首页 | 本学科首页   官方微博 | 高级检索  
     


Intrusion detection by machine learning: A review
Authors:Chih-Fong Tsai  Yu-Feng Hsu  Chia-Ying Lin  Wei-Yang Lin
Affiliation:1. Department of Information Management, National Central University, Taiwan;2. Department of Information Management, National Sun Yat-Sen University, Taiwan;3. Department of Accounting and Information Technology, National Chung Cheng University, Taiwan;4. Department of Computer Science and Information Engineering, National Chung Cheng University, Taiwan;1. Department of Computer Science and Information Engineering, Hwa Hsia University of Technology, Taiwan;2. Department of Information and Computer Engineering, Chung Yuan Christian University, Taiwan;3. Department of Information Management, National Central University, Taiwan;1. Faculty of Computer and Information Technology, Jordan University of Science and Technology, Irbid, Jordan;2. College of Technological Innovation, Zayed University, United Arab Emirates;1. Computer Science Department, State University of Londrina (UEL), Rodovia Celso Garcia Cid, S/N, 86057-970 Londrina, Brazil;2. School of Computer Science (FACOM), Federal University of Uberlândia (UFU), Uberlândia, Brazil;1. Institute for IT Convergence, KAIST, Guseong-dong, Yuseong-gu, Daejeon 305-701, South Korea;2. Future Research Creative Laboratory, ETRI 218 Gajeong-ro, Yuseong-gu, Daejeon 305-700, South Korea
Abstract:The popularity of using Internet contains some risks of network attacks. Intrusion detection is one major research problem in network security, whose aim is to identify unusual access or attacks to secure internal networks. In literature, intrusion detection systems have been approached by various machine learning techniques. However, there is no a review paper to examine and understand the current status of using machine learning techniques to solve the intrusion detection problems. This chapter reviews 55 related studies in the period between 2000 and 2007 focusing on developing single, hybrid, and ensemble classifiers. Related studies are compared by their classifier design, datasets used, and other experimental setups. Current achievements and limitations in developing intrusion detection systems by machine learning are present and discussed. A number of future research directions are also provided.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号