2021
DOI: 10.1109/jsyst.2020.2992966
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey of Databases and Deep Learning Methods for Cybersecurity and Intrusion Detection Systems

Abstract: This survey presents a comprehensive overview of Machine Learning (ML) methods for cybersecurity intrusion detection systems, with a specific focus on recent approaches based on Deep Learning (DL). The review analyzes recent methods with respect to their intrusion detection mechanisms, performance results, and limitations as well as whether they use benchmark databases to ensure a fair evaluation. In addition, a detailed investigation of benchmark datasets for cybersecurity is presented. This paper is intended… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 94 publications
(41 citation statements)
references
References 96 publications
(112 reference statements)
0
13
0
Order By: Relevance
“…Meanwhile, the other 97% of attempts are social engineering-driven. These red flags mean additional fortification of data security, application security on-device security and network security only safeguards a small minority of attacks, regardless of the operating system and types of machines [6].…”
Section: Human Factor and Social Engineering Landscapementioning
confidence: 99%
“…Meanwhile, the other 97% of attempts are social engineering-driven. These red flags mean additional fortification of data security, application security on-device security and network security only safeguards a small minority of attacks, regardless of the operating system and types of machines [6].…”
Section: Human Factor and Social Engineering Landscapementioning
confidence: 99%
“…It provides a detailed classification of intrusion detection value for each emerging technology. D. Gumusbas et al, (2021): [15] The authors proposed to provide a road map for readers who wish to understand the potential of DL methods in network security and intrusion detection systems. Also, analysis of benchmark datasets is used in the literature to train DL models.…”
Section: Literature Surveymentioning
confidence: 99%
“…This dataset is also called CSE‐CIC‐IDS2018 it was created in collaboration with by Communications Security Establishment (CSE) and the Canadian Institute for Cybersecurity (CIC) in the year 2018 (Leevy & Khoshgoftaar, 2020), this dataset contains 83 features (Rios et al, 2020). This dataset is collected from two different capturing methods for testing and training from the database, full packet network traffic and reduced packet network traffic along with system logs are two different data collection procedures (Gumusbas et al, 2020). The dataset contains the following attack types in the network Brute‐force, DoS, DDoS, Web attacks, Heartbleed, Botnet, and infiltration (CSE‐CIC‐IDS2018, 2021; Lee et al, 2020; Sharafaldin et al, 2018).…”
Section: Benchmark Datasetmentioning
confidence: 99%