Review of Machine Learning Algorithm for Intrusion Detection System

Authors

  • Guntoro Guntoro

Keywords:

Intrusion Detection System, Machine Learning, Review, SLR

Abstract

Intrusion Detection Systems (IDS) are essential components in cybersecurity that aim to detect, identify, and mitigate threats to information systems. In recent years, the application of machine learning algorithms has significantly enhanced the effectiveness of IDS. This systematic literature review (SLR) analyzes and summarizes research studies on IDS using machine learning techniques from 2019 to 2023. The review focuses on key aspects such as datasets, machine learning algorithms, and types of attacks detected. The analysis reveals that Support Vector Machine (SVM) and Random Forest (RF) are the most frequently employed algorithms due to their high accuracy and robustness. Datasets such as NSL-KDD, KDD-Cup’99, and UNSW-NB15 are commonly used for training and evaluating IDS models. Various attack types, including Denial of Service (DoS), User to Root (U2R), Remote to Local (R2L), and Probing, are addressed in these studies. This SLR highlights the strengths and limitations of different machine learning approaches in IDS, offering insights into current trends and future research directions. The findings suggest a growing trend towards the use of ensemble methods and optimization techniques to improve IDS performance. Additionally, the review underscores the importance of diverse and realistic datasets for the accurate evaluation of IDS models. This comprehensive analysis aims to provide researchers and practitioners with a detailed understanding of the advancements in IDS using machine learning, guiding future research and development in this critical area of cybersecurity

References

Abdulrahman, A. A., & Ibrahem, M. K. (2021). Intrusion detection system using data stream classification. Iraqi Journal of Science, 62(1), 319–328. https://doi.org/10.24996/ijs.2021.62.1.30

Ajdani, M., & Ghaffary, H. (2021a). Design network intrusion detection system using support vector machine. International Journal of Communication Systems, 34(3), 1–10. https://doi.org/10.1002/dac.4689

Ajdani, M., & Ghaffary, H. (2021b). Introduced a new method for enhancement of intrusion detection with random forest and PSO algorithm. Security and Privacy, 4(2), 1–10. https://doi.org/10.1002/spy2.147

Alamiedy, T. A., Anbar, M., Alqattan, Z. N. M., & Alzubi, Q. M. (2020). Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm. Journal of Ambient Intelligence and Humanized Computing, 11(9), 3735–3756. https://doi.org/10.1007/s12652-019-01569-8

Albahar, M. A., Binsawad, M., Almalki, J., & ... (2020). Improving intrusion detection system using artificial neural network. (IJACSA) International Journal of Advanced Computer Science and Applications, 11(6), 578–588. https://doi.org/https://dx.doi.org/10.14569/IJACSA.2020.0110670

Ali, A. H., Aljanabi, M., & Ahmed, M. A. (2020). Fuzzy generalized hebbian algorithm for large-scale intrusion detection system. International Journal of Integrated Engineering, 12(1), 81–90. https://doi.org/10.30880/ijie.2020.12.01.008

Altwaijry, H., & Algarny, S. (2012). Bayesian based intrusion detection system. Journal of King Saud University - Computer and Information Sciences, 24(1), 1–6. https://doi.org/10.1016/j.jksuci.2011.10.001

Al-Yaseen, W. L. (2019). Improving intrusion detection system by developing feature selection model based on firefly algorithm and support vector machine. IAENG International Journal of Computer Science, 46(4), 1–7. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85077145406&partnerID=40&md5=ccf0f8fb4257444332c608c72ca10255

Anitha, P., & Kaarthick, B. (2021). Oppositional based Laplacian grey wolf optimization algorithm with SVM for data mining in intrusion detection system. Journal of Ambient Intelligence and Humanized Computing, 12(3), 3589–3600. https://doi.org/10.1007/s12652-019-01606-6

Aziz, M. N., & Ahmad, T. (2021). Clustering under-sampling data for improving the performance of intrusion detection system. Journal of Engineering Science and Technology, 16(2), 1342–1355.

Balyan, A. K., Ahuja, S., Lilhore, U. K., Sharma, S. K., Manoharan, P., Algarni, A. D., Elmannai, H., & Raahemifar, K. (2022). A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method. In Sensors (Vol. 22, Issue 16). https://doi.org/10.3390/s22165986

Bhati, B. S., & Rai, C. S. (2019). Analysis of Support Vector Machine-based Intrusion Detection Techniques. Arabian Journal for Science and Engineering, 45(4), 2371–2383. https://doi.org/10.1007/s13369-019-03970-z

Chang, W.-Y., Chen, Y.-L., Chen, H., & Tsai, C.-W. (2020). An Effective Hyperparameter Selection for Deep Learning Algorithm in Intrusion Detection System. Communications_of_the_CCISA, 26(4), 1–16.

