2022
DOI: 10.3390/electronics11020213
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Data-Driven Learning for Intelligent Network Intrusion Detection Systems

Abstract: An effective anomaly-based intelligent IDS (AN-Intel-IDS) must detect both known and unknown attacks. Hence, there is a need to train AN-Intel-IDS using dynamically generated, real-time data in an adversarial setting. Unfortunately, the public datasets available to train AN-Intel-IDS are ineluctably static, unrealistic, and prone to obsolescence. Further, the need to protect private data and conceal sensitive data features has limited data sharing, thus encouraging the use of synthetic data for training predic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…However, these methods highly depend on a vast amount of fully labelled data, which is expensive to collect and labourious to annotate. This is particularly difficult for IoT intrusion (II) detection, since data generated by IoT devices usually involves user privacy issues [13], [14], which hinder the publication of IoT intrusion detection data. Besides, these ML models are less capable of handling newly emerged intrusion types due to the shortage of annotated data.…”
Section: Introductionmentioning
confidence: 99%
“…However, these methods highly depend on a vast amount of fully labelled data, which is expensive to collect and labourious to annotate. This is particularly difficult for IoT intrusion (II) detection, since data generated by IoT devices usually involves user privacy issues [13], [14], which hinder the publication of IoT intrusion detection data. Besides, these ML models are less capable of handling newly emerged intrusion types due to the shortage of annotated data.…”
Section: Introductionmentioning
confidence: 99%
“…This solution not only makes it possible to assess the performance of various IDS implementations against adversarial traffic but also, more important, allows for the improvement of IDS detection by including generated adversarial traffic in the training phase of the IDS. Other research papers are discussing different approaches to use GAN de detect network intrusions [ 15 , 16 , 17 , 18 , 19 , 20 , 21 ]. The principle of the GAN is shown in Figure 1 .…”
Section: Introductionmentioning
confidence: 99%