Abstract
This extensive review aims to classify the Intrusion Detection System (IDS) and various machine learning and deep learning (ML/DL) approaches used for IDS. The survey also addresses security, which is a concern with the Internet of Things. Several types of intrusion detection systems (IDSs), including shallow and deep learning methods and various learning algorithms to aid intrusion detection, are also categorized. This research expands on Network Intrusion Detection Systems and investigates techniques for improving their performance. It provides a more comprehensive understanding of deep and shallow learning methodologies with their benefits and drawbacks. The study component examines IDS classification, feature extraction techniques, machine learning, deep learning, and examples of how these may be applied. The essence of this review will establish a viable approach to assist professionals in modeling trustworthy and powerful IDS based on real-time requirements. Because the methods of intrusions and cyberattacks in networks are constantly evolving, it attracted the interest of many scholars and industrial professionals. However, cyber specialists struggle to develop an accurate and effective Intrusion Detection System (IDS). In addition, an increasing number of devices has resulted in more complicated network topology, raising security risks. As a result, a lengthy and exhaustive review is indispensable while developing a secure communication system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chand, N., Mishra, P., Krishna, C.R., Pilli, E.S., Govil, M.C.: A comparative analysis of SVM and its stacking with other classification algorithm for intrusion detection. In: 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring), pp. 1–6. IEEE, April 2016
Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Netw. 8(3), 26–41 (1994)
Jonnalagadda, S.K., Reddy, R.P.: A literature survey and comprehensive study of intrusion detection. Int. J. Comput. Appl. 81(16), 40–47 (2013)
Mitchell, R., Chen, I.R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 1–29 (2014)
Masduki, B.W., Ramli, K., Saputra, F.A., Sugiarto, D.: Study on implementation of machine learning methods combination for improving attacks detection accuracy on Intrusion Detection System (IDS). In: 2015 International Conference on Quality in Research (QiR), pp. 56–64. IEEE, August 2015
Hodo, E., Bellekens, X., Iorkyase, E., Hamilton, A., Tachtatzis, C., Atkinson, R.: Machine learning approach for detection of nontor traffic. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, pp. 1–6, August 2017
Debar, H., Dacier, M., Wespi, A.: A revised taxonomy for intrusion-detection systems. Ann. Télécommun. 55(7), 361–378 (2000)
Axelsson, S.: Intrusion detection systems: a survey and taxonomy. 2000. Chalmers University of Technology, Goteborg, Sweden (2005)
hafez Amer, S., Hamilton Jr, J.A.: Intrusion detection systems (IDS) taxonomy-a short review. This is a paid advertisement. STN 13-2 June 2010: Defensive Cyber Secur.: Policies Procedures 2, 23 (2010)
Xenakis, C., Panos, C., Stavrakakis, I.: A comparative evaluation of intrusion detection architectures for mobile ad hoc networks. Comput. Secur. 30(1), 63–80 (2011)
Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)
Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Comput. Netw. 31(8), 805–822 (1999)
Mounji, A., Le Charlier, B.: Continuous assessment of a unix configuration: Integrating intrusion detection and configuration analysis. In: Proceedings of SNDSS 1997: Internet Society 1997 Symposium on Network and Distributed System Security, pp. 27–35. IEEE, February 1997
Liu, S., et al.: A flow-based method to detect penetration. In: The 7th IEEE/International Conference on Advanced Infocomm Technology, pp. 184–191. IEEE, November 2014
Kozushko, H.: Intrusion detection: host-based and network-based intrusion detection systems. Independent Study 11, 1–23 (2003)
Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)
Qayyum, A., Islam, M.H., Jamil, M.: Taxonomy of statistical based anomaly detection techniques for intrusion detection. In: Proceedings of the IEEE Symposium on Emerging Technologies, pp. 270–276. IEEE, September 2005
Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009)
Pillai, T.R., Palaniappan, S., Abdullah, A., Imran, H.M.: Predictive modeling for intrusions in communication systems using GARMA and ARMA models. In: 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), pp. 1–6. IEEE, February 2015
