2023
DOI: 10.1155/2023/6048087
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic and Comprehensive Survey of Recent Advances in Intrusion Detection Systems Using Machine Learning: Deep Learning, Datasets, and Attack Taxonomy

Abstract: Recently, intrusion detection systems (IDS) have become an essential part of most organisations’ security architecture due to the rise in frequency and severity of network attacks. To identify a security breach, the target machine or network must be watched and analysed for signs of an intrusion. It is defined as efforts to compromise the confidentiality, integrity, or availability of a computer or network or to circumvent its security mechanisms. Several IDS have been proposed in the literature to efficiently… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 81 publications
0
7
0
Order By: Relevance
“…The study conducted by [25] emphasizes on the use of DL models in the identification of phishing assaults, a growing concern in the field of cybersecurity. This study highlights the importance of every DL model, starting from the preprocessing of input data through the generation of the model's output.…”
Section: Related Workmentioning
confidence: 99%
“…The study conducted by [25] emphasizes on the use of DL models in the identification of phishing assaults, a growing concern in the field of cybersecurity. This study highlights the importance of every DL model, starting from the preprocessing of input data through the generation of the model's output.…”
Section: Related Workmentioning
confidence: 99%
“…Detecting a security breach involves monitoring and analyzing the target machine or network for indications of unauthorized access. Such breaches are defined as attempts to compromise the confidentiality, integrity, or availability of a computer system or network, or to bypass its security measures [25]. However, the most common intrusion detection approaches are signature-based and anomaly-based.…”
Section: B Anomaly-based Intrusion Detection Systems (Ids)mentioning
confidence: 99%
“…Malicious attacks are continually developing, emphasizing the critical need for improved network security solutions. Given the world's growing reliance on digital technologies such as computers and the Internet, building safe and reliable programs, frameworks, and networks that can withstand these attacks is a critical task [1,2].…”
Section: Introductionmentioning
confidence: 99%
“…It accomplishes this by subtracting the minimum value of the feature from each data point and then dividing the result by the range of the feature. This technique's equivalent mathematical equation is shown as (1), where X is an original value and X is the normalized value [35]:…”
mentioning
confidence: 99%