Written by IEEE | April 4, 2017   |   Updated: April 12, 2017

There are many ideas and theories on how to combat cybersecurity threats. In a recent IEEE Xplore paper, “A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection,” the authors read and analyzed literature about machine learning and data mining methods for application in the cybersecurity field and when it was most effective to use them.

The focus of the survey is on cyber intrusion detection for wired networks. The wired networks prove to have more layers of defense at firewalls, operating systems and networks. This makes them less vulnerable to attacks than wireless networks, but still a target for cybersecurity issues.

Methods of data mining and machine learning are very complex and pose challenges for understanding when and how each should be used. The complexity of algorithms also make it harder to tell which method will be most effective when dealing with cybersecurity attacks.

When determining the effectiveness of the methods, there are many criteria that must be taken into account. They include accuracy, complexity, time for classifying an unknown instance with a trained model, and understandability of the final solution of each machine learning or data mining method.

There are three types of cyber analysis that work with an intrusion detection system: misuse-based, anomaly-based, and hybrid. Misuse-based are used to detect known attacks based on the signatures of those types of attacks. Anomaly-based techniques identify anomalies in normal behavior and can detect zero-day attacks. Hybrid techniques combine misuse and anomaly detection. They can detect both known and unknown attacks while having a small false positive rate.

With the number of hackers on the rise, and cybersecurity incidents a very “real” reality, there will never be “too much” research on this topic for developing safeguards against possible intrusions.

For More Information


A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

This survey paper describes a focused literature survey of machine learning (ML) and data mining (DM) methods for cyber analytics in [...]



Creating Healthy Spaces Through Technology

Harnessing and Sustaining our Natural Resources

Exceptional Infrastructure Challenges, Technology and Humanity

The Global Impact of IEEE's 802 Standards

Scenes of our Cyber Lives: The Security Threats and Technology Solutions Protecting Us

How Millennial Parents are Embracing Health and Wellness Technologies for Their Generation Alpha Kids

Space Exploration, Technology and Our Lives

Global Innovation and the Environment

How Technology, Privacy and Security are Changing Each Other (And Us)

Find us in booth 31506, LVCC South Hall 3 and experience the Technology Moon Walk

Virtual and Mixed Reality

How Robots are Improving our Health

IEEE Experts and the Robots They are Teaching

See how millennial parents around the world see AI impacting the lives of their tech-infused offspring

Take the journey from farm to table and learn how IoT will help us reach the rising demand for food production

Watch technical experts discuss the latest cyber threats

Explore how researchers, teachers, explorers, healthcare and medical professionals use immersive technologies

Follow the timeline to see how Generation AI will be impacted by technology

Learn how your IoT data can be used by experiencing a day in a connected life

Listen to technical experts discuss the biggest security threats today

See how tech has influenced and evolved with the Games

Enter our virtual home to explore the IoT (Internet of Things) technologies

Explore an interactive map showcasing exciting innovations in robotics

Interactively explore A.I. in recent Hollywood movies

Get immersed in technologies that will improve patients' lives