Machine Learning Approaches for Intrusion Detection in Modern Networks

Authors

  • Anuja Chauhan Akhil Bharatiya Maratha Shikshan Parishad’s Anantrao Pawar College of Engineering and Research, Pune, India Author

DOI:

https://doi.org/10.15662/IJARCST.2023.0605002

Keywords:

Machine Learning, Intrusion Detection Systems, Network Security, Supervised Learning, Unsupervised Learning, Deep Learning, Feature Selection, Anomaly Detection, Cyber ThreatsMDPI+1MDPI+6SpringerOpen+6arXiv+6MDPI+8arXiv+8arXiv+8

Abstract

Machine learning (ML) has emerged as a pivotal tool in enhancing the efficacy of intrusion detection systems (IDS) within modern networks. Traditional signature-based IDS methods often falter against novel or sophisticated attacks due to their reliance on predefined patterns. In contrast, ML-based IDS can autonomously learn from data, identifying complex attack patterns and adapting to evolving threats.

This paper provides a comprehensive review of ML techniques employed in IDS, focusing on their application in contemporary network environments. We examine various ML algorithms, including supervised, unsupervised, and deep learning models, highlighting their strengths and limitations in detecting a wide array of network intrusions. Additionally, we explore the challenges associated with implementing ML in IDS, such as data imbalance, feature selection, and model interpretability.

Through an analysis of recent studies and datasets, we assess the performance of different ML approaches in real-world scenarios. The findings underscore the importance of selecting appropriate algorithms and preprocessing techniques to optimize detection accuracy and minimize false positives. Furthermore, we discuss the integration of ML-based IDS with existing network security infrastructures and the potential for real-time threat detection.

In conclusion, while ML offers significant advancements in IDS, ongoing research is essential to address existing challenges and enhance the robustness of these systems against emerging cyber threats.

References

1. Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. 2010 IEEE Symposium on Security and Privacy, 305-316.

2. Liao, H.-J., Lin, C.-H. R., Lin, Y.-C., & Tung, K.-Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1), 16-24.

3. Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.

4. Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access, 5, 21954-21961.

5. Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2017). Applying convolutional neural network for network intrusion detection. Proceedings of the International Conference on Advances in Computing, Communications and Informatics, 1222-1228.

6. Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018). Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSP, 108-116.

7. Javaid, A., Niyaz, Q., Sun, W., & Alam, M. (2016). A deep learning approach for network intrusion detection system. EAI International Conference on Bio-inspired Information and Communications Technologies, 21-26.

Downloads

Published

2023-09-01

How to Cite

Machine Learning Approaches for Intrusion Detection in Modern Networks. (2023). International Journal of Advanced Research in Computer Science & Technology(IJARCST), 6(5), 8964-8968. https://doi.org/10.15662/IJARCST.2023.0605002