RETRACTED: Towards an efficient model for network intrusion detection system (IDS): systematic literature review (Retracted article. See vol. 31, pg. 4415, 2025)

被引:37
作者
Abdulganiyu, Oluwadamilare Harazeem [1 ]
Tchakoucht, Taha Ait [1 ]
Saheed, Yakub Kayode [2 ]
机构
[1] Euro Mediterranean Univ Fes, Sch Digital Engn & Artificial Intelligence, EuroMed Res Ctr, Fes 30030, Morocco
[2] Amer Univ Nigeria, Sch IT & Comp, Yola, Nigeria
关键词
Network intrusion detection system; Signature-based; Anomaly-based; Artificial intelligence; Rule-based; Pattern matching; MACHINE; ENSEMBLE; CLASSIFIERS; ALGORITHM; THINGS; CLASSIFICATION; CHALLENGES; REGRESSION; INTERNET; MISUSE;
D O I
10.1007/s11276-023-03495-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the recent rise in internet usage, the volume of crucial, private, and confidential data traveling online has increased. Attackers have made attempts to break into the network due to weaknesses in the security mechanisms, gaining access to sensitive data that could disrupt the operation of the systems and jeopardize the confidentiality of the data. Intrusion detection systems, a key component of cybersecurity, were used to defend against these potential threats. Numerous review papers have examined various intrusion detection system (IDS) approaches for networks, many of which focused primarily on the anomaly-based IDS while paying less attention to the signature and hybrid-based approaches. Additionally, a lot of these studies took a non-systematic approach, comparing existing techniques, without taking into account the in-depth analytical synthesis of methodologies and results of the approaches to provide a thorough grasp of state-of-the-art. In order to provide a thorough assessment of the current status of Network IDS, this work provides an in-depth insight into what is attainable in the research of Anomaly, Signature, and Hybrid-Based methods by adhering to the principles of Preferred Reporting Items for Systematic Reviews and Meta-Analyses and guidelines for Software Engineering Domain. We discovered unexplored study topics and unsolved research issues based on the study's findings. We end by highlighting potential, high impact future research areas in order to improve the IDS model.
引用
收藏
页码:453 / 482
页数:30
相关论文
共 143 条
[1]   Deep learning-based feature extraction and optimizing pattern matching for intrusion detection using finite state machine [J].
Abbasi, Junaid Shabbir ;
Bashir, Faisal ;
Qureshi, Kashif Naseer ;
ul Islam, Muhammad Najam ;
Jeon, Gwanggil .
COMPUTERS & ELECTRICAL ENGINEERING, 2021, 92
[2]   Principal component analysis [J].
Abdi, Herve ;
Williams, Lynne J. .
WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2010, 2 (04) :433-459
[3]   A systematic literature review for network intrusion detection system (IDS) [J].
Abdulganiyu, Oluwadamilare Harazeem ;
Tchakoucht, Taha Ait ;
Saheed, Yakub Kayode .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) :1125-1162
[4]   A Game-Theoretically Optimal Defense Paradigm against Traffic Analysis Attacks using Multipath Routing and Deception [J].
Abolfathi, Masoumeh ;
Shomorony, Ilan ;
Vahid, Alireza ;
Jafarian, Jafar Haadi .
PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022, 2022, :67-78
[5]   ELBA-IoT: An Ensemble Learning Model for Botnet Attack Detection in IoT Networks [J].
Abu Al-Haija, Qasem ;
Al-Dala'ien, Mu'awya .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (01)
[6]   High-performance intrusion detection system for networked UAVs via deep learning [J].
Abu Al-Haija, Qasem ;
Al Badawi, Ahmad .
NEURAL COMPUTING & APPLICATIONS, 2022, 34 (13) :10885-10900
[7]   Attack-Aware IoT Network Traffic Routing Leveraging Ensemble Learning [J].
Abu Al-Haija, Qasem ;
Al-Badawi, Ahmad .
SENSORS, 2022, 22 (01)
[8]   Boost-Defence for resilient IoT networks: A head-to-toe approach [J].
Abu Al-Haija, Qasem ;
Al Badawi, Ahmad ;
Bojja, Giridhar Reddy .
EXPERT SYSTEMS, 2022, 39 (10)
[9]   An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks [J].
Abu Al-Haija, Qasem ;
Zein-Sabatto, Saleh .
ELECTRONICS, 2020, 9 (12) :1-26
[10]   An Efficient Network Intrusion Detection and Classification System [J].
Ahmad, Iftikhar ;
Ul Haq, Qazi Emad ;
Imran, Muhammad ;
Alassafi, Madini O. ;
AlGhamdi, Rayed A. .
MATHEMATICS, 2022, 10 (03)