Debar, H., Becker, M., Siboni, D.: A neural network component for an intrusion detection system. In: Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, p. 240. IEEE Computer Society, May 1992
Lunt, T.F.: A survey of intrusion detection techniques. Comput. Secur. 12(4), 405–418 (1993)
Poston, H.E.: A brief taxonomy of intrusion detection strategies. In: 2012 IEEE National Aerospace and Electronics Conference (NAECON), pp. 255–263. IEEE, July 2012
Kuperman, B.A.: A categorization of computer security monitoring systems and the impact on the design of audit sources. Doctoral dissertation, Purdue University (2004)
Ghorbani, A.A., Lu, W., Tavallaee, M.: Network attacks. In: Ghorbani, A.A., Lu, W., Tavallaee, M. (eds.) Network Intrusion Detection and Prevention. Advances in Information Security, vol. 47, pp. 1–25. Springer, Boston (2010). https://doi.org/10.1007/978-0-387-88771-5_1
Nguyen, H.T., Franke, K., Petrovic, S.: Feature extraction methods for intrusion detection systems. In: Threats, Countermeasures, and Advances in Applied Information Security, pp. 23–52. IGI Global (2012)
Mahoney, M.V., Chan, P.K.: An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection. In: Vigna, G., Kruegel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 220–237. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45248-5_13
Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. (TiSSEC) 3(4), 227–261 (2000)
Onik, A.R., Haq, N.F., Mustahin, W.: Cross-breed type Bayesian network based intrusion detection system (CBNIDS). In: 2015 18th International Conference on Computer and Information Technology (ICCIT), pp. 407–412. IEEE, December 2015
Bode, M.A., Oluwadare, S.A., Alese, B.K., Thompson, A.F.B.: Risk analysis in cyber situation awareness using Bayesian approach. In: 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1–12. IEEE, June 2015
Padmadas, M., Krishnan, N., Kanchana, J., Karthikeyan, M.: Layered approach for intrusion detection systems based genetic algorithm. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–4. IEEE, December 2013
Wang, G., Yeung, D.Y., Lochovsky, F.H.: A kernel path algorithm for support vector machines. In: Proceedings of the 24th International Conference on Machine Learning, pp. 951–958, June 2007
Burges, C.J.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Disc. 2(2), 121–167 (1998)
Senthilnayaki, B., Venkatalakshmi, K., Kannan, A.: Intrusion detection using optimal genetic feature selection and SVM based classifier. In: 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN), pp. 1–4. IEEE, March 2015
Shi, K., Li, L., Liu, H., He, J., Zhang, N., Song, W.: An improved KNN text classification algorithm based on density. In: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, pp. 113–117. IEEE, September 2011
Canbay, Y., Sagiroglu, S.: A hybrid method for intrusion detection. In: 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), pp. 156–161. IEEE, December 2015
Zhang, H., Chen, G.: The research of face recognition based on PCA and K-nearest neighbor. In: 2012 Symposium on Photonics and Optoelectronics, pp. 1–4. IEEE, May 2012
Mahrishi, M., Hiran, K.K., Meena, G., Sharma, P. (eds.): Machine Learning and Deep Learning in Real-Time Applications. IGI Global (2020)
Sebastiani, F.: Machine learning in automated text categorization. ACM Comput. Surv. (CSUR) 34(1), 1–47 (2002)
Sahu, S., Mehtre, B.M.: Network intrusion detection system using J48 decision tree. In: 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2023–2026. IEEE, August 2015
Rajasekaran, S., Pai, G.V.: Neural Networks, Fuzzy Logic and Genetic Algorithm: Synthesis and Applications (with CD). PHI Learning Pvt. Ltd. (2003)
Wahengbam, M., Marchang, N.: Intrusion detection in manet using fuzzy logic. In: 2012 3rd National Conference on Emerging Trends and Applications in Computer Science, pp. 189–192. IEEE, March 2012
Toosi, A.N., Kahani, M.: A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput. Commun. 30(10), 2201–2212 (2007)
Om, H., Kundu, A.: A hybrid system for reducing the false alarm rate of anomaly intrusion detection system. In: 2012 1st International Conference on Recent Advances in Information Technology (RAIT), pp. 131–136. IEEE, March 2012
Gupta, S.: An effective model for anomaly IDS to improve the efficiency. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 190–194. IEEE, October 2015
Ayed, A.B., Halima, M.B., Alimi, A.M.: Survey on clustering methods: towards fuzzy clustering for big data. In: 2014 6th International conference of soft computing and pattern recognition (SoCPaR), pp. 331–336. IEEE, August 2014
Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1–35 (2010)
