula, Uday ; Pilli, Emmanuel S.</creatorcontrib><description>Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches. However, they are not very successful in identifying all types of intrusions. In this paper, a detailed investigation and analysis of various machine learning techniques have been carried out for finding the cause of problems associated with various machine learning techniques in detecting intrusive activities. Attack classification and mapping of the attack features is provided corresponding to each attack. Issues which are related to detecting low-frequency attacks using network attack dataset are also discussed and viable methods are suggested for improvement. Machine learning techniques have been analyzed and compared in terms of their detection capability for detecting the various category of attacks. Limitations associated with each category of them are also discussed. Various data mining tools for machine learning have also been included in the paper. At the end, future directions are provided for attack detection using machine learning techniques.</description><identifier>ISSN: 1553-877X</identifier><identifier>EISSN: 1553-877X</identifier><identifier>EISSN: 2373-745X</identifier><identifier>DOI: 10.1109/COMST.2018.2847722</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Anomaly detection ; Artificial intelligence ; attacks ; Cybersecurity ; Data mining ; Decision trees ; intrusion ; Intrusion detection ; Intrusion detection systems ; Machine learning ; Mapping ; Neural networks ; security ; Support vector machines ; Tutorials</subject><ispartof>IEEE Communications surveys and tutorials, 2019, Vol.21 (1), p.686-728</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c361t-9e6d53996fbb93ebef23066a60649587a30d73b235988b5c1715bea202de93583</citedby><cites>FETCH-LOGICAL-c361t-9e6d53996fbb93ebef23066a60649587a30d73b235988b5c1715bea202de93583</cites><orcidid>0000-0002-3809-0887 ; 0000-0002-6056-1147</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8386762$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,4009,27902,27903,27904,54775</link.rule.ids></links><search><creatorcontrib>Mishra, Preeti</creatorcontrib><creatorcontrib>Varadharajan, Vijay</creatorcontrib><creatorcontrib>Tupakula, Uday</creatorcontrib><creatorcontrib>Pilli, Emmanuel S.</creatorcontrib><title>A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection</title><title>IEEE Communications surveys and tutorials</title><addtitle>COMST</addtitle><description>Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches. However, they are not very successful in identifying all types of intrusions. In this paper, a detailed investigation and analysis of various machine learning techniques have been carried out for finding the cause of problems associated with various machine learning techniques in detecting intrusive activities. Attack classification and mapping of the attack features is provided corresponding to each attack. Issues which are related to detecting low-frequency attacks using network attack dataset are also discussed and viable methods are suggested for improvement. Machine learning techniques have been analyzed and compared in terms of their detection capability for detecting the various category of attacks. Limitations associated with each category of them are also discussed. Various data mining tools for machine learning have also been included in the paper. At the end, future directions are provided for attack detection using machine learning techniques.</description><subject>Anomaly detection</subject><subject>Artificial intelligence</subject><subject>attacks</subject><subject>Cybersecurity</subject><subject>Data mining</subject><subject>Decision trees</subject><subject>intrusion</subject><subject>Intrusion detection</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Mapping</subject><subject>Neural networks</subject><subject>security</subject><subject>Support vector machines</subject><subject>Tutorials</subject><issn>1553-877X</issn><issn>1553-877X</issn><issn>2373-745X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNpNkE1LAzEQhoMoWKt_QC8Bz1vzsfk6lvpVaOnBFryF7O5sm1KzmmyF_nt3bRFPMwzzPsw8CN1SMqKUmIfJYv62HDFC9YjpXCnGztCACsEzrdT7-b_-El2ltCUkZ7khA1SM8SO0zu-gwtPwDan1a9f6JmAXKjwObndIPuGmxqvkwxrPXbnxAfAMXAz9YAnlJvivPSRcN7FjtHGf-nyHhbInXaOL2u0S3JzqEK2en5aT12y2eJlOxrOs5JK2mQFZCW6MrIvCcCigZpxI6SSRuRFaOU4qxQvGhdG6ECVVVBTgGGEVGC40H6L7I_czNv09rd02-9h9kCyjWnaemBTdFjtulbFJKUJtP6P_cPFgKbG9S_vr0vYu7cllF7o7hjwA_AU011JJxn8A7PNwRA</recordid><startdate>2019</startdate><enddate>2019</enddate><creator>Mishra, Preeti</creator><creator>Varadharajan, Vijay</creator><creator>Tupakula, Uday</creator><creator>Pilli, Emmanuel S.