Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges

Intrusion detection systems built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. The authors used a qualitative method for analysing and evaluating the performance of network intrusion detection system (NIDS) in a syst...

Full description

Saved in:
Bibliographic Details
Main Authors: Al‐Bander, Baidaa, Maseer, Ziadoon K., Kadhim, Qusay Kanaan, Yusof, Robiah, Saif, Abdu
Format: Article
Language:English
Published: John Wiley and Sons Inc 2024
Online Access:http://eprints.utem.edu.my/id/eprint/28389/2/0076312072024174321902.pdf
http://eprints.utem.edu.my/id/eprint/28389/
https://ietresearch.onlinelibrary.wiley.com/doi/full/10.1049/ntw2.12128
https://doi.org/10.1049/ntw2.12128
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utem.eprints.28389
record_format eprints
spelling my.utem.eprints.283892025-02-05T16:14:31Z http://eprints.utem.edu.my/id/eprint/28389/ Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges Al‐Bander, Baidaa Maseer, Ziadoon K. Kadhim, Qusay Kanaan Yusof, Robiah Saif, Abdu Intrusion detection systems built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. The authors used a qualitative method for analysing and evaluating the performance of network intrusion detection system (NIDS) in a systematic way. However, their approach has limitations as it only identifies gaps by analysing and summarising data comparisons without considering quantitative measurements of NIDS's performance. The authors provide a detailed discussion of various deep learning (DL) methods and explain data intrusion networks based on an infrastructure of networks and attack types. The authors’ main contribution is a systematic review that utilises meta‐analysis to provide an in‐depth analysis of DL and traditional machine learning (ML) in notable recent works. The authors assess validation methodologies and clarify recent trends related to dataset intrusion, detected attacks, and classification tasks to improve traditional ML and DL in NIDS‐based publications. Finally, challenges and future developments are discussed to pose new risks and complexities for network security. John Wiley and Sons Inc 2024-02 Article PeerReviewed text en cc_by_4 http://eprints.utem.edu.my/id/eprint/28389/2/0076312072024174321902.pdf Al‐Bander, Baidaa and Maseer, Ziadoon K. and Kadhim, Qusay Kanaan and Yusof, Robiah and Saif, Abdu (2024) Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges. IET Networks, 13 (5-6). pp. 339-376. ISSN 2047-4954 https://ietresearch.onlinelibrary.wiley.com/doi/full/10.1049/ntw2.12128 https://doi.org/10.1049/ntw2.12128
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
description Intrusion detection systems built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. The authors used a qualitative method for analysing and evaluating the performance of network intrusion detection system (NIDS) in a systematic way. However, their approach has limitations as it only identifies gaps by analysing and summarising data comparisons without considering quantitative measurements of NIDS's performance. The authors provide a detailed discussion of various deep learning (DL) methods and explain data intrusion networks based on an infrastructure of networks and attack types. The authors’ main contribution is a systematic review that utilises meta‐analysis to provide an in‐depth analysis of DL and traditional machine learning (ML) in notable recent works. The authors assess validation methodologies and clarify recent trends related to dataset intrusion, detected attacks, and classification tasks to improve traditional ML and DL in NIDS‐based publications. Finally, challenges and future developments are discussed to pose new risks and complexities for network security.
format Article
author Al‐Bander, Baidaa
Maseer, Ziadoon K.
Kadhim, Qusay Kanaan
Yusof, Robiah
Saif, Abdu
spellingShingle Al‐Bander, Baidaa
Maseer, Ziadoon K.
Kadhim, Qusay Kanaan
Yusof, Robiah
Saif, Abdu
Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
author_facet Al‐Bander, Baidaa
Maseer, Ziadoon K.
Kadhim, Qusay Kanaan
Yusof, Robiah
Saif, Abdu
author_sort Al‐Bander, Baidaa
title Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
title_short Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
title_full Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
title_fullStr Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
title_full_unstemmed Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
title_sort meta‐analysis and systematic review for anomaly network intrusion detection systems: detection methods, dataset, validation methodology, and challenges
publisher John Wiley and Sons Inc
publishDate 2024
url http://eprints.utem.edu.my/id/eprint/28389/2/0076312072024174321902.pdf
http://eprints.utem.edu.my/id/eprint/28389/
https://ietresearch.onlinelibrary.wiley.com/doi/full/10.1049/ntw2.12128
https://doi.org/10.1049/ntw2.12128
_version_ 1823541850939588608
score 13.23648