Machine Learning Techniques for Network Anomaly Detection: A Survey

Nowadays, distributed data processing in cloud computing has gained increasing attention from many researchers. The intense transfer of data has made the network an attractive and vulnerable target for attackers to exploit and experiment with different types of attacks. Therefore, many intrusion detection techniques have been evolving to protect cloud distributed services by detecting the different attack types on the network. Machine learning techniques have been heavily applied in intrusion detection systems with different algorithms. This paper surveys recent research advances linked to machine learning techniques. We review some representative algorithms and discuss their proprieties in detail. We compare them in terms of intrusion accuracy and detection rate using different data sets.

[1]  Jun Sun,et al.  Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning , 2017, 2017 IEEE International Conference on Data Mining Workshops (ICDMW).

[2]  Weishi Zhang,et al.  An Anomaly Intrusion Detection Method Based on Improved K-Means of Cloud Computing , 2016, 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC).

[3]  Elsayed A. Sallam,et al.  A hybrid network intrusion detection framework based on random forests and weighted k-means , 2013 .

[4]  Xiangjian He,et al.  Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.

[5]  D. Malathi,et al.  A Survey on Anomaly Based Host Intrusion Detection System , 2018 .

[6]  Mazen O. Hasna,et al.  Location privacy preservation in secure crowdsourcing-based cooperative spectrum sensing , 2016, EURASIP J. Wirel. Commun. Netw..

[7]  Aditi Roy,et al.  Multi-classification of UNSW-NB15 Dataset for Network Anomaly Detection System , 2020 .

[8]  Mohamed Guerroumi,et al.  A genetic clustering technique for Anomaly-based Intrusion Detection Systems , 2015, 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).

[9]  Victor C. M. Leung,et al.  Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment , 2018, Wirel. Commun. Mob. Comput..

[10]  Shailendra Sahu,et al.  Network intrusion detection system using J48 Decision Tree , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[11]  Andreas Kassler,et al.  Supervised Machine Learning Techniques for Efficient Network Intrusion Detection , 2019, 2019 28th International Conference on Computer Communication and Networks (ICCCN).

[12]  Tim Watson,et al.  A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks , 2017, IEEE Access.

[13]  Zina Chkirbene,et al.  A Combined Decision for Secure Cloud Computing Based on Machine Learning and Past Information , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).

[14]  Elena Sitnikova,et al.  Collaborative anomaly detection framework for handling big data of cloud computing , 2017, 2017 Military Communications and Information Systems Conference (MilCIS).

[15]  Reyadh Shaker Naoum,et al.  An Enhanced Resilient Backpropagation Artificial Neural Network for Intrusion Detection System , 2012 .

[16]  Lalu Banoth,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .

[17]  Mohammed Samaka,et al.  Feasibility of Supervised Machine Learning for Cloud Security , 2016, 2016 International Conference on Information Science and Security (ICISS).

[18]  Jill Slay,et al.  A hybrid feature selection for network intrusion detection systems: Central points , 2017, ArXiv.

[19]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[20]  Yang Lei,et al.  Network Anomaly Traffic Detection Algorithm Based on SVM , 2017, 2017 International Conference on Robots & Intelligent System (ICRIS).

[21]  Esther Daniel,et al.  Survey on Machine Learning and Deep Learning Algorithms used in Internet of Things (IoT) Healthcare , 2019, 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC).

[22]  Dewan Md. Farid,et al.  Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection , 2010, ArXiv.

[23]  Sridhar Adepu,et al.  Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks , 2017, 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE).

[24]  Ridha Hamila,et al.  Important Complexity Reduction of Random Forest in Multi-Classification Problem , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).

[25]  Abdul Razaque,et al.  Intelligent intrusion detection system using clustered self organized map , 2018, 2018 Fifth International Conference on Software Defined Systems (SDS).

[26]  Xiangjian He,et al.  A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2011, IEEE Transactions on Parallel and Distributed Systems.

[27]  Chih-Fong Tsai,et al.  A triangle area based nearest neighbors approach to intrusion detection , 2010, Pattern Recognit..

[28]  J Anitha,et al.  Machine Learning based Image Processing Techniques for Satellite Image Analysis -A Survey , 2019, 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon).

[29]  Yongdae Kim,et al.  A machine learning framework for network anomaly detection using SVM and GA , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[30]  Han Li Research and Implementation of an Anomaly Detection Model Based on Clustering Analysis , 2010, 2010 International Symposium on Intelligence Information Processing and Trusted Computing.