Overview on Intrusion Detection Systems for Computers Networking Security
Abstract
:1. Introduction
1.1. Needs for Intrusion Detection Systems
- Adaptability to Emerging Threats: Cyber adversaries are constantly developing new techniques and attack vectors to bypass standard defenses, exploiting unknown or zero-day vulnerabilities. IDSs must be able to adapt to these emerging threats and detect zero-day attacks that could not be identified by security measures based solely on known attack signatures (or patterns) [1,2,3,4].
- Scalability and Performance: As traffic volumes increase in modern networks, IDSs must be able to scale, efficiently and quickly handle large amounts of data without compromising detection accuracy. This is especially important in enterprise or cloud networks, where traffic spikes can be extreme and unpredictable [5,6,7].
- Reduction in False Positives and False Negatives: An effective IDS must minimize the number of false positives, which are security alerts generated by legitimate activity that are interpreted as malicious, and false negatives, which are real attacks that the IDS fails to detect. False positives can overload security teams, distract from identifying real threats, and slow down business operations. Conversely, a high FNR can allow real threats to operate undetected, which can have serious consequences [8,9,10,11,12].
1.2. Objectives of This Review
- Provide an overview of IDS architectures and types: This review will explore the main categories of IDSs, including host-based (HIDS) and network-based (NIDS), and the distinctions between signature-based and anomaly-based detection. Hybrid and behavior-based systems, which seek to combine different approaches to improve detection capability and reduce false positives, will also be explored.
- Discuss key detection techniques: Another goal is to provide a detailed discussion of the detection techniques used by IDSs, from signature-based techniques to modern AI and ML applications, including deep learning models. We will examine how these techniques enable IDSs to identify malicious activity even in highly complex and rapidly evolving network environments.
- Review datasets and test environments: To effectively evaluate an IDS, it is essential to have datasets that realistically represent common network traffic and attacks. This review will analyze the most commonly used standard datasets for IDS evaluation, discussing their advantages and limitations. Additionally, a section will address issues related to the representativeness of datasets, such as data staleness and lack of variety in the representation of recent attacks.
- Review IDS implementations in modern network environments: With the increasing use of cloud computing, virtualized networks, and the IoT, IDSs must be adapted to operate in these environments. Special attention will be given to discussing IDSs designed for cloud networks, Software-Defined Networking (SDN), IoT, and ICS, highlighting the specific technical and operational challenges for each environment.
- Identifying current challenges and limitations of IDSs: Despite technological advances, IDSs still face various challenges, such as managing large volumes of data, increasing threat complexity, and maintaining high performance in terms of scalability and accuracy. The main limitations of current IDSs will be discussed, providing the reader with a clear overview of the obstacles that need to be overcome to develop more effective solutions.
- Exploring emerging trends and innovations: Finally, this review will provide a look at emerging trends in the field of IDSs, with a particular emphasis on advanced technologies such as AI and ML, and the potential of distributed technologies such as blockchain to improve network security. Furthermore, progress towards the development of autonomous and proactive IDSs, capable of automatically responding to ongoing attacks, will be explored.
- Comprehensive Overview: A broad analysis provides a holistic view of various technologies, methodologies, and applications of IDS, making it useful for readers seeking a general understanding of the field.
- Identification of Interconnections: It helps identify interconnections between different technologies and approaches, such as how AI algorithms can be integrated with other detection techniques or how scalability challenges affect different IDS architectures.
- Relevance to a Diverse Audience: A broad-spectrum review is relevant to a wider audience, including academics, cybersecurity professionals, software developers, and business decision-makers, serving as a starting point for further research or practical implementation.
- Identification of Research Gaps: By examining a wide range of topics, it is easier to identify research gaps and areas needing further study, guiding researchers towards new directions and innovation opportunities.
- Support for Strategic Decisions: For business decision-makers and security managers, a broad review provides valuable insights for making strategic decisions on technology adoption, integration of security solutions, and planning network protection.
- Flexibility and Adaptability: A broad analysis allows for better adaptation to rapid changes in the cybersecurity field. As threats and technologies evolve quickly, having a comprehensive understanding of various options and approaches enables more flexible and proactive responses.
- Foundation for Specific Studies: A broad-spectrum review can serve as a foundation for more specific studies. Readers can use the general information to delve deeper into particular topics of interest, such as AI algorithms, anomaly detection techniques, or cloud environment implementations.
