TY - JOUR
T1 - Unveiling machine learning strategies and considerations in intrusion detection systems
T2 - a comprehensive survey
AU - Ali, Ali Hussein
AU - Charfeddine, Maha
AU - Ammar, Boudour
AU - Hamed, Bassem Ben
AU - Albalwy, Faisal
AU - Alqarafi, Abdulrahman
AU - Hussain, Amir
N1 - Publisher Copyright:
Copyright © 2024 Ali, Charfeddine, Ammar, Hamed, Albalwy, Alqarafi and Hussain.
PY - 2024/6/10
Y1 - 2024/6/10
N2 - The advancement of communication and internet technology has brought risks to network security. Thus, Intrusion Detection Systems (IDS) was developed to combat malicious network attacks. However, IDSs still struggle with accuracy, false alarms, and detecting new intrusions. Therefore, organizations are using Machine Learning (ML) and Deep Learning (DL) algorithms in IDS for more accurate attack detection. This paper provides an overview of IDS, including its classes and methods, the detected attacks as well as the dataset, metrics, and performance indicators used. A thorough examination of recent publications on IDS-based solutions is conducted, evaluating their strengths and weaknesses, as well as a discussion of their potential implications, research challenges, and new trends. We believe that this comprehensive review paper covers the most recent advances and developments in ML and DL-based IDS, and also facilitates future research into the potential of emerging Artificial Intelligence (AI) to address the growing complexity of cybersecurity challenges.
AB - The advancement of communication and internet technology has brought risks to network security. Thus, Intrusion Detection Systems (IDS) was developed to combat malicious network attacks. However, IDSs still struggle with accuracy, false alarms, and detecting new intrusions. Therefore, organizations are using Machine Learning (ML) and Deep Learning (DL) algorithms in IDS for more accurate attack detection. This paper provides an overview of IDS, including its classes and methods, the detected attacks as well as the dataset, metrics, and performance indicators used. A thorough examination of recent publications on IDS-based solutions is conducted, evaluating their strengths and weaknesses, as well as a discussion of their potential implications, research challenges, and new trends. We believe that this comprehensive review paper covers the most recent advances and developments in ML and DL-based IDS, and also facilitates future research into the potential of emerging Artificial Intelligence (AI) to address the growing complexity of cybersecurity challenges.
KW - benchmark datasets
KW - deep learning
KW - intrusion detection system
KW - machine learning
KW - network security
UR - http://www.scopus.com/inward/record.url?scp=85196658891&partnerID=8YFLogxK
U2 - 10.3389/fcomp.2024.1387354
DO - 10.3389/fcomp.2024.1387354
M3 - Review article
AN - SCOPUS:85196658891
VL - 6
JO - Frontiers in Computer Science
JF - Frontiers in Computer Science
M1 - 1387354
ER -