Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process

01/27/2020
by   Borja Molina-Coronado, et al.
0

The identification of cyberattacks which target information and communication systems has been a focus of the research community for years. Network intrusion detection is a complex problem which presents a diverse number of challenges. Many attacks currently remain undetected, while newer ones emerge due to the proliferation of connected devices and the evolution of communication technology. In this survey, we review the methods that have been applied to network data with the purpose of developing an intrusion detector, but contrary to previous reviews in the area, we analyze them from the perspective of the Knowledge Discovery in Databases (KDD) process. As such, we discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods. In addition, we also present the characteristics and motivations behind the use of each of these techniques and propose more adequate and up-to-date taxonomies and definitions for intrusion detectors based on the terminology used in the area of data mining and KDD. Special importance is given to the evaluation procedures followed to assess the different detectors, discussing their applicability in current real networks. Finally, as a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/01/2018

Machine Learning Methods for Network Intrusion Detection

Network security engineers work to keep services available all the time ...
research
05/23/2020

Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review

Cloud computing has become a powerful and indispensable technology for c...
research
05/29/2018

Performance Evaluation in High-Speed Networks by the Example of Intrusion Detection

Purchase decisions for devices in high-throughput networks as well as sc...
research
01/31/2019

A Holistic Approach to Evaluating Cyber Security Defensive Capabilities

Metrics and frameworks to quantifiably assess security measures have ari...
research
05/30/2013

Immune System Approaches to Intrusion Detection - A Review (ICARIS)

The use of artificial immune systems in intrusion detection is an appeal...
research
09/30/2010

A Comprehensive Survey of Data Mining-based Fraud Detection Research

This survey paper categorises, compares, and summarises from almost all ...
research
11/17/2018

Monotonic classification: an overview on algorithms, performance measures and data sets

Currently, knowledge discovery in databases is an essential step to iden...

Please sign up or login with your details

Forgot password? Click here to reset