Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
Intrusion detection systems built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. The authors used a qualitative method for analysing and evaluating the performance of network intrusion detection system (NIDS) in a syst...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
John Wiley and Sons Inc
2024
|
Online Access: | http://eprints.utem.edu.my/id/eprint/28389/2/0076312072024174321902.pdf http://eprints.utem.edu.my/id/eprint/28389/ https://ietresearch.onlinelibrary.wiley.com/doi/full/10.1049/ntw2.12128 https://doi.org/10.1049/ntw2.12128 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utem.eprints.28389 |
---|---|
record_format |
eprints |
spelling |
my.utem.eprints.283892025-02-05T16:14:31Z http://eprints.utem.edu.my/id/eprint/28389/ Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges Al‐Bander, Baidaa Maseer, Ziadoon K. Kadhim, Qusay Kanaan Yusof, Robiah Saif, Abdu Intrusion detection systems built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. The authors used a qualitative method for analysing and evaluating the performance of network intrusion detection system (NIDS) in a systematic way. However, their approach has limitations as it only identifies gaps by analysing and summarising data comparisons without considering quantitative measurements of NIDS's performance. The authors provide a detailed discussion of various deep learning (DL) methods and explain data intrusion networks based on an infrastructure of networks and attack types. The authors’ main contribution is a systematic review that utilises meta‐analysis to provide an in‐depth analysis of DL and traditional machine learning (ML) in notable recent works. The authors assess validation methodologies and clarify recent trends related to dataset intrusion, detected attacks, and classification tasks to improve traditional ML and DL in NIDS‐based publications. Finally, challenges and future developments are discussed to pose new risks and complexities for network security. John Wiley and Sons Inc 2024-02 Article PeerReviewed text en cc_by_4 http://eprints.utem.edu.my/id/eprint/28389/2/0076312072024174321902.pdf Al‐Bander, Baidaa and Maseer, Ziadoon K. and Kadhim, Qusay Kanaan and Yusof, Robiah and Saif, Abdu (2024) Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges. IET Networks, 13 (5-6). pp. 339-376. ISSN 2047-4954 https://ietresearch.onlinelibrary.wiley.com/doi/full/10.1049/ntw2.12128 https://doi.org/10.1049/ntw2.12128 |
institution |
Universiti Teknikal Malaysia Melaka |
building |
UTEM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknikal Malaysia Melaka |
content_source |
UTEM Institutional Repository |
url_provider |
http://eprints.utem.edu.my/ |
language |
English |
description |
Intrusion detection systems built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. The authors
used a qualitative method for analysing and evaluating the performance of network intrusion detection system (NIDS) in a systematic way. However, their approach has limitations as it only identifies gaps by analysing and summarising data comparisons without considering quantitative measurements of NIDS's performance. The authors provide a detailed discussion of various deep learning (DL) methods and explain data intrusion networks based on an infrastructure of networks and attack types. The authors’ main contribution is a systematic review that utilises meta‐analysis to provide an in‐depth analysis of DL and traditional machine learning (ML) in notable recent works. The authors assess validation methodologies and clarify recent trends related to dataset intrusion, detected attacks, and classification tasks to improve traditional ML and DL in NIDS‐based publications. Finally, challenges and future developments are discussed to
pose new risks and complexities for network security. |
format |
Article |
author |
Al‐Bander, Baidaa Maseer, Ziadoon K. Kadhim, Qusay Kanaan Yusof, Robiah Saif, Abdu |
spellingShingle |
Al‐Bander, Baidaa Maseer, Ziadoon K. Kadhim, Qusay Kanaan Yusof, Robiah Saif, Abdu Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges |
author_facet |
Al‐Bander, Baidaa Maseer, Ziadoon K. Kadhim, Qusay Kanaan Yusof, Robiah Saif, Abdu |
author_sort |
Al‐Bander, Baidaa |
title |
Meta‐analysis and systematic review for anomaly network
intrusion detection systems: Detection methods, dataset,
validation methodology, and challenges |
title_short |
Meta‐analysis and systematic review for anomaly network
intrusion detection systems: Detection methods, dataset,
validation methodology, and challenges |
title_full |
Meta‐analysis and systematic review for anomaly network
intrusion detection systems: Detection methods, dataset,
validation methodology, and challenges |
title_fullStr |
Meta‐analysis and systematic review for anomaly network
intrusion detection systems: Detection methods, dataset,
validation methodology, and challenges |
title_full_unstemmed |
Meta‐analysis and systematic review for anomaly network
intrusion detection systems: Detection methods, dataset,
validation methodology, and challenges |
title_sort |
meta‐analysis and systematic review for anomaly network
intrusion detection systems: detection methods, dataset,
validation methodology, and challenges |
publisher |
John Wiley and Sons Inc |
publishDate |
2024 |
url |
http://eprints.utem.edu.my/id/eprint/28389/2/0076312072024174321902.pdf http://eprints.utem.edu.my/id/eprint/28389/ https://ietresearch.onlinelibrary.wiley.com/doi/full/10.1049/ntw2.12128 https://doi.org/10.1049/ntw2.12128 |
_version_ |
1823541850939588608 |
score |
13.23648 |