Analyzing the Impact of Machine Learning Techniques for Intrusion Detection Systems
A Review
DOI:
https://doi.org/10.5281/zenodo.15411413Abstract
This review paper aims to assess how Machine Learning (ML) approaches affect Intrusion Detection Systems (IDS), a vital cybersecurity component. Traditional IDS need to be improved due to the increasing complexity and frequency of cyber-attacks, which are made worse by the widespread use of Internet of Things (IoT) devices. The purpose of this paper is to examine how sophisticated machine learning algorithms can enhance the overall efficacy, efficiency, and accuracy of IDS in identifying and countering these dynamic threats. The research methodology involved a comprehensive review of studies conducted from 2014 to 2024, focusing on various ML algorithms applied to different datasets used in IDS, such as KDD Cup ’99, NSL-KDD, and CICIDS2017. The paper systematically categorizes these studies by the machine learning techniques employed, the datasets utilized, and the performance metrics such as accuracy, precision, and recall. The main findings show that ML techniques have considerably improved IDS performance, especially ensemble learning and hybrid classifiers. Like, the use of Random Forests and Deep Neural Networks has improved detection, accuracy, and decreased false positives. However, there are still issues to be resolved, like controlling high false positive rates, requiring updated datasets, and enhancing feature selection methods. The research conclusion suggests that although ML has significantly improved IDS capabilities but more efforts are still required to maximize these systems for practical use. Future research should focus on creating more reliable datasets, improving feature selection techniques, and exploring novel algorithms that can adapt to the continuously evolving landscape of cyber-threats.
Keywords:
Machine Learning, Intrusion Detection Systems, Algorithms, Cybersecurity, Internet of Things (IoT). Datasets: KDD Cup ’99, NSL-KDD, Kyoto2006 , UGR2006, CICIDS’17, and UNSW-NB’15References
R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. AlNemrat, and S. Venkatraman, “Deep Learning Approach for Intelligent Intrusion Detection System,” IEEE Access, vol. 7, pp. 41525–41550, 2019, doi: 10.1109/ACCESS.2019.2895334.
X. Gao, C. Shan, C. Hu, Z. Niu, and Z. Liu, “An Adaptive Ensemble Machine Learning Model for Intrusion Detection,” IEEE Access, vol. 7, pp. 82512–82521, 2019, doi: 10.1109/ACCESS.2019.2923640.
X. A. Larriva-Novo, M. Vega-Barbas, V. A. Villagra, and M. Sanz Rodrigo, “Evaluation of Cybersecurity Data Set Characteristics for Their Applicability to Neural Networks Algorithms Detecting Cybersecurity Anomalies,” IEEE Access, vol. 8, pp. 9005–9014, 2020, doi: 10.1109/ACCESS.2019.2963407.
S. Zeadally, E. Adi, Z. Baig, and I. A. Khan, “Harnessing artificial intelligence capabilities to improve cybersecurity,” IEEE Access, vol. 8, pp. 23817–23837, 2020, doi: 10.1109/ACCESS.2020.2968045.
M. Bagaa, T. Taleb, J. B. Bernabe, and A. Skarmeta, “A Machine Learning Security Framework for Iot Systems,” IEEE Access, vol. 8, pp. 114066–114077, 2020, doi: 10.1109/ACCESS.2020.2996214.
A. Alsaleh and W. Binsaeedan, “The influence of salp swarm algorithmbased feature selection on network anomaly intrusion detection,” IEEE Access, vol. 9, pp. 112466–112477, 2021, doi: 10.1109/ACCESS.2021.3102095.
G. De Carvalho Bertoli et al., “An End-to-End Framework for Machine Learning-Based Network Intrusion Detection System,” IEEE Access, vol. 9, pp. 106790–106805, 2021, doi: 10.1109/ACCESS.2021.3101188.
S. Dwibedi, M. Pujari, and W. Sun, “A Comparative Study on Contemporary Intrusion Detection Datasets for Machine Learning Research,” in Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020, Institute of Electrical and Electronics Engineers Inc., Nov. 2020. doi: 10.1109/ISI49825.2020.9280519.
T. Kim and W. Pak, “Hybrid Classification for High-Speed and HighAccuracy Network Intrusion Detection System,” IEEE Access, vol. 9, pp. 83806–83817, 2021, doi: 10.1109/ACCESS.2021.3087201.
C. Liu, Z. Gu, and J. Wang, “A Hybrid Intrusion Detection System Based on Scalable K-Means+ Random Forest and Deep Learning,” IEEE Access, vol. 9, pp. 75729–75740, 2021, doi: 10.1109/ACCESS.2021.3082147.
S. Soheily-Khah, P. F. Marteau, and N. Bechet, “Intrusion detection in network systems through hybrid supervised and unsupervised machine learning process: A case study on the iscx dataset,” in Proceedings - 2018 1st International Conference on Data Intelligence and Security, ICDIS 2018, Institute of Electrical and Electronics Engineers Inc., May 2018, pp. 219–226. doi: 10.1109/ICDIS.2018.00043.
T. Zoppi, A. Ceccarelli, and A. Bondavalli, “Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application,” IEEE Access, vol. 9, pp. 90603–90615, 2021, doi: 10.1109/ACCESS.2021.3090957.
