Research Trends in Network-Based Intrusion Detection Systems: A Review

被引:33
作者
Kumar, Satish [1 ]
Gupta, Sunanda [1 ]
Arora, Sakshi [1 ]
机构
[1] Shri Mata Vaishno Devi Univ, Sch Comp Sci & Engn, Jammu 18232, India
关键词
Intrusion detection; Market research; Computer security; Search engines; Feature extraction; Computer hacking; Machine learning; Citation; machine learning; bio-inspired; intrusion detection system; NIDS; datasets; ANOMALY DETECTION; MACHINE; ENSEMBLE; ALGORITHM; DESIGN; MODEL;
D O I
10.1109/ACCESS.2021.3129775
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network threats and hazards are evolving at a high-speed rate in recent years. Many mechanisms (such as firewalls, anti-virus, anti-malware, and spam filters) are being used as security tools to protect networks. An intrusion detection system (IDS) is also an effective and powerful network security system to detect unauthorized and abnormal network traffic flow. This article presents a review of the research trends in network-based intrusion detection systems (NIDS), their approaches, and the most common datasets used to evaluate IDS Models. The analysis presented in this paper is based on the number of citations acquired by an article published, the total count of articles published related to intrusion detection in a year, and most cited research articles related to the intrusion detection system in journals and conferences separately. Based on the published articles in the intrusion detection field for the last 15 years, this article also discusses the state-of-the-arts of NIDS, commonly used NIDS, citation-based analysis of benchmark datasets, and NIDS techniques used for intrusion detection. A citation and publication-based comparative analysis to quantify the popularity of various approaches are also presented in this paper. The study in this article may be helpful to the novices and researchers interested in evaluating research trends in NIDS and their related applications.
引用
收藏
页码:157761 / 157779
页数:19
相关论文
共 128 条
[1]   A novel SVM-kNN-PSO ensemble method for intrusion detection system [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
APPLIED SOFT COMPUTING, 2016, 38 :360-372
[2]   Survey on Anomaly Detection using Data Mining Techniques [J].
Agrawal, Shikha ;
Agrawal, Jitendra .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :708-713
[3]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[4]   Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system [J].
Al-Yaseen, Wathiq Laftah ;
Othman, Zulaiha Ali ;
Nazri, Mohd Zakree Ahmad .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 :296-303
[5]   A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms [J].
Almomani, Omar .
SYMMETRY-BASEL, 2020, 12 (06) :1-20
[6]  
Anchugam C.V., 2016, Network Security Attacks and Countermeasures, P115
[7]  
Anderson J.P., 1972, Advances in Computers, V12, P1
[8]  
[Anonymous], 2021, LIST AC DAT SEARCH E
[9]  
[Anonymous], 2000, P DARPA INF SURV C E, DOI DOI 10.1109/DISCEX.2000.821515
[10]  
[Anonymous], 2011, P 9 AUSTR DAT MIN C