Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues

被引:345
作者
Aldweesh, Arwa [1 ]
Derhab, Abdelouahid [1 ]
Emam, Ahmed Z. [1 ]
机构
[1] King Saud Univ, Riyadh 12372, Saudi Arabia
关键词
Intrusion detection; Anomaly detection; Deep learning; NETWORK;
D O I
10.1016/j.knosys.2019.105124
中图分类号
TP18 [人工智能理论];
学科分类号
140502 [人工智能];
摘要
The massive growth of data that are transmitted through a variety of devices and communication protocols have raised serious security concerns, which have increased the importance of developing advanced intrusion detection systems (IDSs). Deep learning is an advanced branch of machine learning, composed of multiple layers of neurons that represent the learning process. Deep learning can cope with large-scale data and has shown success in different fields. Therefore, researchers have paid more attention to investigating deep learning for intrusion detection. This survey comprehensively reviews and compares the key previous deep learning-focused cybersecurity surveys. Through an extensive review, this survey provides a novel fine-grained taxonomy that categorizes the current state-of-the-art deep learning-based IDSs with respect to different facets, including input data, detection, deployment, and evaluation strategies. Each facet is further classified according to different criteria. This survey also compares and discusses the related experimental solutions proposed as deep learning-based IDSs. By analysing the experimental studies, this survey discusses the role of deep learning in intrusion detection, the impact of intrusion detection datasets, and the efficiency and effectiveness of the proposed approaches. The findings demonstrate that further effort is required to improve the current state-of-the art. Finally, open research challenges are identified, and future research directions for deep learning-based IDSs are recommended. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:19
相关论文
共 98 条
[1]  
Abolhasanzadeh B, 2015, 2015 7TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT)
[2]  
ACKLEY DH, 1985, COGNITIVE SCI, V9, P147
[3]  
Adhikari U., 2014, Industrial Control System (ICS) Cyber Attack Datasets
[4]   A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data [J].
Agarap, Abien Fred M. .
PROCEEDINGS OF 2018 10TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (ICMLC 2018), 2018, :26-30
[5]   Survey on Anomaly Detection using Data Mining Techniques [J].
Agrawal, Shikha ;
Agrawal, Jitendra .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :708-713
[6]  
Al-Garadi M. Ali, 2018, ARXIV PREPRINT ARXIV
[7]  
Al-zewairi M., 2017, IFIP INT WORKSHOP IN, V7322, DOI [10.1109/ICICS.2017.29, DOI 10.1109/ICICS.2017.29]
[8]  
Alom MZ, 2017, PROC NAECON IEEE NAT, P63, DOI 10.1109/NAECON.2017.8268746
[9]  
Alom MZ, 2015, PROC NAECON IEEE NAT, P339, DOI 10.1109/NAECON.2015.7443094
[10]  
Alrawashdeh K, 2016, 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), P195, DOI [10.1109/ICMLA.2016.0040, 10.1109/ICMLA.2016.167]