H. Lin, “A Survey on Machine Learning based Intrusion Detection Systems Using Apache Spark,” 2021, doi: 10.1145/3497737.
P. R. Maidamwar, M. M. Bartere, and P. P. Lokulwar, “A Survey on Machine Learning Approaches for Developing Intrusion Detection System.” [Online]. Available: https://ssrn.com/abstract=3843635
U. S. Musa, S. Chakraborty, M. M. Abdullahi, and T. Maini, “A review on intrusion detection system using machine learning techniques,” in Proceedings - IEEE 2021 International Conference on Computing, Communication, and Intelligent Systems, ICCCIS 2021, Institute of Electrical and Electronics Engineers Inc., Feb. 2021, pp. 541–549. doi: 10.1109/ICCCIS51004.2021.9397121.
P. Mishra, V. Varadharajan, U. Tupakula, and E. S. Pilli, “A detailed investigation and analysis of using machine learning techniques for intrusion detection,” IEEE Communications Surveys and Tutorials, vol. 21, no. 1, pp. 686–728, Jan. 2019, doi: 10.1109/COMST.2018.2847722.
I. H. Sarker, Y. B. Abushark, F. Alsolami, and A. I. Khan, “IntruDTree: A machine learning based cyber security intrusion detection model,” Symmetry (Basel), vol. 12, no. 5, May 2020, doi: 10.3390/SYM12050754.
Y. Kayode Saheed, A. Idris Abiodun, S. Misra, M. Kristiansen Holone, and R. Colomo-Palacios, “A machine learning-based intrusion detection for detecting internet of things network attacks,” Alexandria Engineering Journal, vol. 61, no. 12, pp. 9395–9409, Dec. 2022, doi: 10.1016/j.aej.2022.02.063
2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence): 11-12 Jan. 2018. IEEE, 2018.
X Gao, C. Shan, C. Hu, Z. Niu, and Z. Liu, “An Adaptive Ensemble Machine Learning Model for Intrusion Detection,” IEEE Access, vol. 7, pp. 82512–82521, 2019, doi: 10.1109/ACCESS.2019.2923640.
M. Wang, K. Zheng, Y. Yang, and X. Wang, “An Explainable Machine Learning Framework for Intrusion Detection Systems,” IEEE Access, vol. 8, pp. 73127–73141, 2020, doi: 10.1109/ACCESS.2020.2988359.
Suresh. Sundaram, Proceedings of the 2018 IEEE Symposium Series on Computational Intelligence (SSCI 2018): 18-21 November 2018, Bengaluru. IEEE, 2018.
Halvorsen, C. Izurieta, H. Cai, and A. H. Gebremedhin, “Applying Generative Machine Learning to Intrusion Detection: A Systematic Mapping Study and Review,” ACM Comput Surv, Oct. 2024, doi: 10.1145/3659575.
H. Alqahtani, I. H. Sarker, A. Kalim, S. M. Minhaz Hossain, S. Ikhlaq, and S. Hossain, “Cyber intrusion detection using machine learning classification techniques,” in Communications in Computer and Information Science, Springer, 2020, pp. 121–131. doi: 10.1007/978-981-15-6648- 6 10.
F. Nabi and X. Zhou, “Enhancing intrusion detection systems through dimensionality reduction: A comparative study of machine learning techniques for cyber security,” Jan. 01, 2024, KeAi Communications Co. doi: 10.1016/j.csa.2023.100033.
A. Szakal, SISY 2017: IEEE 15th International Symposium on Intelligent Systems and Informatics: proceedings: September 14-16, 2017, Subotica, Serbia. IEEE, 2017.
H. M. Tahir et al., “HYBRID MACHINE LEARNING TECHNIQUE FOR INTRUSION DETECTION SYSTEM,” 2015. [Online]. Available: http://www.uum.edu.my
B. Wahyudi, K. Ramli, and H. Murfi, “Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System,” 2018.
2017 2nd IEEE International Conference on Computational Intelligence and Applications: ICCIA: September 8-11, 2017, North China University of Technology, Beijing, China. IEEE Press, 2017.
G. Karatas, O. Demir, and O. K. Sahingoz,“Increasing the Performance of Machine Learning-Based IDSs on an Imbalanced and Up-to-Date Dataset,” IEEE Access, vol. 8, pp. 32150–32162, 2020, doi: 10.1109/ACCESS.2020.2973219.
R. Rama Devi and M. Abualkibash, “Intrusion Detection System Classification Using Different Machine Learning Algorithms on KDD-99 and NSL-KDD Datasets - A Review Paper,” International Journal of Computer Science and Information Technology, vol. 11, no. 03, pp. 65–80, Jun. 2019, doi: 10.5121/ijcsit.2019.11306.
S. Soni and B. Bhushan, “Use of Machine Learning algorithms for designing efficient cyber security solutions.”
Proceedings of the International Conference on Trends in Electronics and Informatics (ICOEI 2019): 23-25, April 2019. [IEEE], 2019.
S. Latif, F. F. Dola, MD. M. Afsar, I. Jahan Esha, and D. Nandi, “Investigation of Machine Learning Algorithms for Network Intrusion Detection,” International Journal of Information Engineering and Electronic Business, vol. 14, no. 2, pp. 1–22, Apr. 2022, doi: 10.5815/ijieeb.2022.02.01.
M. C. Belavagi and B. Muniyal, “Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection,” in Procedia Computer Science, Elsevier B.V., 2016, pp. 117–123. doi: 10.1016/j.procs.2016.06.016.
Downloads
Published
How to Cite
License
Copyright (c) 2024 Siazga Research Journal

This work is licensed under a Creative Commons Attribution 4.0 International License.