1.3. Comparison with Prior Reviews
- 1.
- Scope and Breadth. Many prior reviews focus on specific aspects of IDSs, such as particular detection techniques or applications in specific environments. For example, in [13,14], the authors focus on IDSs for IoT networks; while in [15,16,17], the authors focus only on ML, deep learning, and federated learning techniques. Our review covers a broad spectrum of IDS technologies. We examine traditional methods and recent advancements, including AI and ML applications, and explore their implementations across various modern network environments such as cloud computing, IoT, and industrial control systems.
- 2.
- Integration of Advanced Technologies: Previous reviews often provide limited discussion on the integration of advanced technologies like AI, ML [18], and blockchain [19]. Our review places special emphasis on these technologies, exploring their potential to enhance IDS capabilities and address emerging cybersecurity threats.
- 3.
- Comprehensive Dataset Analysis: While some reviews touch upon datasets used for IDS evaluation, our review provides an in-depth analysis of standard datasets, discussing their advantages, limitations, and challenges associated with testing IDSs. This comprehensive dataset analysis is crucial for understanding the effectiveness of IDSs in real-world scenarios.
- 4.
- Current Challenges and Limitations: Our review thoroughly addresses the current challenges and limitations faced by IDSs, such as scalability, performance, and the reduction in false positives and negatives. We also discuss privacy and ethical concerns related to network traffic inspection, which are often overlooked in previous reviews.
- 5.
- Emerging Trends and Innovations: We explore emerging trends and innovations in the field of IDSs, providing insights into the development of autonomous and proactive IDSs capable of automatically responding to ongoing attacks. This forward-looking perspective is essential for guiding future research and development in IDS technologies.
1.4. Paper Structure
2. Search Methods and Inclusion/Exclusion Criteria
2.1. Search Methods
- ACM Digital Library.
- IEEE Xplore.
- Springer Link.
- MDPI.
- ScienceDirect.
- “Intrusion Detection Systems”.
- “Network Security”.
- “Anomaly Detection”.
- “Signature-Based Detection”.
- “ML in IDS”.
- “AI in IDS”.
- “Cloud Security”.
- “IoT Security”.
- “Industrial Control Systems Security”.
2.2. Search Strategy
- Initial Search: An initial search was conducted using the primary keywords in each database. This step aimed to identify a broad range of potentially relevant articles.
- Refinement of Search Terms: Based on the initial search results, the search terms were refined to include additional relevant keywords and phrases. Boolean operators (AND, OR) were used to combine search terms effectively.
- Screening of Titles and Abstracts: The titles and abstracts of the retrieved articles were screened to assess their relevance to the review’s objectives. Articles that did not meet the inclusion criteria were excluded at this stage.
- Full-Text Review: The full texts of the remaining articles were reviewed to ensure they met the inclusion criteria. Any discrepancies or uncertainties were resolved through discussion among the authors.
2.3. Inclusion Criteria
- Time Period: Articles published between 2019 and 2024 were included. This time frame was chosen to capture the most recent advancements and challenges in IDS technologies.
- Type of Publication: Only peer-reviewed journal articles, conference papers, and technical reports were considered. This criterion ensured the inclusion of high-quality and credible sources.
- Relevance: Articles had to specifically address IDS technologies, including detection techniques, implementations in various network environments, and evaluations using standard datasets. Studies focusing on related topics such as ML, AI, and cybersecurity in cloud, IoT, and ICSwere also included.
- Language: Only articles published in English were included to maintain consistency in language and ease of analysis.
2.4. Exclusion Criteria
- Non-English Publications: Articles not published in English were excluded to ensure consistency in language and ease of analysis.
- Irrelevant Topics: Articles that did not focus on IDSs or related topics were excluded. For example, studies focusing solely on unrelated aspects of network security without addressing IDSs were not considered.
- Duplicate Studies: Duplicate studies or articles presenting the same findings were excluded to avoid redundancy. In cases where multiple articles reported similar findings, the most comprehensive and recent study was included.
- Incomplete Data: Articles lacking sufficient data or methodological details to support their findings were excluded.
2.5. Data Extraction and Synthesis
- Extraction of Key Information: Key information such as the study’s objectives, methods, findings, and conclusions were extracted from each article. This information was organized into a structured format to facilitate comparison and synthesis.
