Deep Learning-Based Network Intrusion Detection Systems: A Systematic Literature Review

被引:0
作者
Mutembei, Leonard L. [1 ,2 ]
Senekane, Makhamisa C. [1 ,3 ]
van Zyl, Terence [1 ,2 ]
机构
[1] Univ Johannesburg, Acad Comp Sci & Software Engn, Johannesburg, South Africa
[2] Univ Johannesburg, Inst Intelligent Syst, Johannesburg, South Africa
[3] Natl Inst Theoret & Computat Syst, Stellenbosch, South Africa
来源
ARTIFICIAL INTELLIGENCE RESEARCH, SACAIR 2024 | 2025年 / 2326卷
关键词
Artificial Intelligence; Deep Learning; Machine Learning; Network Intrusion Detection System; PRISMA; GENERATIVE ADVERSARIAL NETWORK; ANOMALY DETECTION; NEURAL-NETWORK; SECURITY; INTERNET; ATTACKS; THINGS; FRAMEWORK;
D O I
10.1007/978-3-031-78255-8_13
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Machine Learning algorithms have been used to develop models in different fields like banking, healthcare, transportation, cybersecurity, and others. Many studies have shown the use of Machine Learning in network security by detecting network intrusions. However, the increase in user devices increases the data size and hence increases the complexity of the network. Cyber attackers continue to create advanced cyber attacks, and identifying them becomes extremely challenging. On the other hand, traditional Machine Learning models cannot efficiently handle large amounts of data and complexity. Therefore, this study examines how Deep Learning methods can be implemented for the Network Intrusion Detection Systems. The Network Intrusion Detection System (NIDS) helps to secure businesses within companies' networks from bad actors. As Deep Learning advances, network security experts must incorporate the techniques within the NIDS to minimize the effects of cyber attacks. For the investigation of the Deep Learning techniques in implementing NIDS, a study used Preferred Reporting Items for Systematic reviews and Meta-Analysis (PRISMA) framework to conduct a systematic literature review and summarizes 111 studies published between 2021 and November 2023. Articles were analyzed by categorizing them into Deep Learning algorithms, architectures and datasets. The performance comparisons have been evaluated based on available articles' results on various datasets. Methods have been compared based on precision, recall and F1 score metrics. The results revealed that the most commonly used datasets are CICIDS2017, CSE-CIC-IDS2018, CICDDoS2019, NSL-KDD and UNSW-NB15. Furthermore, it was observed that hybrid implementation approaches have been shown to produce accurate and robust models compared with traditional methods. Finally, the results further demonstrated the need to explore using Machine Learning in NIDS.
引用
收藏
页码:207 / 234
页数:28
相关论文
共 135 条
[1]   Semi-Supervised Spatiotemporal Deep Learning for Intrusions Detection in IoT Networks [J].
Abdel-Basset, Mohamed ;
Hawash, Hossam ;
Chakrabortty, Ripon K. ;
Ryan, Michael J. .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (15) :12251-12265
[2]   Distributed Denial of Service Attack Detection for the Internet of Things Using Hybrid Deep Learning Model [J].
Ahmim, Ahmed ;
Maazouzi, Faiz ;
Ahmim, Marwa ;
Namane, Sarra ;
Dhaou, Imed Ben .
IEEE ACCESS, 2023, 11 :119862-119875
[3]   A new DDoS attacks intrusion detection model based on deep learning for cybersecurity [J].
Akgun, Devrim ;
Hizal, Selman ;
Cavusoglu, Unal .
COMPUTERS & SECURITY, 2022, 118
[4]   Towards DDoS attack detection using deep learning approach [J].
Aktar, Sharmin ;
Nur, Abdullah Yasin .
COMPUTERS & SECURITY, 2023, 129
[5]   STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment [J].
Al, Samed ;
Dener, Murat .
COMPUTERS & SECURITY, 2021, 110
[6]   The sound of intrusion: A novel network intrusion detection system [J].
Aldarwbi, Mohammed Y. ;
Lashkari, Arash H. ;
Ghorbani, Ali A. .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
[7]  
Alhayali RAI, 2021, Indonesian Journal of Electrical Engineering and Computer Science, V24, P590, DOI [10.11591/ijeecs.v24.i1.pp590-599, 10.11591/ijeecs.v24.i1.pp590-599, DOI 10.11591/IJEECS.V24.I1.PP590-599]
[8]   Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System [J].
Aljanabi, Mohammad ;
Ismail, Mohd Arfian ;
Mezhuyev, Vitaly .
COMPLEXITY, 2020, 2020
[9]   A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities [J].
Alshamrani, Adel ;
Myneni, Sowmya ;
Chowdhary, Ankur ;
Huang, Dijiang .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1851-1877
[10]   NE-GConv: A lightweight node edge graph convolutional network for intrusion detection [J].
Altaf, Tanzeela ;
Wang, Xu ;
Ni, Wei ;
Liu, Ren Ping ;
Braun, Robin .
COMPUTERS & SECURITY, 2023, 130