Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process
- URL: http://arxiv.org/abs/2001.09697v1
- Date: Mon, 27 Jan 2020 11:21:05 GMT
- Title: Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process
- Authors: Borja Molina-Coronado and Usue Mori and Alexander Mendiburu and Jos\'e
Miguel-Alonso
- Abstract summary: We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
- Score: 63.75363908696257
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The identification of cyberattacks which target information and communication
systems has been a focus of the research community for years. Network intrusion
detection is a complex problem which presents a diverse number of challenges.
Many attacks currently remain undetected, while newer ones emerge due to the
proliferation of connected devices and the evolution of communication
technology. In this survey, we review the methods that have been applied to
network data with the purpose of developing an intrusion detector, but contrary
to previous reviews in the area, we analyze them from the perspective of the
Knowledge Discovery in Databases (KDD) process. As such, we discuss the
techniques used for the capture, preparation and transformation of the data, as
well as, the data mining and evaluation methods. In addition, we also present
the characteristics and motivations behind the use of each of these techniques
and propose more adequate and up-to-date taxonomies and definitions for
intrusion detectors based on the terminology used in the area of data mining
and KDD. Special importance is given to the evaluation procedures followed to
assess the different detectors, discussing their applicability in current real
networks. Finally, as a result of this literature review, we investigate some
open issues which will need to be considered for further research in the area
of network security.
Related papers
- TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns
for Intrusion Detection [0.5261718469769447]
Existing datasets often fall short, lacking the necessary diversity and alignment with the contemporary network environment.
This paper introduces TII-SSRC-23, a novel and comprehensive dataset designed to overcome these challenges.
arXiv Detail & Related papers (2023-09-14T05:23:36Z) - Intrusion Detection: A Deep Learning Approach [0.0]
The paper proposes a novel architecture to combat intrusion detection that has a Convolutional Neural Network (CNN) module, along with a Long Short Term Memory(LSTM) module and a Support Vector Machine (SVM) classification function.
The analysis is followed by a comparison of both conventional machine learning techniques and deep learning methodologies, which highlights areas that could be further explored.
arXiv Detail & Related papers (2023-06-13T07:58:40Z) - Exploring the Use of Data-Driven Approaches for Anomaly Detection in the
Internet of Things (IoT) Environment [4.724825031148412]
The Internet of Things (IoT) is a system that connects physical computing devices, sensors, software, and other technologies.
Data can be collected, transferred, and exchanged with other devices over the network without requiring human interactions.
Research on anomaly detection in the IoT environment has become popular and necessary in recent years.
arXiv Detail & Related papers (2022-12-31T06:28:58Z) - Adversarial Machine Learning In Network Intrusion Detection Domain: A
Systematic Review [0.0]
It has been found that deep learning models are vulnerable to data instances that can mislead the model to make incorrect classification decisions.
This survey explores the researches that employ different aspects of adversarial machine learning in the area of network intrusion detection.
arXiv Detail & Related papers (2021-12-06T19:10:23Z) - Finding Facial Forgery Artifacts with Parts-Based Detectors [73.08584805913813]
We design a series of forgery detection systems that each focus on one individual part of the face.
We use these detectors to perform detailed empirical analysis on the FaceForensics++, Celeb-DF, and Facebook Deepfake Detection Challenge datasets.
arXiv Detail & Related papers (2021-09-21T16:18:45Z) - A Comprehensive Survey on Community Detection with Deep Learning [93.40332347374712]
A community reveals the features and connections of its members that are different from those in other communities in a network.
This survey devises and proposes a new taxonomy covering different categories of the state-of-the-art methods.
The main category, i.e., deep neural networks, is further divided into convolutional networks, graph attention networks, generative adversarial networks and autoencoders.
arXiv Detail & Related papers (2021-05-26T14:37:07Z) - A Survey of Community Detection Approaches: From Statistical Modeling to
Deep Learning [95.27249880156256]
We develop and present a unified architecture of network community-finding methods.
We introduce a new taxonomy that divides the existing methods into two categories, namely probabilistic graphical model and deep learning.
We conclude with discussions of the challenges of the field and suggestions of possible directions for future research.
arXiv Detail & Related papers (2021-01-03T02:32:45Z) - Smart Anomaly Detection in Sensor Systems: A Multi-Perspective Review [0.0]
Anomaly detection is concerned with identifying data patterns that deviate remarkably from the expected behaviour.
This is an important research problem, due to its broad set of application domains, from data analysis to e-health, cybersecurity, predictive maintenance, fault prevention, and industrial automation.
We review state-of-the-art methods that may be employed to detect anomalies in the specific area of sensor systems.
arXiv Detail & Related papers (2020-10-27T09:56:16Z) - Deep Learning for Community Detection: Progress, Challenges and
Opportunities [79.26787486888549]
Article summarizes the contributions of the various frameworks, models, and algorithms in deep neural networks.
This article summarizes the contributions of the various frameworks, models, and algorithms in deep neural networks.
arXiv Detail & Related papers (2020-05-17T11:22:11Z) - Deep Learning for Sensor-based Human Activity Recognition: Overview,
Challenges and Opportunities [52.59080024266596]
We present a survey of the state-of-the-art deep learning methods for sensor-based human activity recognition.
We first introduce the multi-modality of the sensory data and provide information for public datasets.
We then propose a new taxonomy to structure the deep methods by challenges.
arXiv Detail & Related papers (2020-01-21T09:55:59Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.