A Comprehensive Review and Meta-Analysis on Applications of Machine Learning Techniques in Intrusion Detection
DOI:
https://doi.org/10.3127/ajis.v22i0.1667Keywords:
Intrusion detection, machine learning, soft computing, dataset, performance metrics, cyber-infrastructure, mobile communications, mobile systems, security, wireless technologyAbstract
Securing a machine from various cyber-attacks has been of serious concern for researchers, statutory bodies such as governments, business organizations and users in both wired and wireless media. However, during the last decade, the amount of data handling by any device, particularly servers, has increased exponentially and hence the security of these devices has become a matter of utmost concern. This paper attempts to examine the challenges in the application of machine learning techniques to intrusion detection. We review different inherent issues in defining and applying the machine learning techniques to intrusion detection. We also attempt to identify the best technological solution for the changing usage pattern by comparing the different machine learning techniques on different datasets and summarizing their performance using various performance metrics. This paper highlights the research challenges and future trends of intrusion detection in dynamic scenarios of intrusion detection problems in diverse network technologies.Downloads
Published
2018-06-13
How to Cite
Chattopadhyay, M., Sen, R., & Gupta, S. (2018). A Comprehensive Review and Meta-Analysis on Applications of Machine Learning Techniques in Intrusion Detection. Australasian Journal of Information Systems, 22. https://doi.org/10.3127/ajis.v22i0.1667
Issue
Section
Research Articles
License
AJIS publishes open-access articles distributed under the terms of a Creative Commons Non-Commercial and Attribution License which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and AJIS are credited. All other rights including granting permissions beyond those in the above license remain the property of the author(s).