Dong, S., Zhou, D., Ding, W.: The study of network traffic identification based on machine learning algorithm. In: 2012 Fourth International Conference on Computational Intelligence and Communication Networks, pp. 205–208. IEEE, November 2012
Bi, J., Zhang, K., Cheng, X.: Intrusion detection based on RBF neural network. In: 2009 International Symposium on Information Engineering and Electronic Commerce, pp. 357–360. IEEE, May 2009
Zhang, C., Jiang, J., Kamel, M.: Comparison of BPL and RBF network in intrusion detection system. In: Wang, G., Liu, Q., Yao, Y., Skowron, A. (eds.) RSFDGrC 2003. LNCS, vol. 2639, pp. 466–470. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-39205-X_79
Barapatre, P., Tarapore, N. Z., Pukale, S.G., Dhore, M. L.: Training MLP neural network to reduce false alerts in IDS. In: 2008 International Conference on Computing, Communication and Networking, pp. 1–7. IEEE, December 2008
Murphy, K.P.: Machine Learning: A Probabilistic Perspective. MIT Press, Cambridge (2012)
Meena, G., Dhanwal, B., et al.: Performance comparison of network intrusion detection system based on different pre-processing methods and deep neural network. In: Proceedings of the International Conference on Data Science, Machine Learning and Artificial Intelligence, pp. 110–115. ACM (2021)
Kumar, V.D., Radhakrishnan, S.: Intrusion detection in MANET using self organizing map (SOM). In: 2014 International Conference on Recent Trends in Information Technology, pp. 1–8. IEEE, April 2014
Hinton, G.E., Osindero, S., Teh, Y.W.: A fast learning algorithm for deep belief nets. Neural Comput. 18(7), 1527–1554 (2006)
Ng, A., et al.: Unsupervised feature learning and deep learning tutorial. CS294A Lecture (2013)
Bengio, Y.: Learning Deep Architectures for AI. Now Publishers Inc. (2009)
Deng, L.: A tutorial survey of architectures, algorithms, and applications for deep learning. APSIPA Trans. Signal Inf. Process. 3, 1–29 (2014)
Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 41–50 (2018)
Gao, N., Gao, L., Gao, Q., Wang, H.: An intrusion detection model based on deep belief networks. In: 2014 Second International Conference on Advanced Cloud and Big Data, pp. 247–252. IEEE, November 2014
Liu, H., Lang, B.: Machine learning and deep learning methods for intrusion detection systems: a survey. Appl. Sci. 9(20), 4396 (2019)
Zeng, Q., Wu, S.: Anomaly detection based on multi-attribute decision. In: 2009 WRI Global Congress on Intelligent Systems, vol. 2, pp. 394–398. IEEE, May 2009
Tao, L.J., Hong, L.Y., Yan, H.: The improvement and application of a K-means clustering algorithm. In: 2016 IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp. 93–96. IEEE, July 2016
Gomez, J., Dasgupta, D.: Evolving fuzzy classifiers for intrusion detection. In: Proceedings of the 2002 IEEE Workshop on Information Assurance, vol. 6, no. 3, pp. 321–323, June 2002
Kayacik, H.G., Zincir-Heywood, A.N., Heywood, M.I.: A hierarchical SOM-based intrusion detection system. Eng. Appl. Artif. Intell. 20(4), 439–451 (2007)
Somwang, P., Lilakiatsakun, W.: Intrusion detection technique by using fuzzy ART on computer network security. In: 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 697–702. IEEE, July 2012
Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)
Yang, H., Wang, F.: Wireless network intrusion detection based on improved convolutional neural network. IEEE Access 7, 64366–64374 (2019)
Hoque, M.S., Mukit, M., Bikas, M., Naser, A.: An implementation of intrusion detection system using genetic algorithm. arXiv preprint arXiv:1204.1336 (2012)
Jabbar, M.A., Aluvalu, R., Reddy, S.S.S.: Intrusion detection system using Bayesian network and feature subset selection. In: 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–5. IEEE, December 2017
Ahmad, Z., et al.: Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 32(1), e4150 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Meena, G., Babita, Mohbey, K.K. (2022). Assessment of Network Intrusion Detection System Based on Shallow and Deep Learning Approaches. In: Balas, V.E., Sinha, G.R., Agarwal, B., Sharma, T.K., Dadheech, P., Mahrishi, M. (eds) Emerging Technologies in Computer Engineering: Cognitive Computing and Intelligent IoT. ICETCE 2022. Communications in Computer and Information Science, vol 1591. Springer, Cham. https://doi.org/10.1007/978-3-031-07012-9_28
Download citation
DOI: https://doi.org/10.1007/978-3-031-07012-9_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-07011-2
Online ISBN: 978-3-031-07012-9
eBook Packages: Computer ScienceComputer Science (R0)