Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges

Intrusion detection systems built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. The authors used a qualitative method for analysing and evaluating the performance of network intrusion detection system (NIDS) in a syst...

Full description

Saved in:
Bibliographic Details
Main Authors: Al‐Bander, Baidaa, Maseer, Ziadoon K., Kadhim, Qusay Kanaan, Yusof, Robiah, Saif, Abdu
Format: Article
Language:English
Published: John Wiley and Sons Inc 2024
Online Access:http://eprints.utem.edu.my/id/eprint/28389/2/0076312072024174321902.pdf
http://eprints.utem.edu.my/id/eprint/28389/
https://ietresearch.onlinelibrary.wiley.com/doi/full/10.1049/ntw2.12128
https://doi.org/10.1049/ntw2.12128
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Intrusion detection systems built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. The authors used a qualitative method for analysing and evaluating the performance of network intrusion detection system (NIDS) in a systematic way. However, their approach has limitations as it only identifies gaps by analysing and summarising data comparisons without considering quantitative measurements of NIDS's performance. The authors provide a detailed discussion of various deep learning (DL) methods and explain data intrusion networks based on an infrastructure of networks and attack types. The authors’ main contribution is a systematic review that utilises meta‐analysis to provide an in‐depth analysis of DL and traditional machine learning (ML) in notable recent works. The authors assess validation methodologies and clarify recent trends related to dataset intrusion, detected attacks, and classification tasks to improve traditional ML and DL in NIDS‐based publications. Finally, challenges and future developments are discussed to pose new risks and complexities for network security.