A Survey on Data-driven Network Intrusion Detection

Data-driven network intrusion detection (NID) has a tendency towards minority attack classes compared to normal traffic. Many datasets are collected in simulated environments rather than real-world networks. These challenges undermine the performance of intrusion detection machine learning models by fitting machine learning models to unrepresentative “sandbox” datasets. This survey presents a taxonomy with eight main challenges and explores common datasets from 1999 to 2020. Trends are analyzed on the challenges in the past decade and future directions are proposed on expanding NID into cloud-based environments, devising scalable models for large network data, and creating labeled datasets collected in real-world networks.

[1]  Yang-Wai Chow,et al.  Interactive three-dimensional visualization of network intrusion detection data for machine learning , 2020, Future Gener. Comput. Syst..

[2]  Jie Li,et al.  DeepDDoS: Online DDoS Attack Detection , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[3]  M. A. Jabbar,et al.  Random Forest Modeling for Network Intrusion Detection System , 2016 .

[4]  Kian Hsiang Low,et al.  GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection , 2019, 2019 IEEE Conference on Communications and Network Security (CNS).

[5]  Elisa Bertino,et al.  Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning , 2019, 2019 IEEE International Conference on Smart Computing (SMARTCOMP).

[6]  Ing-Ray Chen,et al.  A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..

[7]  Yang Xin,et al.  Robust detection for network intrusion of industrial IoT based on multi-CNN fusion , 2020 .

[8]  Douglas A. Talbert,et al.  Ensemble-Based Online Machine Learning Algorithms for Network Intrusion Detection Systems Using Streaming Data , 2020, Inf..

[9]  Haibo He,et al.  A local density-based approach for outlier detection , 2017, Neurocomputing.

[10]  Eui-Jik Kim,et al.  An Authorized Access Attack Detection Method for Realtime Intrusion Detection System , 2020, 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC).

[11]  Peng Hao,et al.  Transfer learning using computational intelligence: A survey , 2015, Knowl. Based Syst..

[12]  Yu Jie,et al.  Research on Intrusion Detection Method Based on SVM Co-training , 2011, 2011 Fourth International Conference on Intelligent Computation Technology and Automation.

[13]  Wooseong Kim,et al.  1D CNN based network intrusion detection with normalization on imbalanced data , 2020, 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).

[14]  Kensuke Fukuda,et al.  A taxonomy of anomalies in backbone network traffic , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[15]  David Aspinall,et al.  Traffic Generation using Containerization for Machine Learning , 2019, 2019 Workshop on DYnamic and Novel Advances in Machine learning and Intelligent Cyber Security.

[16]  Jiankun Hu,et al.  Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling , 2017, J. Netw. Comput. Appl..

[17]  Beizhan Wang,et al.  Feature selection based on Rough set and modified genetic algorithm for intrusion detection , 2010, 2010 5th International Conference on Computer Science & Education.

[18]  Martin Sarnovsky,et al.  Hierarchical Intrusion Detection Using Machine Learning and Knowledge Model , 2020, Symmetry.

[19]  Khaled Ragab,et al.  Genetic fuzzy system for intrusion detection: Analysis of improving of multiclass classification accuracy using KDDCup-99 imbalance dataset , 2012, 2012 12th International Conference on Hybrid Intelligent Systems (HIS).

[20]  Christos Faloutsos,et al.  Suspicious Behavior Detection: Current Trends and Future Directions , 2016, IEEE Intelligent Systems.

[21]  Nima Jafari Navimipour,et al.  Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm , 2019, ICT Express.

[22]  Philippe Owezarski,et al.  Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge , 2012, Comput. Commun..

[23]  Chia-Mei Chen,et al.  An efficient network intrusion detection , 2010, Comput. Commun..

[24]  Nguyen Xuan Hoai,et al.  Malware detection using genetic programming , 2014, the 2014 Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA).

[25]  Mohiuddin Ahmed,et al.  A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..

[26]  Ying Zhong,et al.  HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning , 2020, Comput. Networks.

[27]  Giancarlo Fortino,et al.  Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs , 2019, Inf. Sci..

[28]  Christos Faloutsos,et al.  CatchTartan: Representing and Summarizing Dynamic Multicontextual Behaviors , 2016, KDD.

[29]  H. E. Poston,et al.  A brief taxonomy of intrusion detection strategies , 2012, 2012 IEEE National Aerospace and Electronics Conference (NAECON).

