Systematic Literature Review: Implementation of Machine Learning for Intrusion Detection
DOI:
https://doi.org/10.29103/jreece.v5i2.20300Keywords:
Cyber Security, Intrusion Detection System, Machine LearningAbstract
The rapid development of information technology has an impact on the increasing threat to cyber security. One of the main threats is intrusion attacks that are increasingly complex and diverse. To solve this problem, machine learning-based Intrusion Detection System (IDS) is a promising solution due to its ability to detect threats automatically and efficiently. However, the large number of machine learning methods available poses a challenge in determining the best approach for various needs. This research aims to conduct a systematic literature review using PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines. This literature review identifies and categorises previous studies related to the application of machine learning in IDSs based on the problem addressed, proposed solution, research method, metric parameters, research object, and research results. The data for this research is taken from trusted sources, such as Google Scholar, IEEE, Elsevier, Springer, and MDPI. The results of this review are expected to provide a deeper understanding of the application of machine learning in IDS and provide direction for other researchers to fill the remaining research gaps.
References
Abdallah, E. E., Eleisah, W., & Otoom, A. F. (2022). Intrusion detection systems using supervised machine learning techniques: A survey. Procedia Computer Science, 201, 205-212. https://doi.org/10.1016/j.procs.2022.03.029
Abdel-Wahab, M. S., Neil, A. M., & Atia, A. (2020). A comparative study of machine learning and deep learning in network anomaly-based intrusion detection systems. In Proceedings of the 15th International Conference on Computer Engineering and Systems (ICCES), 1-6. https://doi.org/10.1109/ICCES51560.2020.9334553
Abrar, I., Ayub, Z., Masoodi, F., & Bamhdi, A. M. (2020). A machine learning approach for intrusion detection system on NSL-KDD dataset. In Proceedings of the 2020 International Conference on Smart Electronics and Communication (ICOSEC), 919-924. https://doi.org/10.1109/ICOSEC49089.2020.9215232
Ahmad, A. et al,. (2020). Machine Learning-Based Distributed Denial of Service Attack Detection on Intrusion Detection System Regarding to Feature Selection. International Journal of Artificial Intelligence Research, 4(1), 1-8. https://doi.org/10.29099ijair.v4i1.156.
Ahmed, L. A. H., & Hamad, Y. A. M. (2021). Machine learning techniques for network-based intrusion detection system: A survey paper. In Proceedings of the 2021 National Computing Colleges Conference (NCCC), 1-7. https://doi.org/10.1109/NCCC49330.2021.9428827
Alsahli, M. S., Almasri, M. M., Al-Akhras, M., Al-Issa, A. I., & Alawairdhi, M. (2021). Evaluation of machine learning algorithms for intrusion detection system in WSN. International Journal of Advanced Computer Science and Applications (IJACSA), 12(5). http://dx.doi.org/10.14569/IJACSA.2021.0120574
Ariyus, D. (2007). Intrusion detection system. ANDI.
Azizan, A. H., Mostafa, S. A., Mustapha, A., Foozy, C. F. M., Wahab, M. H. A., Mohammed, M. A., & Khalaf, B. A. (2021). A machine learning approach for improving the performance of network intrusion detection systems. Annals of Emerging Technologies in Computing (AETiC), 5(5), 201-208. https://doi.org/10.33166/AETiC.2021.05.025.
Bace, R., & Mell, P. (2001). Intrusion detection systems (Technical Report 800-31). National Institute of Standards and Technology (NIST).
Baci, N., Vukatana, K., & Baci, M. (2022). Machine learning approach for intrusion detection systems as a cyber security strategy for Small and Medium Enterprises. WSEAS Transactions on Business and Economics, 19, 474-480. https://doi.org/10.37394/23207.2022.19.43.
Cheng, X., Li, W., Xiao, Z., & Zhao, T. (2020). Intrusion detection system based on QBSO-FS. In Proceedings of the 2020 International Conference on Artificial Intelligence and Computer Engineering (ICAICE), 372-377. https://doi.org/10.1109/ICAICE51518.2020.00078
Daud, M., Zulfikar, M. Y., Hasibuan, A., & Isa, M. (2023). Prototype Of Automatic Watering And Fertilizing System For Oil Palm Seeds Based On Internet Of Things. Andalas Journal Of Electrical And Electronic Engineering Technology, 3(1), 1-9.