Chen, F., Cheng, R., Zhu, Y., Miao, S., & Zhou, L. (2020). An Intrusion Detection Method for Enterprise Network Based on Backpropagation Neural Network. Ingenierie Des Systemes d’Information, 25(3), 377–382. https://doi.org/10.18280/isi.250313

Dwivedi, S., Vardhan, M., & Tripathi, S. (2022). Defense against distributed DoS attack detection by using intelligent evolutionary algorithm. International Journal of Computers and Applications, 44(3), 219–229. https://doi.org/10.1080/1206212X.2020.1720951

Farooq, M. (2022). Supervised Learning Techniques for Intrusion Detection System based on Multi-layer Classification Approach. International Journal of Advanced Computer Science and Applications, 13(3), 311–315. https://doi.org/10.14569/IJACSA.2022.0130338

Farzadnia, E., Shirazi, H., & Nowroozi, A. (2021). A New Intrusion Detection System Using the Improved Dendritic Cell Algorithm. Computer Journal, 64(8), 1193–1214. https://doi.org/10.1093/comjnl/bxaa140

Gurung, S., Kanti Ghose, M., & Subedi, A. (2019). Deep Learning Approach on Network Intrusion Detection System using NSL-KDD Dataset. International Journal of Computer Network and Information Security, 11(3), 8–14. https://doi.org/10.5815/ijcnis.2019.03.02

Guntoro, G., Lisnawita, L., & Costaner, L. (2024). Enhancing Cybersecurity: Innovative Hybrid Feature Selection for Intrusion Detection. https://doi.org/10.4108/eai.30-10-2023.2343092

Hamza, M. A., Abdalla Hashim, A. H., Mohamed, H. G., Alotaibi, S. S., Mahgoub, H., Mehanna, A. S., & Motwakel, A. (2022). Hyperparameter Tuned Deep Learning Enabled Intrusion Detection on Internet of Everything Environment. Computers, Materials and Continua, 73(3), 6579–6594. https://doi.org/10.32604/cmc.2022.031303

Iqbal, A., & Aftab, S. (2019). A feed-forward and pattern recognition ANN model for network intrusion detection. International Journal of Computer Network and Information Security (IJCNIS), 4(3), 19–25. https://doi.org/10.5815/ijcnis.2019.04.03

Kasongo, S. M., & Sun, Y. (2020). Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW-NB15 Dataset. Journal of Big Data, 7(1). https://doi.org/10.1186/s40537-020-00379-6

Khan, M. A., Iqbal, N., Imran, Jamil, H., & Kim, D.-H. (2023). An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection. Journal of Network and Computer Applications, 212, 103560. https://doi.org/https://doi.org/10.1016/j.jnca.2022.103560

Khonde, S. R., & Ulagamuthalvi, V. (2019). Ensemble-based semi-supervised learning approach for a distributed intrusion detection system. Journal of Cyber Security Technology ISSN:, 3(3), 1–26. https://doi.org/10.1080/23742917.2019.1623475

Kilichev, D., & Kim, W. (2023). Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO. Mathematics, 11(17), 1–31. https://doi.org/10.3390/math11173724

Kocher, G., & Kumar, G. (2021). Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset. International Journal of Network Security & Its Applications, 13(1), 21–31. https://doi.org/10.5121/ijnsa.2021.13102

Konasani, V. R., & Kadre, S. (2021). Machine Learning and Deep Learning Using Python and TensorFlow. In Machine Learning and Deep Learning Using Python and TensorFlow. https://www.accessengineeringlibrary.com/content/book/9781260462296%0Ahttps://www.accessengineeringlibrary.com/content/book/9781260462296.abstract

Kshirsagar, D., & Kumar, S. (2021). An efficient feature reduction method for the detection of DoS attack. ICT Express, 7(3), 371–375. https://doi.org/https://doi.org/10.1016/j.icte.2020.12.006

Kunang, Y. N., Nurmaini, S., Stiawan, D., & Suprapto, B. Y. (2020). Improving Classification Attacks in IOT Intrusion Detection System using Bayesian Hyperparameter Optimization. 2020 3rd International Seminar on Research of Information Technology and Intelligent Systems, ISRITI 2020, 146–151. https://doi.org/10.1109/ISRITI51436.2020.9315360