- Evaluation of Methodological Quality: The methodological quality of each study was assessed using predefined criteria. Studies with significant methodological flaws were excluded from the final synthesis.
- Synthesis of Findings: The extracted data were synthesized to identify common themes, trends, and gaps in the literature. The synthesis process involved both qualitative and quantitative analysis, where applicable.
3. Analysis of IDS Architectures and Types
3.1. Computer Networks Components, Architecture and Vulnerabilities
3.1.1. Major Components of Computer Networks
3.1.2. Network Architectures: Common Models and Their Characteristics
3.1.3. Vulnerabilities
3.2. Types of IDSs
- NIDSs operate at the network level, continuously analyzing packets traversing network links to identify malicious activity. These systems are typically deployed at strategic points in the network infrastructure, such as at gateways or between subnets, to provide comprehensive visibility into traffic flows. An NIDS relies on techniques like DPI and flow analysis to detect a wide range of threats, including denial-of-service (DoS) attacks, malware propagation, and port scanning. One of the strengths of an NIDS lies in its ability to monitor multiple devices simultaneously, making it suitable for large-scale, distributed networks. However, NIDSs face challenges in environments with high traffic volumes or encrypted data. The performance of an NIDS can degrade under excessive traffic loads, leading to packet drops and missed detections. Moreover, the increasing adoption of encryption protocols such as TLS/SSL complicates packet inspection, as the payload is inaccessible without decryption, potentially creating blind spots for the system. Techniques such as decryption proxies or metadata analysis are employed to mitigate these challenges, but they introduce additional complexity and potential privacy concerns [42,43].
- HIDSs operate on individual endpoints, such as servers, desktops, or virtual machines, by monitoring system-level activities. This includes observing log files, process behavior, file system modifications, and system calls. An HIDS is well suited to detecting threats that specifically target the host, such as unauthorized access attempts, malware execution, or privilege escalation. One of the primary advantages of HIDSs is their ability to detect local threats that might evade network-level monitoring. For example, if a malicious actor gains access to a machine via a USB device or a phishing email, HIDSs can detect the subsequent unauthorized activities. Additionally, HIDSs are particularly effective in environments where network visibility is limited, such as on encrypted endpoints or in cloud-based systems. However, the reliance on individual host monitoring introduces scalability challenges in large organizations. Managing, configuring, and maintaining HIDSs across hundreds or thousands of devices requires substantial administrative effort. Moreover, HIDSs are inherently less capable of detecting attacks that span multiple hosts or the broader network, necessitating integration with network-level systems for a holistic defense [44,45]. Figure 1 shows schematic representation of the HIDS concept.
- Hybrid IDSs combine the capabilities of NIDSs and HIDSs to provide a more comprehensive security solution. These systems leverage the strengths of both approaches by monitoring both network traffic and host activities. By correlating data from multiple sources, hybrid IDSs can achieve greater accuracy in threat detection and reduce false positives. A key advantage of hybrid IDSs is their ability to provide contextual awareness. For instance, a network anomaly detected by the NIDS can be correlated with suspicious file access on a host, enabling more effective detection of multi-stage attacks, such as APTs. Furthermore, hybrid systems can provide defense-in-depth by applying detection mechanisms at both the network perimeter and individual endpoints. However, the integration of multiple data streams introduces complexity in system design and operation. Hybrid IDSs often require significant computational resources and sophisticated algorithms to process and correlate the vast amount of data generated. The increased complexity also raises challenges related to deployment, configuration, and maintenance, as well as potential latency in real-time detection [46,47].
- Signature-based IDSs rely on predefined patterns or “signatures” of known threats to identify malicious activity. These systems compare observed behavior or traffic against a database of signatures, such as specific byte sequences, known malware hashes, or anomalous commands. Signature-based detection is highly effective for identifying well-documented threats and offers the advantage of low false-positive rates. Despite their effectiveness against known threats, signature-based IDSs have significant limitations in detecting novel or polymorphic attacks. Cyber adversaries frequently modify their techniques to evade detection, rendering signatures obsolete. As a result, maintaining and updating the signature database is a continuous and resource-intensive process [48,49,50].
