Loading…

A Comprehensive Survey on Ensemble Learning-Based Intrusion Detection Approaches in Computer Networks

Machine learning algorithms present a robust alternative for building Intrusion Detection Systems due to their ability to recognize attacks in computer network traffic by recognizing patterns in large amounts of data. Typically, classifiers are trained for this task. Together, ensemble learning algo...

Full description

Saved in:
Bibliographic Details
Published in:IEEE access 2023, Vol.11, p.122638-122676
Main Authors: Lucas, Thiago Jose, de Figueiredo, Inae Soares, Tojeiro, Carlos Alexandre Carvalho, de Almeida, Alex Marino G., Scherer, Rafal, Brega, Jose Remo F., Papa, Joao Paulo, da Costa, Kelton Augusto Pontara
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Machine learning algorithms present a robust alternative for building Intrusion Detection Systems due to their ability to recognize attacks in computer network traffic by recognizing patterns in large amounts of data. Typically, classifiers are trained for this task. Together, ensemble learning algorithms have increased the performance of these detectors, reducing classification errors and allowing computer networks to be more protected. This research presents a comprehensive Systematic Review of the Literature where works related to intrusion detection with ensemble learning were obtained from the most relevant scientific bases. We offer 188 works, several compilations of datasets, classifiers, and ensemble algorithms, and document the experiments that stood out in their performance. A characteristic of this research is its originality. We found two surveys in the literature specifically focusing on the relationship between ensemble techniques and intrusion detection. We present for the last eight years covered by this survey a timeline-based view of the works studied to highlight evolutions and trends. The results obtained by our survey show a growing area, with excellent results in detecting attacks but with needs for improvement in pruning for choosing classifiers, which makes this work unprecedented for this context.
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2023.3328535