Das, S., Ashrafuzzaman, M., Sheldon, F. T., & Shiva, S. (2020). Network intrusion detection using natural language processing and ensemble machine learning. In Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence (SSCI), 829-835. https://doi.org/10.1109/SSCI47803.2020.9308268
Halimaa, A., & Sundarakantham, K. (2019). Machine learning based intrusion detection system. In Proceedings of the 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), 916-920. https://doi.org/10.1109/ICOEI.2019.8862784
Hamid, Y., Sugumaran, M., & Journaux, L. (2016). Machine learning techniques for intrusion detection: A comparative analysis. In Proceedings of the International Conference on Informatics and Analytics (ICIA-16). Association for Computing Machinery. https://doi.org/10.1145/2980258.2980378
Hassan, E. M., Saleh, M. A., & Ahmed, A. M. (2020). Network Intrusion Detection Approach using Machine Learning Based on Decision Tree Algorithm. Journal of Engineering and Applied Sciences-JE&AS, 7(2), 1-1. https://doi.org/10.5455/jeas.2020110101.
Isa, M. M., & Mhamdi, L. (2020). Native SDN intrusion detection using machine learning. In Proceedings of the 2020 IEEE Eighth International Conference on Communications and Networking (ComNet), 1-7. https://doi.org/10.1109/ComNet47917.2020.9306093
Jiang, F., et al. (2020). Deep learning based multi-channel intelligent attack detection for data security. IEEE Transactions on Sustainable Computing, 5(2), 204-212. https://doi.org/10.1109/TSUSC.2018.2793284
Kavitha, G., & Elango, N. M. (2020). An approach to feature selection in intrusion detection systems using machine learning algorithms. International Journal of e-Collaboration (IJeC), 16(4), 48-58. https://doi.org/10.4018/IJeC.2020100104.
Kumar, M., & Singh, A. K. (2020). Distributed intrusion detection system using blockchain and cloud computing infrastructure. In Proceedings of the 4th International Conference on Trends in Electronics and Informatics (ICOEI), 248-252. https://doi.org/10.1109/ICOEI48184.2020.9142954
Kumar, S. V. N., Selvi, M., Kannan, A., & Doulamis, A. D. (2023). A comprehensive survey on machine learning-based intrusion detection systems for secure communication in the Internet of Things. Intelligent Neuroscience, 2023, 1-17. https://doi.org/10.1155/2023/8981988
Liu, Z., Thapa, N., Shaver, A., Roy, K., Yuan, X., & Khorsandroo, S. (2020). Anomaly detection on IoT network intrusion using machine learning. In Proceedings of the 2020 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), 1-5. https://doi.org/10.1109/icABCD49160.2020.9183842
Meyer, P., et al. (2020). Demo: A security infrastructure for vehicular information using SDN, intrusion detection, and a defense center in the cloud. In Proceedings of the 2020 IEEE Vehicular Networking Conference (VNC), 1-2. https://doi.org/10.1109/VNC51378.2020.9318351
Mishra, P., Varadharajan, V., Pilli, E. S., & Tupakula, U. (2020). VMGuard: A VMI-based security architecture for intrusion detection in cloud environment. IEEE Transactions on Cloud Computing, 8(3), 957-971. https://doi.org/10.1109/TCC.2018.2829202
Musaab R., Dina A.. (2021). Intrusion detection system based on machine learning techniques. Indonesian Journal of Electrical Engineering and Computer Science, Vol. 23, No. 2, pp. 953-961, https://doi.org/10.11591ijeecs.v23.i2.pp953-961.
Musleh, D., Alotaibi, M., Al-Haidari, F., Rahman, A., & Mohammad, R. (2023). Intrusion detection system using feature extraction with machine learning algorithms in IoT. Journal of Sensor and Actuator Networks, 12, 1-19. https://doi.org/10.3390/jsan12020029
Nerlikar P., Pandey S., Sharma S., and Bagade S. (2020). Analysis of intrusion detection using machine learning techniques. Int. J. Comput. Netw. Commun. Secur., vol. 8, no. 10, pp. 84-93.