- Anomaly-based IDSs detect threats by identifying deviations from established baselines of normal behavior. These baselines can be defined using statistical models, ML algorithms, or heuristic approaches. Unlike signature-based systems, anomaly-based IDSs are capable of detecting previously unknown threats, making them suitable for dynamic and evolving threat landscapes. However, the reliance on behavioral baselines introduces challenges, particularly in environments with high variability. Normal behavior in such systems can be difficult to define, leading to an increased likelihood of false positives [51,52,53]. Furthermore, the computational overhead of anomaly detection is often higher than signature-based approaches, necessitating robust infrastructure and optimization to ensure real-time performance. Figure 2 shows the schematic representation of both the anomaly-based and signature-based IDS concepts.
- Specification-based IDSs represent a hybrid approach that combines the deterministic nature of rule-based systems with the flexibility of anomaly detection. These systems rely on predefined specifications of expected behavior, often created manually by experts, to identify violations indicative of malicious activity. This approach offers higher precision compared to purely anomaly-based systems and is particularly effective in controlled environments with well-defined operational parameters, such as ICS or IoT networks. However, the manual effort required to define specifications limits scalability and adaptability to new threats or rapidly changing environments [54,55].
3.3. Evaluation Metrics for IDSs
4. Overview on Intrusion Detection Techniques
4.1. Signature-Based Detection
4.2. Anomaly-Based Detection
4.3. Behavior-Based Detection
4.4. Technique Comparison
- Detection Against Known Threats. Signature-based systems provide the highest precision for documented threats, relying on well-defined matching processes to ensure low false-positive rates. Their operational simplicity and reliance on static signature databases make them efficient but inherently limited to known attacks. In contrast, anomaly-based and behavior-based methods excel at detecting novel threats, such as zero-day attacks and polymorphic malware, by identifying deviations from baselines or malicious intent.
- Processing and Computational Requirements. Signature-based systems are computationally lightweight, as their operations primarily involve direct pattern matching. This makes them well suited for high-throughput environments, such as enterprise gateways or cloud platforms. In contrast, anomaly-based and behavior-based systems impose higher computational overhead due to the need for continuous monitoring, complex correlation, and iterative baseline refinement. These methods often require dedicated infrastructure or high-performance computing resources to operate effectively.
- False Positives and Response Automation. Anomaly-based and behavior-based detection methods are prone to higher false-positive rates, stemming from difficulties in accurately modeling normal behavior or intent. This necessitates robust alert validation workflows and automated response systems to mitigate the administrative burden. Signature-based methods, with their deterministic nature, produce far fewer false positives but lack adaptability to evolving threats.
- Integration Workflows. The integration of these techniques into a comprehensive intrusion detection framework often involves multi-layered workflows. Signature-based systems are commonly deployed at network perimeters to handle high-traffic volumes efficiently. Anomaly-based methods are integrated into deeper network layers or host systems to provide contextual awareness and detect unknown threats. Behavior-based systems complement both by focusing on specific patterns of malicious intent, often at the application or user level.
- Context-Specific Suitability:
- –
- Signature-based detection is ideal for environments requiring high-speed processing of predictable threats, such as enterprise networks.
- –
- Anomaly-based detection is particularly valuable in dynamic settings, such as cloud or IoT infrastructures, where attack surfaces evolve rapidly.
- –
- Behavior-based detection finds its strength in safeguarding critical systems against advanced threats, including insider attacks and stealthy malware, by focusing on intent and complex behavior correlations.
5. Literature Analysis on IDS Implementation in Modern Networks
- Network Complexity: Different networks, such as enterprise, cloud, and IoT networks, have distinct architectures and traffic patterns. For instance, an NIDS is designed to monitor traffic across an entire network, making it suitable for environments with multiple devices and varying data flows. In contrast, an HIDS focuses on individual devices, providing detailed monitoring of specific endpoints.
- Specific Threats: Each type of network faces different threats. For example, IoT networks may be more susceptible to device-specific attacks, while traditional enterprise networks might encounter more sophisticated external threats. Tailored IDSs can address these specific vulnerabilities effectively by employing different detection methodologies suited to the network type
- Specialized Monitoring: Certain IDS types specialize in monitoring specific protocols or applications (e.g., protocol-based IDSs). This specialization allows for better detection of anomalies related to particular protocols, enhancing the overall security posture of the network. For instance, a protocol IDS can detect unusual behavior in HTTP traffic that a general NIDS might overlook.
- Improved Response Strategies: Different networks require distinct incident response strategies. An HIDS can provide real-time alerts based on local activity, which is vital for quick responses to potential breaches at the device level. Meanwhile, NIDSs can aggregate data from multiple sources to identify broader attack patterns across the network.
- Efficient Resource Utilization: By implementing different types of IDSs tailored to specific networks, organizations can optimize their resource allocation. For example, deploying NIDSs in high-traffic areas can help manage bandwidth effectively while using HIDSs on critical servers ensures focused monitoring without overwhelming resources.
- Regulatory Compliance: Different industries may have varying compliance requirements regarding data protection and intrusion detection. Customized IDS solutions can help organizations meet these regulatory standards by providing the necessary logging and reporting capabilities specific to their operational context.
5.1. IDSs for Cloud and Virtualized Networks
- Cyborg Intelligence Framework: The framework combines various advanced methodologies to address the limitations of existing IDSs in smart cities, such as high computational costs and time complexity.
- Data Preprocessing: The paper introduces the Quantized Identical Data Imputation (QIDI) mechanism for effective data preprocessing and normalization, which enhances the quality of input data by filtering out irrelevant attributes.
- Feature Optimization: The Conjugate Self-Organizing Migration (CSOM) algorithm is employed to optimize feature selection, significantly improving the classifier’s training process and detection accuracy.
- Intrusion Classification: The Reconciliate Multi-Agent Markov Learning (RMML) classification algorithm is utilized to categorize detected intrusions accurately, ensuring robust identification of various attack types.
- Performance Improvement: The proposed system aims to increase attack detection performance and efficiency through its unique combination of methodologies, which collectively enhance the overall security posture of smart city networks.
5.2. IDSs in IoT and Sensor Networks
- Deep Blockchain Framework (DBF): The authors propose a DBF designed to provide distributed intrusion detection while ensuring data privacy through blockchain and smart contracts. This framework aims to secure data migration between cloud services and protect IoT networks from cyberattacks.
- Intrusion Detection Method: The paper employs a bidirectional long short-term memory (BiLSTM) deep learning algorithm to analyze sequential network data. This approach is particularly suited for detecting complex cyber threats in real time, leveraging datasets such as UNSW-NB15 and BoT-IoT for evaluation.
- Privacy Preservation: The integration of blockchain technology facilitates immutable data exchange and enhances privacy during the migration of virtual machines (VMs) across cloud providers. Smart contracts are utilized to ensure that data handling complies with privacy standards.
- Performance Evaluation: The proposed DBF framework is compared against existing privacy-preserving intrusion detection techniques, demonstrating superior performance in terms of both detection accuracy and data security.
- System Architecture: The framework consists of four main components: cloud vendor, privacy-preservation-based blockchain with smart contracts, central coordinator unit (CCU), and collaborative intrusion detection system (CIDS).
- Anomaly-based Detection: This approach monitors deviations from normal behavior patterns to detect potential threats that may not match known attack signatures.
- Signature-based Detection: This method relies on a database of known attack signatures to identify malicious activities.
5.3. IDSs in SDN
- Feature Selection and Data Processing: The study discusses the importance of selecting relevant features from datasets, particularly using the NSL-KDD dataset as a benchmark. It mentions that out of 41 features, 12 were selected for optimal performance in detecting intrusions.
- Classifier Performance: A range of classifiers are evaluated, including CNN, deep neural networks (DNNs), RNNs, long short-term memory (LSTM), and Gated Recurrent Units (GRUs). The results indicate high accuracy rates, with the best performing classifiers achieving over accuracy in detecting attacks.
- Challenges and Future Directions: The paper identifies ongoing challenges in implementing ML-based NIDSs, such as adapting to new attack vectors that emerge as network technologies evolve. It calls for further research into refining ML models to improve their adaptability and effectiveness in real-time scenarios.
5.4. IDSs in Industrial Networking Systems
- Associative Recurrent Network (ARN): A new recurrent neural network model that effectively manages the relationship between past and current data states, addressing the limitations of existing models like Gated Recurrent Units (GRUs).
- Single Attention Mechanism (S-ATT): This mechanism enhances the ARN by allowing it to retain relevant past information without relying on traditional gated structures, thus improving the model’s ability to learn from historical data.
- Detection Probes: Specific tools designed to monitor system behavior.
