CFP last date
20 August 2025
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2025

Submit your paper
Know more
Random Articles
Reseach Article

Intrusion Detection in the Era of Machine Learning: A Critical Survey of Algorithms and Evaluation Practices

by Bhavika, Neelam Duhan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 21
Year of Publication: 2025
Authors: Bhavika, Neelam Duhan
10.5120/ijca2025925297

Bhavika, Neelam Duhan . Intrusion Detection in the Era of Machine Learning: A Critical Survey of Algorithms and Evaluation Practices. International Journal of Computer Applications. 187, 21 ( Jul 2025), 50-57. DOI=10.5120/ijca2025925297

@article{ 10.5120/ijca2025925297,
author = { Bhavika, Neelam Duhan },
title = { Intrusion Detection in the Era of Machine Learning: A Critical Survey of Algorithms and Evaluation Practices },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2025 },
volume = { 187 },
number = { 21 },
month = { Jul },
year = { 2025 },
issn = { 0975-8887 },
pages = { 50-57 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number21/intrusion-detection-in-the-era-of-machine-learning-a-critical-survey-of-algorithms-and-evaluation-practices/ },
doi = { 10.5120/ijca2025925297 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-07-26T00:55:56.435646+05:30
%A Bhavika
%A Neelam Duhan
%T Intrusion Detection in the Era of Machine Learning: A Critical Survey of Algorithms and Evaluation Practices
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 21
%P 50-57
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the growing prominence and sophistication of cyber-attacks, IDS are now indispensable in securing computer networks. Traditional signature-based methods often fail to detect novel threats, prompting the adoption of ML and DL techniques into IDS. This review explores a range of ML algorithms: such as Decision Trees, Random Forest, Support Vector Machines, k-Nearest Neighbors, Naïve Bayes, and Logistic Regression—as well as DL models like Convolutional Neural Networks (CNN) and Recurrent Neural Networks (RNN). It explains their use in anomaly detection with established datasets like NSL-KDD and UNSW-NB15, and emphasizes importance of data preprocessing, feature selection, and evaluation measures (precision, accuracy, recall, F1-score). The survey emphasizes the strengths as well as constraints of every method, indicating that ensemble & deep learning methods show improved detection accuracy. Finally, it outlines key challenges and proposes future research avenues for developing robust & intelligent IDS solutions.