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-3809-0887</orcidid><orcidid>https://orcid.org/0000-0002-6056-1147</orcidid></search><sort><creationdate>2019</creationdate><title>A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection</title><author>Mishra, Preeti ; Varadharajan, Vijay ; Tupakula, Uday ; Pilli, Emmanuel S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c361t-9e6d53996fbb93ebef23066a60649587a30d73b235988b5c1715bea202de93583</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Anomaly detection</topic><topic>Artificial intelligence</topic><topic>attacks</topic><topic>Cybersecurity</topic><topic>Data mining</topic><topic>Decision trees</topic><topic>intrusion</topic><topic>Intrusion detection</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Mapping</topic><topic>Neural networks</topic><topic>security</topic><topic>Support vector machines</topic><topic>Tutorials</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mishra, Preeti</creatorcontrib><creatorcontrib>Varadharajan, Vijay</creatorcontrib><creatorcontrib>Tupakula, Uday</creatorcontrib><creatorcontrib>Pilli, Emmanuel S.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE/IET Electronic Library</collection><collection>CrossRef</collection><jtitle>IEEE Communications surveys and tutorials</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mishra, Preeti</au><au>Varadharajan, Vijay</au><au>Tupakula, Uday</au><au>Pilli, Emmanuel S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection</atitle><jtitle>IEEE Communications surveys and tutorials</jtitle><stitle>COMST</stitle><date>2019</date><risdate>2019</risdate><volume>21</volume><issue>1</issue><spage>686</spage><epage>728</epage><pages>686-728</pages><issn>1553-877X</issn><eissn>1553-877X</eissn><eissn>2373-745X</eissn><abstract>Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches. However, they are not very successful in identifying all types of intrusions. In this paper, a detailed investigation and analysis of various machine learning techniques have been carried out for finding the cause of problems associated with various machine learning techniques in detecting intrusive activities. Attack classification and mapping of the attack features is provided corresponding to each attack. Issues which are related to detecting low-frequency attacks using network attack dataset are also discussed and viable methods are suggested for improvement. Machine learning techniques have been analyzed and compared in terms of their detection capability for detecting the various category of attacks. Limitations associated with each category of them are also discussed. Various data mining tools for machine learning have also been included in the paper. At the end, future directions are provided for attack detection using machine learning techniques.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/COMST.2018.2847722</doi><tpages>43</tpages><orcidid>https://orcid.org/0000-0002-3809-0887</orcidid><orcidid>https://orcid.org/0000-0002-6056-1147</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1553-877X |
ispartof | IEEE Communications surveys and tutorials, 2019, Vol.21 (1), p.686-728 |
issn | 1553-877X 1553-877X 2373-745X |
language | eng |
recordid | cdi_proquest_journals_2186110265 |
source | IEEE Xplore (Online service) |
subjects | Anomaly detection Artificial intelligence attacks Cybersecurity Data mining Decision trees intrusion Intrusion detection Intrusion detection systems Machine learning Mapping Neural networks security Support vector machines Tutorials |
title | A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T16%3A10%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Detailed%20Investigation%20and%20Analysis%20of%20Using%20Machine%20Learning%20Techniques%20for%20Intrusion%20Detection&rft.jtitle=IEEE%20Communications%20surveys%20and%20tutorials&rft.au=Mishra,%20Preeti&rft.date=2019&rft.volume=21&rft.issue=1&rft.spage=686&rft.epage=728&rft.pages=686-728&rft.issn=1553-877X&rft.eissn=1553-877X&rft_id=info:doi/10.1109/COMST.2018.2847722&rft_dat=%3Cproquest_cross%3E2186110265%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c361t-9e6d53996fbb93ebef23066a60649587a30d73b235988b5c1715bea202de93583%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2186110265&rft_id=info:pmid/&rft_ieee_id=8386762&rfr_iscdi=true |