A Systematic and Comprehensive Survey of Recent Advances in Intrusion Detection Systems Using Machine Learning: Deep Learning, Datasets, and Attack Taxonomy

被引:17
作者
Momand, Asadullah [1 ]
Jan, Sana Ullah [2 ]
Ramzan, Naeem [1 ]
机构
[1] Univ West Scotland, Sch Comp Engn & Phys Sci, Paisley PA1 2BE, England
[2] Edinburgh Napier Univ, Sch Comp, Edinburgh EH10 5DT, Scotland
关键词
NETWORK;
D O I
10.1155/2023/6048087
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, intrusion detection systems (IDS) have become an essential part of most organisations' security architecture due to the rise in frequency and severity of network attacks. To identify a security breach, the target machine or network must be watched and analysed for signs of an intrusion. It is defined as efforts to compromise the confidentiality, integrity, or availability of a computer or network or to circumvent its security mechanisms. Several IDS have been proposed in the literature to efficiently detect such attempts exploiting different characteristics of cyberattacks. These systems can provide with timely sensing the network intrusions and, subsequently, notifying the manager or the responsible person in an organisation. Important actions are then carried out to reduce the degree of damage caused by the intrusion. Organisations use such techniques to defend their systems from the network disconnectivity and increase reliance on the information systems by employing intrusion detection. This paper presents a detailed summary of recent advances in IDS from the literature. Nevertheless, a review of future research directions for detecting malicious operations and launching different attacks on systems is discussed and highlighted. Furthermore, this study presents detailed description of well-known publicly available datasets and a variety of strategies developed for dealing with intrusions.
引用
收藏
页数:18
相关论文
共 88 条
  • [1] Aggarwal A., 2021, International Journal of Information Management Data Insights, V1, DOI [DOI 10.1016/J.JJIMEI.2020.100004, 10.1016/j.jjimei.2020.100004]
  • [2] Network intrusion detection system: A systematic study of machine learning and deep learning approaches
    Ahmad, Zeeshan
    Shahid Khan, Adnan
    Wai Shiang, Cheah
    Abdullah, Johari
    Ahmad, Farhan
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
  • [3] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31
  • [4] A feature reduced intrusion detection system using ANN classifier
    Akashdeep
    Manzoor, Ishfaq
    Kumar, Neeraj
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2017, 88 : 249 - 257
  • [5] STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment
    Al, Samed
    Dener, Murat
    [J]. COMPUTERS & SECURITY, 2021, 110
  • [6] Identification of malicious activities in industrial internet of things based on deep learning models
    AL-Hawawreh, Muna
    Moustafa, Nour
    Sitnikova, Elena
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 1 - 11
  • [7] Albawi S, 2017, I C ENG TECHNOL
  • [8] IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses
    Albulayhi, Khalid
    Smadi, Abdallah A.
    Sheldon, Frederick T.
    Abercrombie, Robert K.
    [J]. SENSORS, 2021, 21 (19)
  • [9] Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
    Aldweesh, Arwa
    Derhab, Abdelouahid
    Emam, Ahmed Z.
    [J]. KNOWLEDGE-BASED SYSTEMS, 2020, 189 (189)
  • [10] Keyvanrad MA, 2016, Arxiv, DOI [arXiv:1408.3264, 10.48550/arXiv.1408.3264, DOI 10.48550/ARXIV.1408.3264]