References
  1. S. Axelsson, "The base-rate fallacy and its implications for the difficulty of intrusion detection," ACM Trans. Inf. Syst. Secur., vol. 3, no. 3, pp. 186–205, Aug. 2000. doi: 10.1145/357830.357849.
  2. A. L. Buczak and E. Guven, "A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection," in IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153-1176, Secondquarter 2016, doi: 10.1109/COMST.2015.2494502.
  3. M. Gharib, R. Wehbe, A. Habrard, and C. Leroux, "Adversarial machine learning in network intrusion detection: Taxonomy, challenges, and future trends," IEEE Access, vol. 8, pp. 71366–71384, 2020. doi: 10.1109/ACCESS.2020.2987075.
  4. "Intrusion Detection: A Survey," White Paper, Chapter 2, 2002.
  5. D. E. Denning, "An Intrusion-Detection Model," IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222–232, Feb. 1987. doi: 10.1109/TSE.1987.232894.
  6. Murat oguz, Ihsan Omur buck, “A Behavior Based Intrusion Detection System Using Machine Learning Algorithms,” International Journal of Artificial Intelligence and Expert Systems,vol. 7, pp.22-26, 2016.
  7. P. Venkateswari, E. Jebitha Steffy, N. Muthukumaran, 'License Plate cognizance by Ocular Character Perception', International Research Journal of Engineering and Technology, Vol. 5, No. 2, pp. 536-542, February 2018.
  8. Al Mehedi Hasan, Mohammed Nasser, Shamim Ahmad, “Intrusion Detection System using Feature selection and Machine Learning methods,” Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, pp.120-128, 1996.
  9. R. Bace and P. Mell, "Intrusion Detection Systems," NIST Special Publication 800-31, National Institute of Standards and Technology, 2001.
  10. L. Breiman, "Random forests," Machine Learning, vol. 45, no. 1, pp. 5–32, 2001. doi: 10.1023/A:1010933404324.
  11. Reis, I., Baron, D., & Shahaf, S. Probabilistic random forest: A machine learning algorithm for noisy data sets. The Astronomical Journal, 2018, vol. 157, no. 1, pp., 16.
  12. M. A. Khan, N. Javaid, A. Majid, M. Imran, and M. Alnuem, “Dual sink efficient balanced energy technique for underwater acoustic sensor networks,” Proc. - IEEE 30th Int. Conf. Adv. Inf. Netw. Appl. Work. WAINA 2016, pp. 551–556, 2016, doi: 10.1109/WAINA.2016.156.
  13. H. P. Singh and M. Sharma, "Intrusion detection using feature selection and machine learning algorithm with misuse detection," Int. J. Comput. Sci. Inf. Technol., vol. 8, no. 1, pp. 145–152, 2016.
  14. K. Wang and S. J. Stolfo, "Anomalous payload-based network intrusion detection," in Recent Advances in Intrusion Detection, Springer, 2004, pp. 203–222.
  15. A. Kannappan and R. M. Bommi, “Energy-Efficient Routing using the Hybrid Bilevel- Litechenbery-Optimization Algorithm in Comparison with Ant-colony Optimization,” ICDCS 2022 - 2022 6th Int. Conf. Devices, Circuits Syst., no. April, pp. 464– 466, 2022, doi: 10.1109/ICDCS54290.2022.9780826.
  16. Rongheng, S. Applied Mathematical Statistics (3rd Edition), CA: Science Press, 2014.
  17. Bishop, C.M. Neural networks for pattern recognition. England Oxford University, 1995.
  18. Manocha, S., and Girolami, M.A. An empirical analysis of the probabilistic K-nearest neighbour classifier. Pattern Recognition Letters, 2007, vol.28, pp.1818–1824.
  19. T. Mitchell, Machine Learning, McGraw-Hill, 1997.
  20. Solmaz, R., Günay, M., Alkan, A. Use of naive bayes classifier in the diagnosis of functional thyroid disease. Academic Informatics Conference, 2014, Mersin, Türkiye, pp. 891-897.
  21. G. Yedukondalu, G. H. Bindu, J. Pavan, G. Venkatesh, and A. Sai Teja, "Intrusion Detection System Framework Using Machine Learning," in Proc. 2021 3rd Int. Conf. Inventive Res. Comput. Appl. (ICIRCA), Coimbatore, India, 2021, pp. 437–442. doi: 10.1109/ICIRCA51532.2021.9544522.
  22. H. L. Gururaj, F. Flammini, V. R. Ravikumar, and N. S. Prema, Recent Trends in Healthcare Innovation. Boca Raton, FL, USA: CRC Press, 2025.
  23. A. Mohamed, J. Heilala and N. S. Madonsela, "Machine Learning-Based Intrusion Detection Systems for Enhancing Cybersecurity," 2023 Second International Conference On Smart Technologies For Smart Nation (SmartTechCon), Singapore, Singapore, 2023, pp. 366-370, doi: 10.1109/SmartTechCon57526.2023.10391626.
  24. A. Y. Kalayci and U. Hacizade, "Anomaly-Based Intrusion Detection System Design Using Machine Learning Methods," 2024 XXXIII International Scientific Conference Electronics (ET), Sozopol, Bulgaria, 2024, pp. 1-6, doi: 10.1109/ET63133.2024.10721523.
  25. F. Guo, H. Jiao, X. Zhang, Y. Zhou and H. Feng, "Information Security Network Intrusion Detection System Based on Machine Learning," 2024 International Conference on Data Science and Network Security (ICDSNS), Tiptur, India, 2024, pp. 01-04, doi: 10.1109/ICDSNS62112.2024.10691041.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System (IDS); Machine Learning (ML); Deep Learning (DL); Anomaly Detection; NSL-KDD; UNSW-NB15.