Research Area:  Machine Learning
The continued ability to detect malicious network intrusions has become an exercise in scalability, in which data mining techniques are playing an increasingly important role. We survey and categorize the fields of data mining and intrusion detection systems, providing a systematic treatment of methodologies and techniques. We apply a criterion-based approach to select 95 relevant articles from 2007 to 2017. We identified 19 separate data mining techniques used for intrusion detection, and our analysis encompasses rich information for future research based on the strengths and weaknesses of these techniques. Furthermore, we observed a research gap in establishing the effectiveness of classifiers to identify intrusions in modern network traffic when trained with aging data sets. Our review points to the need for more empirical experiments addressing real-time solutions for big data against contemporary attacks.
Keywords:  
Data Mining
Intrusion Detection Systems
Machine Learning
Deep Learning
Author(s) Name:  Fadi Salo; Mohammadnoor Injadat; Ali Bou Nassif; Abdallah Shami; Aleksander Essex
Journal name:  IEEE Access
Conferrence name:  
Publisher name:  IEEE
DOI:  10.1109/ACCESS.2018.2872784
Volume Information:  ( Volume: 6) Page(s): 56046 - 56058
Paper Link:   https://ieeexplore.ieee.org/abstract/document/8476553