A Comprehensive Review and meta-analysis on Applications of Machine Learning Techniques in Intrusion Detection

Securing a machine from various cyber-attacks has been of serious concern for researchers, statutory bodies such as governments, business organizations and users in both wired and wireless media. However, during the last decade, the amount of data handling by any device, particularly servers, has in...

Full description

Bibliographic Details
Main Authors: Manojit Chattopadhyay, Rinku Sen, Sumeet Gupta
Format: Article
Language:English
Published: Australasian Association for Information Systems 2018-05-01
Series:Australasian Journal of Information Systems
Subjects:
Online Access:http://journal.acs.org.au/index.php/ajis/article/view/1667
id doaj-aa99438becde4826858f8d0a5947cff6
record_format Article
spelling doaj-aa99438becde4826858f8d0a5947cff62021-08-02T05:57:23ZengAustralasian Association for Information SystemsAustralasian Journal of Information Systems1449-86181449-86182018-05-0122010.3127/ajis.v22i0.1667679A Comprehensive Review and meta-analysis on Applications of Machine Learning Techniques in Intrusion DetectionManojit Chattopadhyay0Rinku Sen1Sumeet Gupta2Indian Institute of Management RaipurNSHM College of Management and Technology Kolkata IndiaIndian Institute of Management RaipurSecuring a machine from various cyber-attacks has been of serious concern for researchers, statutory bodies such as governments, business organizations and users in both wired and wireless media. However, during the last decade, the amount of data handling by any device, particularly servers, has increased exponentially and hence the security of these devices has become a matter of utmost concern. This paper attempts to examine the challenges in the application of machine learning techniques to intrusion detection. We review different inherent issues in defining and applying the machine learning techniques to intrusion detection. We also attempt to identify the best technological solution for changing usage pattern by comparing different machine learning techniques on different datasets and summarizing their performance using various performance metrics. This paper highlights the research challenges and future trends of intrusion detection in dynamic scenarios of intrusion detection problems in diverse network technologies.http://journal.acs.org.au/index.php/ajis/article/view/1667Intrusion detectionmachine learningsoft computing, dataset, performance metrics, cyber-infrastructure, mobile communicationsmobile systemssecuritywireless technology
collection DOAJ
language English
format Article
sources DOAJ
author Manojit Chattopadhyay
Rinku Sen
Sumeet Gupta
spellingShingle Manojit Chattopadhyay
Rinku Sen
Sumeet Gupta
A Comprehensive Review and meta-analysis on Applications of Machine Learning Techniques in Intrusion Detection
Australasian Journal of Information Systems
Intrusion detection
machine learning
soft computing, dataset, performance metrics, cyber-infrastructure, mobile communications
mobile systems
security
wireless technology
author_facet Manojit Chattopadhyay
Rinku Sen
Sumeet Gupta
author_sort Manojit Chattopadhyay
title A Comprehensive Review and meta-analysis on Applications of Machine Learning Techniques in Intrusion Detection
title_short A Comprehensive Review and meta-analysis on Applications of Machine Learning Techniques in Intrusion Detection
title_full A Comprehensive Review and meta-analysis on Applications of Machine Learning Techniques in Intrusion Detection
title_fullStr A Comprehensive Review and meta-analysis on Applications of Machine Learning Techniques in Intrusion Detection
title_full_unstemmed A Comprehensive Review and meta-analysis on Applications of Machine Learning Techniques in Intrusion Detection
title_sort comprehensive review and meta-analysis on applications of machine learning techniques in intrusion detection
publisher Australasian Association for Information Systems
series Australasian Journal of Information Systems
issn 1449-8618
1449-8618
publishDate 2018-05-01
description Securing a machine from various cyber-attacks has been of serious concern for researchers, statutory bodies such as governments, business organizations and users in both wired and wireless media. However, during the last decade, the amount of data handling by any device, particularly servers, has increased exponentially and hence the security of these devices has become a matter of utmost concern. This paper attempts to examine the challenges in the application of machine learning techniques to intrusion detection. We review different inherent issues in defining and applying the machine learning techniques to intrusion detection. We also attempt to identify the best technological solution for changing usage pattern by comparing different machine learning techniques on different datasets and summarizing their performance using various performance metrics. This paper highlights the research challenges and future trends of intrusion detection in dynamic scenarios of intrusion detection problems in diverse network technologies.
topic Intrusion detection
machine learning
soft computing, dataset, performance metrics, cyber-infrastructure, mobile communications
mobile systems
security
wireless technology
url http://journal.acs.org.au/index.php/ajis/article/view/1667
work_keys_str_mv AT manojitchattopadhyay acomprehensivereviewandmetaanalysisonapplicationsofmachinelearningtechniquesinintrusiondetection
AT rinkusen acomprehensivereviewandmetaanalysisonapplicationsofmachinelearningtechniquesinintrusiondetection
AT sumeetgupta acomprehensivereviewandmetaanalysisonapplicationsofmachinelearningtechniquesinintrusiondetection
AT manojitchattopadhyay comprehensivereviewandmetaanalysisonapplicationsofmachinelearningtechniquesinintrusiondetection
AT rinkusen comprehensivereviewandmetaanalysisonapplicationsofmachinelearningtechniquesinintrusiondetection
AT sumeetgupta comprehensivereviewandmetaanalysisonapplicationsofmachinelearningtechniquesinintrusiondetection
_version_ 1721240756672266240