Systematic Literature Review: Implementation of Machine Learning for Intrusion Detection

Authors

  • Amanda Amelia Khilda Syarif Hidayatullah State Islamic University of Jakarta, Indonesia
  • M. Shaquille Rayhan Syarif Hidayatullah State Islamic University of Jakarta, Indonesia
  • Annisa Rizki Amaliah Syarif Hidayatullah State Islamic University of Jakarta, Indonesia
  • Nurbojatmiko Nurbojatmiko Syarif Hidayatullah State Islamic University of Jakarta, Indonesia

DOI:

https://doi.org/10.29103/jreece.v5i2.20300

Keywords:

Cyber Security, Intrusion Detection System, Machine Learning

Abstract

The rapid development of information technology has an impact on the increasing threat to cyber security. One of the main threats is intrusion attacks that are increasingly complex and diverse. To solve this problem, machine learning-based Intrusion Detection System (IDS) is a promising solution due to its ability to detect threats automatically and efficiently. However, the large number of machine learning methods available poses a challenge in determining the best approach for various needs. This research aims to conduct a systematic literature review using PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines. This literature review identifies and categorises previous studies related to the application of machine learning in IDSs based on the problem addressed, proposed solution, research method, metric parameters, research object, and research results. The data for this research is taken from trusted sources, such as Google Scholar, IEEE, Elsevier, Springer, and MDPI. The results of this review are expected to provide a deeper understanding of the application of machine learning in IDS and provide direction for other researchers to fill the remaining research gaps.

References

Abdallah, E. E., Eleisah, W., & Otoom, A. F. (2022). Intrusion detection systems using supervised machine learning techniques: A survey. Procedia Computer Science, 201, 205-212. https://doi.org/10.1016/j.procs.2022.03.029

Abdel-Wahab, M. S., Neil, A. M., & Atia, A. (2020). A comparative study of machine learning and deep learning in network anomaly-based intrusion detection systems. In Proceedings of the 15th International Conference on Computer Engineering and Systems (ICCES), 1-6. https://doi.org/10.1109/ICCES51560.2020.9334553

Abrar, I., Ayub, Z., Masoodi, F., & Bamhdi, A. M. (2020). A machine learning approach for intrusion detection system on NSL-KDD dataset. In Proceedings of the 2020 International Conference on Smart Electronics and Communication (ICOSEC), 919-924. https://doi.org/10.1109/ICOSEC49089.2020.9215232

Ahmad, A. et al,. (2020). Machine Learning-Based Distributed Denial of Service Attack Detection on Intrusion Detection System Regarding to Feature Selection. International Journal of Artificial Intelligence Research, 4(1), 1-8. https://doi.org/10.29099ijair.v4i1.156.

Ahmed, L. A. H., & Hamad, Y. A. M. (2021). Machine learning techniques for network-based intrusion detection system: A survey paper. In Proceedings of the 2021 National Computing Colleges Conference (NCCC), 1-7. https://doi.org/10.1109/NCCC49330.2021.9428827

Alsahli, M. S., Almasri, M. M., Al-Akhras, M., Al-Issa, A. I., & Alawairdhi, M. (2021). Evaluation of machine learning algorithms for intrusion detection system in WSN. International Journal of Advanced Computer Science and Applications (IJACSA), 12(5). http://dx.doi.org/10.14569/IJACSA.2021.0120574

Ariyus, D. (2007). Intrusion detection system. ANDI.

Azizan, A. H., Mostafa, S. A., Mustapha, A., Foozy, C. F. M., Wahab, M. H. A., Mohammed, M. A., & Khalaf, B. A. (2021). A machine learning approach for improving the performance of network intrusion detection systems. Annals of Emerging Technologies in Computing (AETiC), 5(5), 201-208. https://doi.org/10.33166/AETiC.2021.05.025.

Bace, R., & Mell, P. (2001). Intrusion detection systems (Technical Report 800-31). National Institute of Standards and Technology (NIST).

Baci, N., Vukatana, K., & Baci, M. (2022). Machine learning approach for intrusion detection systems as a cyber security strategy for Small and Medium Enterprises. WSEAS Transactions on Business and Economics, 19, 474-480. https://doi.org/10.37394/23207.2022.19.43.

