2022
DOI: 10.1016/j.iot.2022.100615
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 35 publications
(15 citation statements)
references
References 81 publications
0
14
0
1
Order By: Relevance
“…The uncovering and classi cation of abnormalities in network events is becoming increasingly di cult due to the rise in complexity and frequency of cyber attacks. Research [17] provided comprehensive tables including the classi cation types utilised in these investigations, the techniques that were compare to previous methods, the routine criteria use, and the outcomes. Study [18] presented a technique that uses the Fuzzy Min Max Neural Networks-Based Intrusion Detection System (FMMNN-IDS) to detect intrusions using deep learning.…”
Section: Related Workmentioning
confidence: 99%
“…The uncovering and classi cation of abnormalities in network events is becoming increasingly di cult due to the rise in complexity and frequency of cyber attacks. Research [17] provided comprehensive tables including the classi cation types utilised in these investigations, the techniques that were compare to previous methods, the routine criteria use, and the outcomes. Study [18] presented a technique that uses the Fuzzy Min Max Neural Networks-Based Intrusion Detection System (FMMNN-IDS) to detect intrusions using deep learning.…”
Section: Related Workmentioning
confidence: 99%
“…Unfortunately, this has also led to an unprecedented surge in cyberattacks, as criminals develop new and sophisticated methods to exploit vulnerabilities. With businesses and organizations in all sectors adopting technology, it is becoming increasingly difficult to detect and prevent these attacks, presenting a significant challenge to cybersecurity efforts [3][4][5]. The dynamic and intricate nature of these threats presents an escalating challenge for traditional cybersecurity methods to keep pace.…”
Section: Introductionmentioning
confidence: 99%
“…As more of our lives continue to move online, the need for network security keeps increasing. In recent years, access to computer systems has risen dramatically and intruders have found several ways to hide their identities with ease [15]. Clubbed with the growth of heterogeneous computer networks, these factors have made the problem of intrusion detection quite difficult.…”
Section: Introductionmentioning
confidence: 99%