[30]  Salah El Hadaj,et al.  Performance evaluation of intrusion detection based on machine learning using Apache Spark , 2018 .

[31]  Rua-Huan Tsaih,et al.  Network-traffic anomaly detection with incremental majority learning , 2015, 2015 International Joint Conference on Neural Networks (IJCNN).

[32]  Zhen Liu,et al.  An Adaptive Ensemble Machine Learning Model for Intrusion Detection , 2019, IEEE Access.

[33]  Adriel Cheng,et al.  PAC-GAN: Packet Generation of Network Traffic using Generative Adversarial Networks , 2019, 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).

[34]  Nour Moustafa,et al.  UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).

[35]  Hongyu Yang,et al.  Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network , 2019, IEEE Access.

[36]  Bin Wu,et al.  Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization , 2020, IEEE Access.

[37]  Jaouhar Fattahi,et al.  Fusion of ANN and SVM classifiers for network attack detection , 2017, 2017 18th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA).

[38]  Marius Kloft,et al.  Active learning for network intrusion detection , 2009, AISec '09.

[39]  Chaouki Khammassi,et al.  A GA-LR wrapper approach for feature selection in network intrusion detection , 2017, Comput. Secur..

[40]  Wei Hu,et al.  AdaBoost-Based Algorithm for Network Intrusion Detection , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[41]  Christos Faloutsos,et al.  Catching Synchronized Behaviors in Large Networks , 2016, ACM Trans. Knowl. Discov. Data.

[42]  Sachin Shetty,et al.  Transfer learning for detecting unknown network attacks , 2019, EURASIP Journal on Information Security.

[43]  Mohamed Baza,et al.  Mimic Learning to Generate a Shareable Network Intrusion Detection Model , 2019, 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC).

[44]  Xu Chen,et al.  Network Intrusion Detection: Based on Deep Hierarchical Network and Original Flow Data , 2019, IEEE Access.

[45]  Wing-Kwong Wong,et al.  Reinforcement Learning of Robotic Motion with Genetic Programming, Simulated Annealing and Self-Organizing Map , 2011, 2011 International Conference on Technologies and Applications of Artificial Intelligence.

[46]  Mei Song,et al.  PCCN: Parallel Cross Convolutional Neural Network for Abnormal Network Traffic Flows Detection in Multi-Class Imbalanced Network Traffic Flows , 2019, IEEE Access.

[47]  Dong Hyun Jeong,et al.  A survey of cloud-based network intrusion detection analysis , 2016, Human-centric Computing and Information Sciences.

[48]  Tianwen Jiang,et al.  Error-Bounded Graph Anomaly Loss for GNNs , 2020, CIKM.

[49]  Govind P. Gupta,et al.  A Framework for Fast and Efficient Cyber Security Network Intrusion Detection Using Apache Spark , 2016 .

[50]  Jinyin Chen,et al.  DAD-MCNN: DDoS Attack Detection via Multi-channel CNN , 2019, ICMLC '19.

[51]  Geoffrey E. Hinton,et al.  Reducing the Dimensionality of Data with Neural Networks , 2006, Science.

[52]  Katherine Davis,et al.  Data Processing and Model Selection for Machine Learning-based Network Intrusion Detection , 2020, 2020 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR).

[53]  Quanmin Wang,et al.  The Detection of Network Intrusion Based on Improved Adaboost Algorithm , 2020, ICCSP.

[54]  Sachin Shetty,et al.  Feature-based transfer learning for network security , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).

[55]  Neelam Sharma,et al.  INTRUSION DETECTION USING NAIVE BAYES CLASSIFIER WITH FEATURE REDUCTION , 2012 .

[56]  Xiangji Huang,et al.  Mining network data for intrusion detection through combining SVMs with ant colony networks , 2014, Future Gener. Comput. Syst..

[57]  Joseph W. Mikhail,et al.  A Semi-Boosted Nested Model With Sensitivity-Based Weighted Binarization for Multi-Domain Network Intrusion Detection , 2019, ACM Trans. Intell. Syst. Technol..

[58]  Manas Ranjan Patra,et al.  NETWORK INTRUSION DETECTION USING NAÏVE BAYES , 2007 .

[59]  Jinshu Su,et al.  Evaluating Deep Learning Based Network Intrusion Detection System in Adversarial Environment , 2019, 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC).