Cheng, X., Li, W., Xiao, Z., & Zhao, T. (2020). Intrusion detection system based on QBSO-FS. In Proceedings of the 2020 International Conference on Artificial Intelligence and Computer Engineering (ICAICE), 372-377. https://doi.org/10.1109/ICAICE51518.2020.00078

Daud, M., Zulfikar, M. Y., Hasibuan, A., & Isa, M. (2023). Prototype Of Automatic Watering And Fertilizing System For Oil Palm Seeds Based On Internet Of Things. Andalas Journal Of Electrical And Electronic Engineering Technology, 3(1), 1-9.

Das, S., Ashrafuzzaman, M., Sheldon, F. T., & Shiva, S. (2020). Network intrusion detection using natural language processing and ensemble machine learning. In Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence (SSCI), 829-835. https://doi.org/10.1109/SSCI47803.2020.9308268

Halimaa, A., & Sundarakantham, K. (2019). Machine learning based intrusion detection system. In Proceedings of the 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), 916-920. https://doi.org/10.1109/ICOEI.2019.8862784

Hamid, Y., Sugumaran, M., & Journaux, L. (2016). Machine learning techniques for intrusion detection: A comparative analysis. In Proceedings of the International Conference on Informatics and Analytics (ICIA-16). Association for Computing Machinery. https://doi.org/10.1145/2980258.2980378

Hassan, E. M., Saleh, M. A., & Ahmed, A. M. (2020). Network Intrusion Detection Approach using Machine Learning Based on Decision Tree Algorithm. Journal of Engineering and Applied Sciences-JE&AS, 7(2), 1-1. https://doi.org/10.5455/jeas.2020110101.

Isa, M. M., & Mhamdi, L. (2020). Native SDN intrusion detection using machine learning. In Proceedings of the 2020 IEEE Eighth International Conference on Communications and Networking (ComNet), 1-7. https://doi.org/10.1109/ComNet47917.2020.9306093

Jiang, F., et al. (2020). Deep learning based multi-channel intelligent attack detection for data security. IEEE Transactions on Sustainable Computing, 5(2), 204-212. https://doi.org/10.1109/TSUSC.2018.2793284

Kavitha, G., & Elango, N. M. (2020). An approach to feature selection in intrusion detection systems using machine learning algorithms. International Journal of e-Collaboration (IJeC), 16(4), 48-58. https://doi.org/10.4018/IJeC.2020100104.

Kumar, M., & Singh, A. K. (2020). Distributed intrusion detection system using blockchain and cloud computing infrastructure. In Proceedings of the 4th International Conference on Trends in Electronics and Informatics (ICOEI), 248-252. https://doi.org/10.1109/ICOEI48184.2020.9142954

Kumar, S. V. N., Selvi, M., Kannan, A., & Doulamis, A. D. (2023). A comprehensive survey on machine learning-based intrusion detection systems for secure communication in the Internet of Things. Intelligent Neuroscience, 2023, 1-17. https://doi.org/10.1155/2023/8981988

Liu, Z., Thapa, N., Shaver, A., Roy, K., Yuan, X., & Khorsandroo, S. (2020). Anomaly detection on IoT network intrusion using machine learning. In Proceedings of the 2020 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), 1-5. https://doi.org/10.1109/icABCD49160.2020.9183842

Meyer, P., et al. (2020). Demo: A security infrastructure for vehicular information using SDN, intrusion detection, and a defense center in the cloud. In Proceedings of the 2020 IEEE Vehicular Networking Conference (VNC), 1-2. https://doi.org/10.1109/VNC51378.2020.9318351

Mishra, P., Varadharajan, V., Pilli, E. S., & Tupakula, U. (2020). VMGuard: A VMI-based security architecture for intrusion detection in cloud environment. IEEE Transactions on Cloud Computing, 8(3), 957-971. https://doi.org/10.1109/TCC.2018.2829202

Musaab R., Dina A.. (2021). Intrusion detection system based on machine learning techniques. Indonesian Journal of Electrical Engineering and Computer Science, Vol. 23, No. 2, pp. 953-961, https://doi.org/10.11591ijeecs.v23.i2.pp953-961.