Pallepati, M., Voggu, S., Masula, R., & Konjarla, M. (2022). Network intrusion detection system using machine learning with data preprocessing and feature extraction. International Journal for Research in Applied Science and Engineering Technology, 10, 2360-2365. https://doi.org/10.22214/ijraset.2022.44326.
Parashar, A., Saggu, K. S., & Garg, A. (2022). Machine learning based framework for network intrusion detection system using stacking ensemble technique. Indian Journal of Engineering and Materials Sciences (IJEMS), 29(4), 509-518. https://doi.org/10.56042/ijems.v29i4.46838.
Pashaei, A., Akbari, M. E., Lighvan, M. Z., & Teymorzade, H. A. (2020). Improving the IDS performance through early detection approach in local area networks using industrial control systems of honeypot. In Proceedings of the 2020 IEEE International Conference on Environment and Electrical Engineering and 2020 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe), 1-5. https://doi.org/10.1109/EEEIC/ICPSEurope49358.2020.9160574
Pordelkhaki, M., Fouad, S., & Josephs, M. (2021, November). Intrusion detection for industrial control systems by machine learning using privileged information. In 2021 IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 1-6). http://doi.org/10.1109/ISI53945.2021.9624757.
Purbo, W. O. (2006). Buku Pinter Internet TCP/IP. PT. Elex Media Komputindo.
Saranya, T., Sridevi, S., Deisy, C., Chung, T. D., & Khan, M. K. A. A. (2020). Performance analysis of machine learning algorithms in intrusion detection system: A review. Procedia Computer Science, 171, 1251-1260. https://doi.org/10.1016/j.procs.2020.04.133
Singhal, A., Maan, A., Chaudhary, D., & Vishwakarma, D. (2021). A hybrid machine learning and data mining based approach to network intrusion detection. In Proceedings of the 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), 312-318. https://doi.org/10.1109/ICAIS50930.2021.9395918
Stavroulakis, P., & Stamp, M. (2010). Handbook of information and communication security. Springer-Verlag.
Swarna Sugi, S. S., & Ratna, S. R. (2020). Investigation of machine learning techniques in intrusion detection system for IoT network. In Proceedings of the 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), 1164-1167. https://doi.org/10.1109/ICISS49785.2020.9315900
Thapa, N., Liu, Z., KC, D. B., Gokaraju, B., & Roy, K. (2020). Comparison of machine learning and deep learning models for network intrusion detection systems. Future Internet, 12(10), 167. https://doi.org/10.3390/fi12100167
Umer, M. A., Junejo, K. N., Jilani, M. T., & Mathur, A. P. (2022). Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations. International Journal of Critical Infrastructure Protection, 38, 100516. https://doi.org/10.1016/j.ijcip.2022.100516
Verma, A., & Ranga, V. (2023). Machine learning based intrusion detection systems for IoT applications. https://doi.org/10.48550/arXiv.2302.12452
Zhang, G., Wang, X., Li, R., Lai, J., Xiang, Q., & He, J. (2020). Network intrusion detection method based on stacked denoising sparse autoencoder and extreme learning machine. In Proceedings of the 2020 2nd International Conference on Information Technology and Computer Application (ITCA), 194-199. https://doi.org/10.1109/ITCA52113.2020.00048
Zhang, L., Kuang, X., Xu, A., Suo, S., & Yang, Y. (2020). A novel network intrusion detection system based on CNN. In Proceedings of the 2020 Eighth International Conference on Advanced Cloud and Big Data (CBD), 243-247. https://doi.org/10.1109/CBD51900.2020.00051
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Amanda Amelia Khilda, M. Shaquille Rayhan, Annisa Rizki Amaliah, Nurbojatmiko

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
(1) Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
(2) Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
(3) Authors should of declare that agree for above agreement of copyright transfer agreement when they starting submission of manuscript on the open journal system account as sign that authors have aproved. This notice showed as official agreement of authors have agree above to Journal of Renewable Energy, Electrical, and Computer Engineering (JREECE) prior the publication.









