Cargando…
A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies
Network anomaly detection systems (NADSs) play a significant role in every network defense system as they detect and prevent malicious activities. Therefore, this paper offers an exhaustive overview of different aspects of anomaly-based network intrusion detection systems (NIDSs). Additionally, cont...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8145138/ https://www.ncbi.nlm.nih.gov/pubmed/33923125 http://dx.doi.org/10.3390/e23050529 |
_version_ | 1783697106657083392 |
---|---|
author | Rabbani, Mahdi Wang, Yongli Khoshkangini, Reza Jelodar, Hamed Zhao, Ruxin Bagheri Baba Ahmadi, Sajjad Ayobi, Seyedvalyallah |
author_facet | Rabbani, Mahdi Wang, Yongli Khoshkangini, Reza Jelodar, Hamed Zhao, Ruxin Bagheri Baba Ahmadi, Sajjad Ayobi, Seyedvalyallah |
author_sort | Rabbani, Mahdi |
collection | PubMed |
description | Network anomaly detection systems (NADSs) play a significant role in every network defense system as they detect and prevent malicious activities. Therefore, this paper offers an exhaustive overview of different aspects of anomaly-based network intrusion detection systems (NIDSs). Additionally, contemporary malicious activities in network systems and the important properties of intrusion detection systems are discussed as well. The present survey explains important phases of NADSs, such as pre-processing, feature extraction and malicious behavior detection and recognition. In addition, with regard to the detection and recognition phase, recent machine learning approaches including supervised, unsupervised, new deep and ensemble learning techniques have been comprehensively discussed; moreover, some details about currently available benchmark datasets for training and evaluating machine learning techniques are provided by the researchers. In the end, potential challenges together with some future directions for machine learning-based NADSs are specified. |
format | Online Article Text |
id | pubmed-8145138 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-81451382021-05-26 A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies Rabbani, Mahdi Wang, Yongli Khoshkangini, Reza Jelodar, Hamed Zhao, Ruxin Bagheri Baba Ahmadi, Sajjad Ayobi, Seyedvalyallah Entropy (Basel) Review Network anomaly detection systems (NADSs) play a significant role in every network defense system as they detect and prevent malicious activities. Therefore, this paper offers an exhaustive overview of different aspects of anomaly-based network intrusion detection systems (NIDSs). Additionally, contemporary malicious activities in network systems and the important properties of intrusion detection systems are discussed as well. The present survey explains important phases of NADSs, such as pre-processing, feature extraction and malicious behavior detection and recognition. In addition, with regard to the detection and recognition phase, recent machine learning approaches including supervised, unsupervised, new deep and ensemble learning techniques have been comprehensively discussed; moreover, some details about currently available benchmark datasets for training and evaluating machine learning techniques are provided by the researchers. In the end, potential challenges together with some future directions for machine learning-based NADSs are specified. MDPI 2021-04-25 /pmc/articles/PMC8145138/ /pubmed/33923125 http://dx.doi.org/10.3390/e23050529 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Rabbani, Mahdi Wang, Yongli Khoshkangini, Reza Jelodar, Hamed Zhao, Ruxin Bagheri Baba Ahmadi, Sajjad Ayobi, Seyedvalyallah A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies |
title | A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies |
title_full | A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies |
title_fullStr | A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies |
title_full_unstemmed | A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies |
title_short | A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies |
title_sort | review on machine learning approaches for network malicious behavior detection in emerging technologies |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8145138/ https://www.ncbi.nlm.nih.gov/pubmed/33923125 http://dx.doi.org/10.3390/e23050529 |
work_keys_str_mv | AT rabbanimahdi areviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies AT wangyongli areviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies AT khoshkanginireza areviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies AT jelodarhamed areviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies AT zhaoruxin areviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies AT bagheribabaahmadisajjad areviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies AT ayobiseyedvalyallah areviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies AT rabbanimahdi reviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies AT wangyongli reviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies AT khoshkanginireza reviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies AT jelodarhamed reviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies AT zhaoruxin reviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies AT bagheribabaahmadisajjad reviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies AT ayobiseyedvalyallah reviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies |