2022
DOI: 10.1016/j.cose.2022.102675
|View full text |Cite
|
Sign up to set email alerts
|

A systematic literature review of methods and datasets for anomaly-based network intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
33
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 138 publications
(48 citation statements)
references
References 78 publications
0
33
0
Order By: Relevance
“…Recently, many approaches have been proposed, exploring different techniques for different types of IDS (Phadke, Kulkarni, Bhawalkar, & Bhattad, 2019;Lansky et al, 2021). In DTS particular, anomaly-based network intrusion detection emerged as an important research and development direction of intrusion detection (Bhuyan et al, 2013;Yang et al, 2022). We also observed the emergence of specialized IDS in domains such as IoT (Tiwari & Narain, 2021), smart phones (Ahmad, Shah, & Al-Khasawneh, 2021), vehicles (Badukale, Thorat, & Rojatkar, 2021) and smart grids (Liu, Hagenmeyer, & Keller, 2021) just to mention a few.…”
Section: Related Workmentioning
confidence: 72%
See 1 more Smart Citation
“…Recently, many approaches have been proposed, exploring different techniques for different types of IDS (Phadke, Kulkarni, Bhawalkar, & Bhattad, 2019;Lansky et al, 2021). In DTS particular, anomaly-based network intrusion detection emerged as an important research and development direction of intrusion detection (Bhuyan et al, 2013;Yang et al, 2022). We also observed the emergence of specialized IDS in domains such as IoT (Tiwari & Narain, 2021), smart phones (Ahmad, Shah, & Al-Khasawneh, 2021), vehicles (Badukale, Thorat, & Rojatkar, 2021) and smart grids (Liu, Hagenmeyer, & Keller, 2021) just to mention a few.…”
Section: Related Workmentioning
confidence: 72%
“…In particular, anomaly-based network intrusion detection emerged as an important research and development direction of intrusion detection (Bhuyan et al. , 2013; Yang et al. , 2022).…”
Section: Related Workmentioning
confidence: 99%
“…More than 80 traffic scenarios are embedded in this dataset. [58]. In our proposed work, we have included all features of the CICIDS2018 dataset and its classes details along with instances are inducted in Table 3.…”
Section: Dataset Descriptionmentioning
confidence: 99%
“…Intrusion detection methods are mainly divided into misuse-based and anomalybased intrusion detection methods [4]. Misuse-based intrusion detection methods detect attack traffic in ICS by comparing the feature of detected traffic with the known attack traffic of historical traffic.…”
Section: Introductionmentioning
confidence: 99%