Meta-Analysis and Systematic Review for Anomaly Network Intrusion Detection Systems: Detection Methods, Dataset, Validation Methodology, and Challenges

08/05/2023
by   Ziadoon K. Maseer, et al.
0

Intrusion detection systems (IDSs) built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. Although review papers are used the systematic review or simple methods to analyse and criticize the anomaly NIDS works, the current review uses a traditional way as a quantitative description to find current gaps by synthesizing and summarizing the data comparison without considering algorithms performance. This paper presents a systematic and meta-analysis study of AI for network intrusion detection systems (NIDS) focusing on deep learning (DL) and machine learning (ML) approaches in network security. Deep learning algorithms are explained in their structure, and data intrusion network is justified based on an infrastructure of networks and attack types. By conducting a meta-analysis and debating the validation of the DL and ML approach by effectiveness, used dataset, detected attacks, classification task, and time complexity, we offer a thorough benchmarking assessment of the current NIDS-based publications-based systematic approach. The proposed method is considered reviewing works for the anomaly-based network intrusion detection system (anomaly-NIDS) models. Furthermore, the effectiveness of proposed algorithms and selected datasets are discussed for the recent direction and improvements of ML and DL to the NIDS. The future trends for improving an anomaly-IDS for continuing detection in the evolution of cyberattacks are highlighted in several research studies.

READ FULL TEXT

page 1

page 5

page 8

page 9

page 10

page 16

page 17

research
12/04/2020

Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems

As the number of cyber-attacks is increasing, cybersecurity is evolving ...
research
04/19/2023

Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review

Globally, the external Internet is increasingly being connected to the c...
research
01/06/2021

RANK: AI-assisted End-to-End Architecture for Detecting Persistent Attacks in Enterprise Networks

Advanced Persistent Threats (APTs) are sophisticated multi-step attacks,...
research
09/17/2019

Walling up Backdoors in Intrusion Detection Systems

Interest in poisoning attacks and backdoors recently resurfaced for Deep...
research
01/20/2022

NLP Methods in Host-based Intrusion Detection Systems: A Systematic Review and Future Directions

The Host-Based Intrusion Detection Systems (HIDS) are widely used for de...
research
03/07/2014

Continuous Features Discretization for Anomaly Intrusion Detectors Generation

Network security is a growing issue, with the evolution of computer syst...

Please sign up or login with your details

Forgot password? Click here to reset