[60]  Dattaraj Rao,et al.  Explaining Network Intrusion Detection System Using Explainable AI Framework , 2021, ArXiv.

[61]  Jaideep Srivastava,et al.  A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.

[62]  Xiangliang Zhang,et al.  Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks , 2014, Knowl. Based Syst..

[63]  Lian Hong,et al.  Researches on the IPv6 Network safeguard linked system , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[64]  Salvatore J. Stolfo,et al.  Casting out Demons: Sanitizing Training Data for Anomaly Sensors , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[65]  Pang-Ning Tan,et al.  Detecting bots via incremental LS-SVM learning with dynamic feature adaptation , 2011, KDD.

[66]  Fakhroddin Noorbehbahani,et al.  An incremental intrusion detection system using a new semi‐supervised stream classification method , 2017, Int. J. Commun. Syst..

[67]  Mohammad Zulkernine,et al.  Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[68]  David Fernández,et al.  Enabling an Anatomic View to Investigate Honeypot Systems: A Survey , 2017, IEEE Systems Journal.

[69]  Zahid Akhtar,et al.  KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research , 2019, Computer.

[70]  Gurdip Kaur,et al.  Intrusion detection system using honeypots and swarm intelligence , 2011, ACAI '11.

[71]  Adel Sabry Eesa,et al.  A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems , 2015, Expert Syst. Appl..

[72]  Lalu Banoth,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .

[73]  Michał Choraś,et al.  Achieving Explainability of Intrusion Detection System by Hybrid Oracle-Explainer Approach , 2020, 2020 International Joint Conference on Neural Networks (IJCNN).

[74]  Wenhao Zhang,et al.  WOTBoost: Weighted Oversampling Technique in Boosting for imbalanced learning , 2019, 2019 IEEE International Conference on Big Data (Big Data).

[75]  Durga Toshniwal,et al.  Unsupervised outlier detection in streaming data using weighted clustering , 2012, 2012 12th International Conference on Intelligent Systems Design and Applications (ISDA).

[76]  Carlisle Adams,et al.  Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset , 2020, WiseML@WiSec.

[77]  Kwangjo Kim,et al.  Machine-Learning-Based Feature Selection Techniques for Large-Scale Network Intrusion Detection , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW).

[78]  Jaideep Srivastava,et al.  Data Mining for Network Intrusion Detection , 2002 .

[79]  Ridwan Nur Wibowo,et al.  NSL-KDD Dataset , 2019 .

[80]  Siddique Latif,et al.  Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).

[81]  Xin Du,et al.  A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning Framework , 2020, IEEE Transactions on Information Forensics and Security.

[82]  Rahul Kumar,et al.  Deep Reinforcement Learning based Intrusion Detection System for Cloud Infrastructure , 2020, 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS).

[83]  Akhan Akbulut,et al.  Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic , 2020, Comput. Networks.

[84]  Vern Paxson,et al.  Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.

[85]  Robertas Damasevicius,et al.  LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion Detection , 2020, Electronics.

[86]  KeeganNathan,et al.  A survey of cloud-based network intrusion detection analysis , 2016 .

[87]  Salvatore Rampone,et al.  Towards Near-Real-Time Intrusion Detection for IoT Devices using Supervised Learning and Apache Spark , 2020, Electronics.

[88]  Seyed Mojtaba Hosseini Bamakan,et al.  Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problem , 2017, Knowl. Based Syst..

[89]  Nader Pouratian,et al.  Big Data defined: a practical review for neurosurgeons. , 2019, World neurosurgery.

[90]  FaloutsosChristos,et al.  Catching Synchronized Behaviors in Large Networks , 2016 .

[91]  Sangarapillai Lambotharan,et al.  Anomaly-Based Network Intrusion Detection Using SVM , 2019, 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP).

[92]  Roberto Therón,et al.  UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs , 2018, Comput. Secur..

[93]  Bernabé Dorronsoro,et al.  Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches , 2020, Applied Sciences.

[94]  Hao Wang,et al.  Learning concept-drifting data streams with random ensemble decision trees , 2015, Neurocomputing.

[95]  Pei-Chann Chang,et al.  A population-based incremental learning approach with artificial immune system for network intrusion detection , 2016, Eng. Appl. Artif. Intell..

[96]  S. O. Falaki,et al.  NETWORK INTRUSION DETECTION BASED ON ROUGH SET AND K-NEAREST NEIGHBOUR , 2008 .

