Aouatif Arqane, Omar Boutkhoum, Hicham Boukhriss, A. Moutaouakkil
{"title":"A Review of Intrusion Detection Systems: Datasets and machine learning methods","authors":"Aouatif Arqane, Omar Boutkhoum, Hicham Boukhriss, A. Moutaouakkil","doi":"10.1145/3454127.3456576","DOIUrl":null,"url":null,"abstract":"At the present time, Security is a crucial issue for all organizations and companies, because intruders are constantly developing new techniques to infiltrate their infrastructure to steal or manipulate sensitive data. Thus, Intrusion Detection System (IDS) has emerged as new technology to protect networks and systems against suspicious activities. Numerous cybersecurity experts highlight the importance of IDS to strength the defensive capacities of systems by alerting for suspicious activities and malicious attacks. Over the years, many techniques like Machine learning (ML) and Deep Learning (DL) have been used to increase the detection accuracy and reduce the false alerts of IDSs. This survey paper presents an overview of some ML and DL algorithms among the most used for IDS. Additionally, because these algorithms depend on the characteristics of malicious events stored in datasets to identify anomalies, we list some publicly available cybersecurity datasets. Furthermore, we highlight the challenges that experts must overcome to enhance the performance of their methods.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"362 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3454127.3456576","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
At the present time, Security is a crucial issue for all organizations and companies, because intruders are constantly developing new techniques to infiltrate their infrastructure to steal or manipulate sensitive data. Thus, Intrusion Detection System (IDS) has emerged as new technology to protect networks and systems against suspicious activities. Numerous cybersecurity experts highlight the importance of IDS to strength the defensive capacities of systems by alerting for suspicious activities and malicious attacks. Over the years, many techniques like Machine learning (ML) and Deep Learning (DL) have been used to increase the detection accuracy and reduce the false alerts of IDSs. This survey paper presents an overview of some ML and DL algorithms among the most used for IDS. Additionally, because these algorithms depend on the characteristics of malicious events stored in datasets to identify anomalies, we list some publicly available cybersecurity datasets. Furthermore, we highlight the challenges that experts must overcome to enhance the performance of their methods.