Kunang, Y. N., Nurmaini, S., Stiawan, D., & Suprapto, B. Y. (2021). Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. Journal of Information Security and Applications, 58. https://doi.org/10.1016/j.jisa.2021.102804

Logeswari, G., Bose, S., & Anitha, T. (2023). An Intrusion Detection System for SDN Using Machine Learning. Intelligent Automation and Soft Computing, 35(1), 867–880. https://doi.org/10.32604/iasc.2023.026769

Maniriho, P., Mahoro, L. J., Niyigaba, E., Bizimana, Z., & ... (2020). Detecting intrusions in computer network traffic with machine learning approaches. International Journal of Intelligent Engineering and Systems, 13(3), 433–445. 10.22266/ijies2020.0630.39

Maseer, Z. K., Yusof, R., Bahaman, N., Mostafa, S. A., & Foozy, C. F. M. (2021). Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset. IEEE Access, 9, 22351–22370. https://doi.org/10.1109/ACCESS.2021.3056614

Masum, M., Shahriar, H., Haddad, H., Faruk, M. J. H., Valero, M., Khan, M. A., Rahman, M. A., Adnan, M. I., Cuzzocrea, A., & Wu, F. (2021). Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection. Proceedings - 2021 IEEE International Conference on Big Data, Big Data 2021, Ml, 5413–5419. https://doi.org/10.1109/BigData52589.2021.9671576

Mazini, M., Shirazi, B., & Mahdavi, I. (2019). Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. Journal of King Saud University - Computer and Information Sciences, 31(4), 541–553. https://doi.org/10.1016/j.jksuci.2018.03.011

Mebawondu, J. O., Alowolodu, O. D., Mebawondu, J. O., & Adetunmbi, A. O. (2020a). Network intrusion detection system using supervised learning paradigm. Scientific African, 9, e00497. https://doi.org/https://doi.org/10.1016/j.sciaf.2020.e00497

Mebawondu, J. O., Alowolodu, O. D., Mebawondu, J. O., & Adetunmbi, A. O. (2020b). Network intrusion detection system using supervised learning paradigm. Scientific African, 9, e00497. https://doi.org/10.1016/j.sciaf.2020.e00497

Meira, J., Andrade, R., Praça, I., Carneiro, J., Bolón-Canedo, V., Alonso-Betanzos, A., & Marreiros, G. (2020). Performance evaluation of unsupervised techniques in cyber-attack anomaly detection. Journal of Ambient Intelligence and Humanized Computing, 11(11), 4477–4489. https://doi.org/10.1007/s12652-019-01417-9

Mighan, S. N., & Kahani, M. (2021). A novel scalable intrusion detection system based on deep learning. International Journal of Information Security, 20(3), 387–403. https://doi.org/10.1007/s10207-020-00508-5

Mousavi, S. M., Majidnezhad, V., & Naghipour, A. (2019). A new intelligent intrusion detector based on ensemble of decision trees. Journal of Ambient Intelligence and Humanized Computing, 13(7), 3347–3359. https://doi.org/10.1007/s12652-019-01596-5

Thakkar, A., & Lohiya, R. (2022). A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions. In Artificial Intelligence Review (Vol. 55, Issue 1). Springer Netherlands. https://doi.org/10.1007/s10462-021-10037-9

Thaseen, I. S., Kumar, C. A., & Ahmad, A. (2019). Integrated Intrusion Detection Model Using Chi-Square Feature Selection and Ensemble of Classifiers. Arabian Journal for Science and Engineering, 44(4), 3357–3368. https://doi.org/10.1007/s13369-018-3507-5

Velliangiri, S. (2020). A hybrid BGWO with KPCA for intrusion detection. Journal of Experimental and Theoretical Artificial Intelligence, 32(1), 165–180. https://doi.org/10.1080/0952813X.2019.1647558

Wu, T., Fan, H., Zhu, H., You, C., Zhou, H., & Huang, X. (2022). Intrusion detection system combined enhanced random forest with SMOTE algorithm. Eurasip Journal on Advances in Signal Processing, 2022(1). https://doi.org/10.1186/s13634-022-00871-6

Guntoro, G., & Omar, M. N. B. (2024). A Systematic Literature Review of Intrusion Detection System in Network Security. In Communications in computer and information science (pp. 96–107). https://doi.org/10.1007/978-981-99-9589-9_8

Downloads

Published

2024-06-29

How to Cite

Review of Machine Learning Algorithm for Intrusion Detection System. (2024). ComniTech : Journal of Computational Intelligence and Informatics , 1(1), 26-37. https://journal.unilak.ac.id/index.php/ComniTech/article/view/21352