[97]  Liu Dongxia,et al.  An Intrusion Detection System Based on Honeypot Technology , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[98]  Wei Liu,et al.  A New Method of Fuzzy Support Vector Machine Algorithm for Intrusion Detection , 2020, Applied Sciences.

[99]  Ankur Taly,et al.  Explainable AI in Industry: Practical Challenges and Lessons Learned , 2020, WWW.

[100]  Yuni Xia,et al.  GPU-Accelerated Outlier Detection for Continuous Data Streams , 2016, 2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS).

[101]  Qi Shi,et al.  A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[102]  Nagarathna Ravi,et al.  Semisupervised-Learning-Based Security to Detect and Mitigate Intrusions in IoT Network , 2020, IEEE Internet of Things Journal.

[103]  Daniel L. Marino,et al.  An Adversarial Approach for Explainable AI in Intrusion Detection Systems , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.

[104]  Chuan-Yu Chang,et al.  Network Anomaly Detection inside Consumer Networks—A Hybrid Approach , 2020, Electronics.

[105]  Yongzhong Li,et al.  Intrusion Detection Algorithm Based on Semi-supervised Learning , 2011, 2011 International Conference of Information Technology, Computer Engineering and Management Sciences.

[106]  Mohamed Rida,et al.  A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection , 2018, Comput. Secur..

[107]  Sheng Wang,et al.  BAT: Deep Learning Methods on Network Intrusion Detection Using NSL-KDD Dataset , 2020, IEEE Access.

[108]  Jinping Liu,et al.  Adaptive intrusion detection via GA-GOGMM-based pattern learning with fuzzy rough set-based attribute selection , 2020, Expert Syst. Appl..

[109]  R. Polikar,et al.  An incremental learning algorithm with confidence estimation for automated identification of NDE signals , 2004, IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control.

[110]  Shie-Jue Lee,et al.  Network intrusion detection using equality constrained-optimization-based extreme learning machines , 2018, Knowl. Based Syst..

[111]  Ekin D. Cubuk,et al.  A Fourier Perspective on Model Robustness in Computer Vision , 2019, NeurIPS.

[112]  B. Surendiran,et al.  Dimensionality reduction using Principal Component Analysis for network intrusion detection , 2016 .

[113]  Xiangjian He,et al.  Network Intrusion Detection based on LDA for payload feature selection , 2010, 2010 IEEE Globecom Workshops.

[114]  Rose Qingyang Hu,et al.  Data-Driven Edge Intelligence for Robust Network Anomaly Detection , 2020, IEEE Transactions on Network Science and Engineering.

[115]  Andreas Hotho,et al.  Flow-based benchmark data sets for intrusion detection , 2017 .

[116]  Yann LeCun,et al.  Signature Verification Using A "Siamese" Time Delay Neural Network , 1993, Int. J. Pattern Recognit. Artif. Intell..

[117]  Feng Xie,et al.  Data fusion detection model based on SVM and evidence theory , 2012, 2012 IEEE 14th International Conference on Communication Technology.

[118]  Julio Ortega Lopera,et al.  PCA filtering and probabilistic SOM for network intrusion detection , 2015, Neurocomputing.

[119]  Arputharaj Kannan,et al.  Network intrusion detection system using genetic network programming with support vector machine , 2012, ICACCI '12.

[120]  Huyin Zhang,et al.  Network Intrusion Detection Based on PSO-Xgboost Model , 2020, IEEE Access.

[121]  Erdogan Dogdu,et al.  Intrusion Detection Using Big Data and Deep Learning Techniques , 2019, ACM Southeast Regional Conference.

[122]  Nick Cercone,et al.  Applying Knowledge Discovery to Predict Water-Supply Consumption , 1997, IEEE Expert.

[123]  Dan Wang,et al.  An Effective Feature Selection Approach for Network Intrusion Detection , 2013, 2013 IEEE Eighth International Conference on Networking, Architecture and Storage.

[124]  Ying Gao,et al.  A Novel Semi-Supervised Learning Approach for Network Intrusion Detection on Cloud-Based Robotic System , 2018, IEEE Access.

[125]  Andrew J. Clark,et al.  Data preprocessing for anomaly based network intrusion detection: A review , 2011, Comput. Secur..

