Network Intrusion Detection Using Machine Learning Techniques/Makine Öğrenmesi Teknikleri Kullanılarak Ağ Saldırı Tespit Sistemi
Öz
Abstract
Recently, it has become important to use advanced intrusion detection techniques to protect networks from the
developing network attacks, which are becoming more complex and difficult to detect. For this reason, machine
learning techniques have been employed in the Intrusion Detection Systems (IDS), so that, more complex features
can be detected in the characteristics of the packets incoming to the network. As these techniques require training
data, many datasets are collected for this purpose. Some of these datasets have known issues that limit the
ability to apply intrusion detection systems built, based on these datasets, in real-life applications.
In this study, the existing intrusion datasets are illustrated alongside with the known issues of each dataset, as well
as, the existing intrusion detection systems that employ machine learning techniques and use these datasets, are
discussed. As machine learning techniques extract different knowledge from different datasets, and each technique
has different approaches to extract that knowledge, the performance of each technique is different from
one dataset to another. The results of the discussed studies show the great potential of using machine learning
techniques to implement IDS, where the Artificial Neural Networks (ANN) have shown the highest average performance,
among other machine learning techniques.
Anahtar Kelimeler
Kaynakça
- D. Acemoglu, A. Malekian, and A. Ozdaglar, “Network security and contagion,” Journal of Economic Theory, vol. 166, pp. 536-585, 2016.
- D. Yu, Y. Jin, Y. Zhang, and X. Zheng, “A survey on security issues in services communication of Microservices‐ enabled fog applications,” Concurrency and Computation: Practice and Experience, p. e4436.
- V. C. Storey and I.-Y. Song, “Big data technologies and Management: What conceptual modeling can do,” Data & Knowledge Engineering, vol. 108, pp. 50-67, 2017.
- I. H. Witten, E. Frank, M. A. Hall, and C. J. Pal, Data Mining: Practical machine learning tools and techniques: Morgan Kaufmann, 2016.
- M. Ahmed, A. N. Mahmood, and J. Hu, “A survey of network anomaly detection techniques,” Journal of Network and Computer Applications, vol. 60, pp. 19-31, 2016.
- K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014.
- K. Cup, “Dataset,” available at the following website http://kdd. ics. uci. edu/databases/kddcup99/kddcup99. html, vol. 72, 1999.
- M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” in Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on, 2009, pp. 1-6.
Ayrıntılar
Birincil Dil
İngilizce
Konular
-
Bölüm
Araştırma Makalesi
Yayımlanma Tarihi
1 Temmuz 2018
Gönderilme Tarihi
30 Haziran 2018
Kabul Tarihi
-
Yayımlandığı Sayı
Yıl 2018 Cilt: 2 Sayı: 1