- Event Processing Layer: A mechanism for managing and analyzing detected events.
- Core Anomaly Detection Component: Utilizes ML algorithms to identify deviations from normal operational patterns.
- Federated Learning Approach: Instead of sending sensitive data to a central server, DeepFed allows local devices to train models on their own data and share only the model updates. This significantly reduces the risk of exposing sensitive information while still improving the overall model performance through collaborative learning from multiple devices.
- Model Architecture: The framework employs deep learning techniques, utilizing CNN and RNN to enhance detection capabilities. These models are trained locally on devices that collect real-time data from industrial environments, ensuring that the system remains responsive and effective against various cyber threats.
- Security Protocol: To protect the integrity and privacy of model parameters during training, DeepFed incorporates a Paillier cryptosystem-based secure communication protocol. This cryptographic approach ensures that even if model updates are intercepted, they cannot be exploited by malicious actors.
- Associative Recurrent Network (ARN): The core innovation of this paper is the introduction of the ARN model. This recurrent neural network is tailored to effectively capture both long-term and short-term dependencies in network traffic data, overcoming limitations found in traditional Gated Recurrent Units (GRUs).
- Single Attention Mechanism (S-ATT): To enhance the model’s performance, the authors implement an attention mechanism that allows the ARN to retain important past information without relying on complex gated structures. This mechanism directly learns the relationships between past hidden states and current inputs, improving the model’s ability to detect intrusions.
5.5. Open Challenges and Future Research Directions in Modern IDSs
6. Datasets and Testing Environments
6.1. Standard Datasets for IDS Evaluation
6.2. Testing Procedures for IDSs
- Detection Accuracy (A): Measures the overall correctness of the IDS in classifying events as either benign or malicious. Formally, it is defined as
- FPR: Indicates the proportion of benign traffic incorrectly flagged as malicious, calculated asA low FPR is critical for reducing unnecessary alerts, which can overwhelm security analysts and degrade system usability.
- TPR or Sensitivity: Represents the ability of the IDS to correctly identify malicious traffic, expressed asHigh sensitivity ensures that the IDS effectively detects genuine threats, minimizing the risk of undetected attacks.
- Precision (P): Assesses the proportion of positively identified events that are indeed malicious, defined asPrecision is particularly important in high-alert environments where false alarms need to be minimized.
- Recall (R): Equivalent to , recall emphasizes the IDS’s capability to detect all malicious events in the dataset. Precision and recall are often evaluated together to balance detection performance.
- F1-Score (): Combines precision and recall into a single metric to provide a harmonic mean, useful in scenarios where both false positives and false negatives are equally critical:
- Processing Speed (): For real-time IDS applications, the system’s ability to process incoming traffic promptly is vital. This is typically measured in packets per second (PPS) or transactions per second (TPS). Testing involves simulating various traffic loads and measuring latency using tools like tcpreplay or Wireshark.
- Scalability: Refers to the IDS’s capacity to maintain its performance metrics as the network traffic volume or system complexity increases. Scalability testing often involves stress tests to evaluate performance under heavy traffic conditions.
- Resource Utilization: Monitors the consumption of critical system resources such as CPU, memory, and network bandwidth. Tools like Prometheus and Grafana are widely employed to visualize and analyze these metrics over time, providing insights into the efficiency of the IDS.
- Partitioning of Datasets: Typically, datasets are divided into three subsets to facilitate unbiased evaluation:
- –
- Training Set: Used to train the ML model, this subset represents the majority of the dataset (usually 70–80%).
- –
- Validation Set: A smaller subset (10–15%) utilized during the training phase to fine-tune hyperparameters and prevent overfitting.
- –
- Testing Set: A final independent subset (10–15%) reserved for evaluating the model’s performance, ensuring that it generalizes well to unseen data.
- Preprocessing Techniques: Preprocessing is crucial for optimizing datasets and enhancing the efficacy of ML algorithms. Key preprocessing methods include the following:
- –
- Normalization: Ensures that feature values are scaled within a specific range (e.g., [0, 1]) to avoid biases introduced by features with larger magnitudes. Formally,Normalization prevents numerical instability during model training, especially in algorithms sensitive to scale, such as Support Vector Machines (SVMs) or neural networks.