Musleh, D., Alotaibi, M., Al-Haidari, F., Rahman, A., & Mohammad, R. (2023). Intrusion detection system using feature extraction with machine learning algorithms in IoT. Journal of Sensor and Actuator Networks, 12, 1-19. https://doi.org/10.3390/jsan12020029

Nerlikar P., Pandey S., Sharma S., and Bagade S. (2020). Analysis of intrusion detection using machine learning techniques. Int. J. Comput. Netw. Commun. Secur., vol. 8, no. 10, pp. 84-93.

Pallepati, M., Voggu, S., Masula, R., & Konjarla, M. (2022). Network intrusion detection system using machine learning with data preprocessing and feature extraction. International Journal for Research in Applied Science and Engineering Technology, 10, 2360-2365. https://doi.org/10.22214/ijraset.2022.44326.

Parashar, A., Saggu, K. S., & Garg, A. (2022). Machine learning based framework for network intrusion detection system using stacking ensemble technique. Indian Journal of Engineering and Materials Sciences (IJEMS), 29(4), 509-518. https://doi.org/10.56042/ijems.v29i4.46838.

Pashaei, A., Akbari, M. E., Lighvan, M. Z., & Teymorzade, H. A. (2020). Improving the IDS performance through early detection approach in local area networks using industrial control systems of honeypot. In Proceedings of the 2020 IEEE International Conference on Environment and Electrical Engineering and 2020 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe), 1-5. https://doi.org/10.1109/EEEIC/ICPSEurope49358.2020.9160574

Pordelkhaki, M., Fouad, S., & Josephs, M. (2021, November). Intrusion detection for industrial control systems by machine learning using privileged information. In 2021 IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 1-6). http://doi.org/10.1109/ISI53945.2021.9624757.

Purbo, W. O. (2006). Buku Pinter Internet TCP/IP. PT. Elex Media Komputindo.

Saranya, T., Sridevi, S., Deisy, C., Chung, T. D., & Khan, M. K. A. A. (2020). Performance analysis of machine learning algorithms in intrusion detection system: A review. Procedia Computer Science, 171, 1251-1260. https://doi.org/10.1016/j.procs.2020.04.133

Singhal, A., Maan, A., Chaudhary, D., & Vishwakarma, D. (2021). A hybrid machine learning and data mining based approach to network intrusion detection. In Proceedings of the 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), 312-318. https://doi.org/10.1109/ICAIS50930.2021.9395918

Stavroulakis, P., & Stamp, M. (2010). Handbook of information and communication security. Springer-Verlag.

Swarna Sugi, S. S., & Ratna, S. R. (2020). Investigation of machine learning techniques in intrusion detection system for IoT network. In Proceedings of the 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), 1164-1167. https://doi.org/10.1109/ICISS49785.2020.9315900

Thapa, N., Liu, Z., KC, D. B., Gokaraju, B., & Roy, K. (2020). Comparison of machine learning and deep learning models for network intrusion detection systems. Future Internet, 12(10), 167. https://doi.org/10.3390/fi12100167

Umer, M. A., Junejo, K. N., Jilani, M. T., & Mathur, A. P. (2022). Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations. International Journal of Critical Infrastructure Protection, 38, 100516. https://doi.org/10.1016/j.ijcip.2022.100516

Verma, A., & Ranga, V. (2023). Machine learning based intrusion detection systems for IoT applications. https://doi.org/10.48550/arXiv.2302.12452

Zhang, G., Wang, X., Li, R., Lai, J., Xiang, Q., & He, J. (2020). Network intrusion detection method based on stacked denoising sparse autoencoder and extreme learning machine. In Proceedings of the 2020 2nd International Conference on Information Technology and Computer Application (ITCA), 194-199. https://doi.org/10.1109/ITCA52113.2020.00048

Zhang, L., Kuang, X., Xu, A., Suo, S., & Yang, Y. (2020). A novel network intrusion detection system based on CNN. In Proceedings of the 2020 Eighth International Conference on Advanced Cloud and Big Data (CBD), 243-247. https://doi.org/10.1109/CBD51900.2020.00051

Downloads

Published

30-09-2025