Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ IET Networksarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
IET Networks
Article . 2024 . Peer-reviewed
License: CC BY
Data sources: Crossref
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
IET Networks
Article . 2024
Data sources: DOAJ
https://dx.doi.org/10.60692/hh...
Other literature type . 2024
Data sources: Datacite
https://dx.doi.org/10.60692/97...
Other literature type . 2024
Data sources: Datacite
https://dx.doi.org/10.48550/ar...
Article . 2023
License: CC BY SA
Data sources: Datacite
versions View all 6 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges

التحليل التلوي والمراجعة المنهجية لأنظمة الكشف عن اختراق الشبكة الشاذة: طرق الكشف ومجموعة البيانات ومنهجية التحقق والتحديات
Authors: Ziadoon Kamil Maseer; Qusay Kanaan Kadhim; Baidaa Al‐Bander; Robiah Yusof; Abdu Saif;

Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges

Abstract

AbstractIntrusion detection systems built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. The authors used a qualitative method for analysing and evaluating the performance of network intrusion detection system (NIDS) in a systematic way. However, their approach has limitations as it only identifies gaps by analysing and summarising data comparisons without considering quantitative measurements of NIDS's performance. The authors provide a detailed discussion of various deep learning (DL) methods and explain data intrusion networks based on an infrastructure of networks and attack types. The authors’ main contribution is a systematic review that utilises meta‐analysis to provide an in‐depth analysis of DL and traditional machine learning (ML) in notable recent works. The authors assess validation methodologies and clarify recent trends related to dataset intrusion, detected attacks, and classification tasks to improve traditional ML and DL in NIDS‐based publications. Finally, challenges and future developments are discussed to pose new risks and complexities for network security.

Keywords

FOS: Computer and information sciences, Artificial intelligence, Computer Science - Cryptography and Security, Outlier Detection, Computer Networks and Communications, TK5101-6720, Systems and Control (eess.SY), Anomaly detection, Electrical Engineering and Systems Science - Systems and Control, Anomaly Detection in High-Dimensional Data, Traffic Analysis, Artificial Intelligence, computer network security, FOS: Electrical engineering, electronic engineering, information engineering, Anomaly-based intrusion detection system, Data mining, Intrusion detection system, Computer science, Intrusion Detection, Machine Learning for Internet Traffic Classification, Computer Science, Physical Sciences, Telecommunication, Network Intrusion Detection and Defense Mechanisms, Anomaly Detection, computer networks, Botnet Detection, Cryptography and Security (cs.CR)

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    14
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 10%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Top 10%
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Top 10%
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
14
Top 10%
Top 10%
Top 10%
Green
gold
Related to Research communities