Research Trends in Network-Based Intrusion Detection Systems: A Review

被引:33
作者
Kumar, Satish [1 ]
Gupta, Sunanda [1 ]
Arora, Sakshi [1 ]
机构
[1] Shri Mata Vaishno Devi Univ, Sch Comp Sci & Engn, Jammu 18232, India
关键词
Intrusion detection; Market research; Computer security; Search engines; Feature extraction; Computer hacking; Machine learning; Citation; machine learning; bio-inspired; intrusion detection system; NIDS; datasets; ANOMALY DETECTION; MACHINE; ENSEMBLE; ALGORITHM; DESIGN; MODEL;
D O I
10.1109/ACCESS.2021.3129775
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network threats and hazards are evolving at a high-speed rate in recent years. Many mechanisms (such as firewalls, anti-virus, anti-malware, and spam filters) are being used as security tools to protect networks. An intrusion detection system (IDS) is also an effective and powerful network security system to detect unauthorized and abnormal network traffic flow. This article presents a review of the research trends in network-based intrusion detection systems (NIDS), their approaches, and the most common datasets used to evaluate IDS Models. The analysis presented in this paper is based on the number of citations acquired by an article published, the total count of articles published related to intrusion detection in a year, and most cited research articles related to the intrusion detection system in journals and conferences separately. Based on the published articles in the intrusion detection field for the last 15 years, this article also discusses the state-of-the-arts of NIDS, commonly used NIDS, citation-based analysis of benchmark datasets, and NIDS techniques used for intrusion detection. A citation and publication-based comparative analysis to quantify the popularity of various approaches are also presented in this paper. The study in this article may be helpful to the novices and researchers interested in evaluating research trends in NIDS and their related applications.
引用
收藏
页码:157761 / 157779
页数:19
相关论文
共 128 条
[21]   Feature deduction and ensemble design of intrusion detection systems [J].
Chebrolu, S ;
Abraham, A ;
Thomas, JP .
COMPUTERS & SECURITY, 2005, 24 (04) :295-307
[22]  
Delgosha F., 2006, PROC 25 IEEE INT C C, P1
[23]   Improved Relevance Vector Machine (IRVM) classifier for Intrusion Detection System [J].
Devi, E. M. Roopa ;
Suganthe, R. C. .
SOFT COMPUTING, 2019, 23 (19) :9111-9119
[24]  
Eid Heba F., 2010, Proceedings 10th International Conference on Intelligent Systems Design and Applications (ISDA 2010), P363, DOI 10.1109/ISDA.2010.5687239
[25]  
Falke A. D., 2014, INT J SCI RES ED, V2, P101
[26]  
FARAOUN K, 2007, INT ARAB J INF TECHN, V4, P237
[27]   Mining network data for intrusion detection through combining SVMs with ant colony networks [J].
Feng, Wenying ;
Zhang, Qinglei ;
Hu, Gongzhu ;
Huang, Jimmy Xiangji .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 37 :127-140
[28]   RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Ahmim, Ahmed ;
Derdour, Makhlouf ;
Janicke, Helge .
FUTURE INTERNET, 2020, 12 (03)
[29]  
Fogla P., 2006, P 13 ACM C COMP COMM, P59, DOI 10.1145/1180405.1180414
[30]   Evaluation of intrusion detectors: A decision theory approach [J].
Gaffney, JE ;
Ulvila, JW .
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, :50-61