Cargando…

A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies

Network anomaly detection systems (NADSs) play a significant role in every network defense system as they detect and prevent malicious activities. Therefore, this paper offers an exhaustive overview of different aspects of anomaly-based network intrusion detection systems (NIDSs). Additionally, cont...

Descripción completa

Detalles Bibliográficos
Autores principales: Rabbani, Mahdi, Wang, Yongli, Khoshkangini, Reza, Jelodar, Hamed, Zhao, Ruxin, Bagheri Baba Ahmadi, Sajjad, Ayobi, Seyedvalyallah
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8145138/
https://www.ncbi.nlm.nih.gov/pubmed/33923125
http://dx.doi.org/10.3390/e23050529
_version_ 1783697106657083392
author Rabbani, Mahdi
Wang, Yongli
Khoshkangini, Reza
Jelodar, Hamed
Zhao, Ruxin
Bagheri Baba Ahmadi, Sajjad
Ayobi, Seyedvalyallah
author_facet Rabbani, Mahdi
Wang, Yongli
Khoshkangini, Reza
Jelodar, Hamed
Zhao, Ruxin
Bagheri Baba Ahmadi, Sajjad
Ayobi, Seyedvalyallah
author_sort Rabbani, Mahdi
collection PubMed
description Network anomaly detection systems (NADSs) play a significant role in every network defense system as they detect and prevent malicious activities. Therefore, this paper offers an exhaustive overview of different aspects of anomaly-based network intrusion detection systems (NIDSs). Additionally, contemporary malicious activities in network systems and the important properties of intrusion detection systems are discussed as well. The present survey explains important phases of NADSs, such as pre-processing, feature extraction and malicious behavior detection and recognition. In addition, with regard to the detection and recognition phase, recent machine learning approaches including supervised, unsupervised, new deep and ensemble learning techniques have been comprehensively discussed; moreover, some details about currently available benchmark datasets for training and evaluating machine learning techniques are provided by the researchers. In the end, potential challenges together with some future directions for machine learning-based NADSs are specified.
format Online
Article
Text
id pubmed-8145138
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-81451382021-05-26 A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies Rabbani, Mahdi Wang, Yongli Khoshkangini, Reza Jelodar, Hamed Zhao, Ruxin Bagheri Baba Ahmadi, Sajjad Ayobi, Seyedvalyallah Entropy (Basel) Review Network anomaly detection systems (NADSs) play a significant role in every network defense system as they detect and prevent malicious activities. Therefore, this paper offers an exhaustive overview of different aspects of anomaly-based network intrusion detection systems (NIDSs). Additionally, contemporary malicious activities in network systems and the important properties of intrusion detection systems are discussed as well. The present survey explains important phases of NADSs, such as pre-processing, feature extraction and malicious behavior detection and recognition. In addition, with regard to the detection and recognition phase, recent machine learning approaches including supervised, unsupervised, new deep and ensemble learning techniques have been comprehensively discussed; moreover, some details about currently available benchmark datasets for training and evaluating machine learning techniques are provided by the researchers. In the end, potential challenges together with some future directions for machine learning-based NADSs are specified. MDPI 2021-04-25 /pmc/articles/PMC8145138/ /pubmed/33923125 http://dx.doi.org/10.3390/e23050529 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Rabbani, Mahdi
Wang, Yongli
Khoshkangini, Reza
Jelodar, Hamed
Zhao, Ruxin
Bagheri Baba Ahmadi, Sajjad
Ayobi, Seyedvalyallah
A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies
title A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies
title_full A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies
title_fullStr A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies
title_full_unstemmed A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies
title_short A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies
title_sort review on machine learning approaches for network malicious behavior detection in emerging technologies
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8145138/
https://www.ncbi.nlm.nih.gov/pubmed/33923125
http://dx.doi.org/10.3390/e23050529
work_keys_str_mv AT rabbanimahdi areviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies
AT wangyongli areviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies
AT khoshkanginireza areviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies
AT jelodarhamed areviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies
AT zhaoruxin areviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies
AT bagheribabaahmadisajjad areviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies
AT ayobiseyedvalyallah areviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies
AT rabbanimahdi reviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies
AT wangyongli reviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies
AT khoshkanginireza reviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies
AT jelodarhamed reviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies
AT zhaoruxin reviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies
AT bagheribabaahmadisajjad reviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies
AT ayobiseyedvalyallah reviewonmachinelearningapproachesfornetworkmaliciousbehaviordetectioninemergingtechnologies