[126]  Dong YuanTong Research of Intrusion Detection Method Based on IL-FSVM , 2019, 2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC).

[127]  Yu Lasheng,et al.  Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection , 2018, IEEE Access.

[128]  Nicholas Kolokotronis,et al.  A Novel Online Incremental Learning Intrusion Prevention System , 2019, 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS).

[129]  Gail-Joon Ahn,et al.  vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems , 2018, CCS.

[130]  Ali Bou Nassif,et al.  Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection , 2019, Comput. Networks.

[131]  Shi-Jinn Horng,et al.  A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..

[132]  Manas Ranjan Patra,et al.  A Hybrid Intelligent Approach for Network Intrusion Detection , 2012 .

[133]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[134]  Jiadong Ren,et al.  A Novel Multimodal-Sequential Approach Based on Multi-View Features for Network Intrusion Detection , 2019, IEEE Access.

[135]  Jinping Liu,et al.  ANID-SEoKELM: Adaptive network intrusion detection based on selective ensemble of kernel ELMs with random features , 2019, Knowl. Based Syst..

[136]  Fan Zhang,et al.  An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units , 2018, IEEE Access.

[137]  Sandra Scott-Hayward,et al.  Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs , 2019, 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN).

[138]  Xiaojiang Du,et al.  Adversarial Attacks for Image Segmentation on Multiple Lightweight Models , 2020, IEEE Access.

[139]  Aili Wang,et al.  Network Intrusion Detection Combined Hybrid Sampling With Deep Hierarchical Network , 2020, IEEE Access.

[140]  Michele Colajanni,et al.  Evading Botnet Detectors Based on Flows and Random Forest with Adversarial Samples , 2018, 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA).

[141]  Shahram Sarkani,et al.  A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier , 2012, Expert Syst. Appl..

[142]  I. Sumaiya Thaseen,et al.  An integrated intrusion detection model using consistency based feature selection and LPBoost , 2016, 2016 Online International Conference on Green Engineering and Technologies (IC-GET).

[143]  V. S. Shankar Sriram,et al.  Development of Rough Set - Hypergraph Technique for Key Feature Identification in Intrusion Detection Systems , 2017, Comput. Electr. Eng..

[144]  Hadis Karimipour,et al.  Cyber intrusion detection by combined feature selection algorithm , 2019, J. Inf. Secur. Appl..

[145]  Shuyu Chen,et al.  Incremental k-NN SVM method in intrusion detection , 2017, 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS).

[146]  Mahesh Shirole,et al.  Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternatives , 2018, 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS).

[147]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[148]  Kasun Amarasinghe,et al.  Explaining What a Neural Network has Learned: Toward Transparent Classification , 2019, 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[149]  ShiYong,et al.  An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization , 2016 .

[150]  R. Newman Computer Security: Protecting Digital Resources , 2009 .

[151]  Punam Bedi,et al.  Siam-IDS: Handling class imbalance problem in Intrusion Detection Systems using Siamese Neural Network , 2020 .

[152]  Ilsun You,et al.  Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A Survey of Some Problems and Solutions , 2012, 2012 15th International Conference on Network-Based Information Systems.

[153]  Yonghao Gu,et al.  Semi-Supervised K-Means DDoS Detection Method Using Hybrid Feature Selection Algorithm , 2019, IEEE Access.

[154]  Andreas Hotho,et al.  A Survey of Network-based Intrusion Detection Data Sets , 2019, Comput. Secur..

[155]  William Eberle,et al.  Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response , 2020, AAAI Spring Symposium: Combining Machine Learning with Knowledge Engineering.

[156]  B. Ravichandran,et al.  Statistical traffic modeling for network intrusion detection , 2000, Proceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728).

[157]  Miad Faezipour,et al.  Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic , 2019, IEEE Sensors Letters.

[158]  Kensuke Fukuda,et al.  MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking , 2010, CoNEXT.

[159]  Belaid Moa,et al.  Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking , 2020, Comput. Secur..

[160]  Marina Thottan,et al.  Anomaly detection in IP networks , 2003, IEEE Trans. Signal Process..

[161]  Mohanad Sarhan,et al.  An Explainable Machine Learning-based Network Intrusion Detection System for Enabling Generalisability in Securing IoT Networks , 2021, ArXiv.

[162]  Andreas Hotho,et al.  Flow-based Network Traffic Generation using Generative Adversarial Networks , 2018, Comput. Secur..

[163]  Nacira Ghoualmi Zine,et al.  A New Approach for Adaptive Intrusion Detection , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.

[164]  MANABU ICHINO,et al.  Optimum feature selection by zero-one integer programming , 1984, IEEE Transactions on Systems, Man, and Cybernetics.

[165]  Zhong Ming,et al.  An improved NSGA-III algorithm for feature selection used in intrusion detection , 2017, Knowl. Based Syst..

[166]  Kangfeng Zheng,et al.  An Explainable Machine Learning Framework for Intrusion Detection Systems , 2020, IEEE Access.

[167]  Tong Li,et al.  Conditional Wasserstein generative adversarial network-gradient penalty-based approach to alleviating imbalanced data classification , 2020, Inf. Sci..

[168]  Dedy Dwi Prastyo,et al.  Robust adaptive multivariate Hotelling's T2 control chart based on kernel density estimation for intrusion detection system , 2020, Expert Syst. Appl..

[169]  Diego Reforgiato Recupero,et al.  A Discretized Extended Feature Space (DEFS) Model to Improve the Anomaly Detection Performance in Network Intrusion Detection Systems , 2019, KDIR.

[170]  Abderezak Touzene,et al.  Fast Binary Network Intrusion Detection based on Matched Filter Optimization , 2020, 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT).

[171]  Jill Slay,et al.  The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems , 2015, 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

[172]  Milos Manic,et al.  Toward Explainable Deep Neural Network Based Anomaly Detection , 2018, 2018 11th International Conference on Human System Interaction (HSI).

[173]  Simon S. Woo,et al.  CANTransfer: transfer learning based intrusion detection on a controller area network using convolutional LSTM network , 2020, SAC.

[174]  Yuya Tarutani,et al.  Toward an Online Network Intrusion Detection System Based on Ensemble Learning , 2019, 2019 IEEE 12th International Conference on Cloud Computing (CLOUD).

[175]  Ji Won Kim,et al.  CNN-Based Network Intrusion Detection against Denial-of-Service Attacks , 2020, Electronics.

[176]  Arputharaj Kannan,et al.  Intelligent feature selection and classification techniques for intrusion detection in networks: a survey , 2013, EURASIP Journal on Wireless Communications and Networking.

[177]  Ajith Abraham,et al.  Intrusion detection using error correcting output code based ensemble , 2014, 2014 14th International Conference on Hybrid Intelligent Systems.

[178]  Yasser Morgan,et al.  Real-time Support Vector Machine based Network Intrusion Detection system using Apache Storm , 2016, 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).

[179]  André C. Drummond,et al.  A Survey of Random Forest Based Methods for Intrusion Detection Systems , 2018, ACM Comput. Surv..

[180]  Wei Xu,et al.  Incremental SVM based on reserved set for network intrusion detection , 2011, Expert Syst. Appl..

[181]  Hongpo Zhang,et al.  An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset , 2020, Comput. Networks.

[182]  Ali A. Ghorbani,et al.  Improved competitive learning neural networks for network intrusion and fraud detection , 2012, Neurocomputing.

[183]  Sachin Tripathi,et al.  An efficient feature selection based Bayesian and Rough set approach for intrusion detection , 2020, Appl. Soft Comput..

[184]  Steven Furnell,et al.  D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks , 2014 .

[185]  Maja J. Matarić A Comparative Analysis of Reinforcement Learning Methods , 1991 .

[186]  Christos Faloutsos,et al.  Spotting Suspicious Behaviors in Multimodal Data: A General Metric and Algorithms , 2016, IEEE Transactions on Knowledge and Data Engineering.

[187]  Todd L. Heberlein,et al.  Network intrusion detection , 1994, IEEE Network.

[188]  Noorhaniza Wahid,et al.  A hybrid network intrusion detection system using simplified swarm optimization (SSO) , 2012, Appl. Soft Comput..

[189]  Ying Wang,et al.  Research on Intrusion Detection Model using ensemble learning methods , 2016, 2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS).

[190]  Seyed Mojtaba Hosseini Bamakan,et al.  An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization , 2016, Neurocomputing.

[191]  Mansoor Alam,et al.  A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.

[192]  Xiaoming Pan,et al.  A Naive Feature Selection Method and Its Application in Network Intrusion Detection , 2010, 2010 International Conference on Computational Intelligence and Security.