2021
DOI: 10.3390/s21217070
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Techniques for Detecting Network Attacks: Review and Research Directions

Abstract: The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks. Network attacks refer to all types of unauthorized access to a network including any attempts to damage and disrupt the network, often leading to serious consequences. Network attack detection is an active area of research in the community of cybersecurity. In the literature, there are various descriptions of network attack detection systems involving var… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 34 publications
(15 citation statements)
references
References 119 publications
(120 reference statements)
0
15
0
Order By: Relevance
“…Certain features must be available to analysts in order to create proactive models to identify malicious URLs. Simple URL strings can be used to extract these features, which can be lexical, content, or network [6], [7].…”
Section: A Url Featuresmentioning
confidence: 99%
“…Certain features must be available to analysts in order to create proactive models to identify malicious URLs. Simple URL strings can be used to extract these features, which can be lexical, content, or network [6], [7].…”
Section: A Url Featuresmentioning
confidence: 99%
“…[44][45][46][47][48] To forecast what features to take and what feature selection method to use is a difficult task in itself especially when many machines learning models and feature selection methods are available. The authors [40][41][42][43] predicted many optimal feature selection methods and using benchmark dataset but could not attain the efficient results. The selection of effective predictors prior to training the classifier on a large dataset produce better results than the classifiers using ineffective feature selection method.…”
Section: Research Gapmentioning
confidence: 99%
“…Yuan et al40 proposed deep defense, which is a deep learning-based DDoS attack detection that studies the network traffic sequence patterns and trace the network attack activities. They have used UNB-ISCX intrusion detection evaluation 2012 (ISCX2012) dataset.…”
mentioning
confidence: 99%
“…Instance-based clustering [1] is not in the coverage of this work, with the similar reason that edge devices are usually not able to store too many history data.…”
Section: Introductionmentioning
confidence: 99%