- –
- Feature Selection: Identifies the most relevant features for the IDS task to reduce dimensionality and improve computational efficiency. Techniques like Recursive Feature Elimination (RFE) or mutual information analysis can help rank features based on their predictive power.
- –
- Dimensionality Reduction: Methods like PCA or t-SNE are employed to project high-dimensional data into a lower-dimensional space while preserving essential patterns. For example, PCA aims to maximize variance along principal components:
- –
- Handling Imbalanced Data: Many IDS datasets suffer from an imbalance between benign and malicious samples. Techniques such as oversampling (e.g., SMOTE—Synthetic Minority Oversampling Technique) or undersampling can address this issue. SMOTE works by creating synthetic examples based on the feature-space similarity of existing minority-class samples.
- Augmentation and Synthetic Data Generation: When datasets lack specific attack patterns or are too small for robust model training, augmentation methods or synthetic data generation are employed. These approaches include the following:
- –
- Augmentation: Perturbing existing data to create new samples, such as adding noise or transforming features (e.g., shifting IP addresses while preserving traffic patterns).
- –
- Synthetic Data Generation: Creating entirely new samples using techniques like GANs or probabilistic models. GANs, for instance, generate realistic data samples by training two neural networks—a generator and a discriminator—in competition:
- Validation of Dataset Authenticity: To ensure the integrity and utility of datasets, careful validation is necessary. Synthetic data, for example, must closely replicate the statistical properties of real-world data without introducing biases. Techniques like Kolmogorov–Smirnov tests or visual comparisons using density plots are commonly used for this purpose.
- Preprocessing Tools and Libraries: Several tools and libraries facilitate efficient preprocessing of IDS datasets:
- –
- Python Libraries:
- ∗
- Scikit-learn: Provides utilities for normalization, feature selection, dimensionality reduction, and cross-validation.
- ∗
- Pandas: Enables efficient manipulation and analysis of tabular data, including data cleaning and transformation tasks.
- ∗
- NumPy: Supports numerical operations such as matrix manipulations, which are fundamental in tasks like PCA.
- –
- Specialized Tools: Tools like CICFlowMeter can extract network flow features from raw traffic data, while frameworks like Weka offer integrated platforms for preprocessing and ML workflows.
- Simulated Environments: Controlled testing conditions provided by simulation environments allow for the precise benchmarking of IDS performance. Tools such as GNS3, Cisco Packet Tracer, and Mininet are extensively utilized to model network topologies and simulate attack scenarios without endangering live production environments. Moreover, traffic generation tools like Ostinato and Scapy can create diverse attack patterns, enabling comprehensive testing of IDS capabilities [163,164,165].
- Real-World Testbeds: Real-world environments are critical for validating IDS solutions under realistic network conditions. Deploying IDSs in operational networks or experimental setups such as Cyber Ranges replicates authentic traffic loads, encompassing unpredictable attack patterns and legitimate user behavior. Platforms like ShadowNet and DETERLab offer robust testbeds for this purpose, facilitating practical assessments of IDS performance [166,167,168].
6.3. Challenges in Using Online Datasets
- Solution: Researchers are encouraged to utilize updated datasets like UNSW-NB15 or CIC-IDS2017/2018, which encompass more recent attack scenarios. When such datasets are unavailable, synthetic data generation or adversarial data augmentation can complement existing datasets. Tools like Python’s Faker library or GANs are effective in generating realistic synthetic data tailored to specific requirements.
- Solution: The adoption of common data formats, such as NetFlow or CSV, and the use of standardized feature extraction tools like CICFlowMeter can mitigate these issues. Open-source repositories hosting preprocessed datasets in standardized formats further facilitate reproducibility and cross-comparison of research findings.
- Solution: Employing hybrid datasets that combine real-world traffic with simulated data can strike a balance between realism and privacy. Techniques like differential privacy enable the anonymity of sensitive information while preserving dataset utility for research purposes.
- Solution: Dimensionality reduction techniques, such as PCA or autoencoders, can alleviate computational demands. Additionally, cloud-based platforms like AWS and Google Cloud offer scalable resources to support the training of IDS models. Frameworks such as Apache Spark and Dask can further expedite preprocessing tasks for voluminous datasets.
- Solution: To enhance generalization, researchers should employ cross-validation techniques with diverse datasets and incorporate domain adaptation methods. Prioritizing datasets that include varied traffic types and attack scenarios ensures better alignment with real-world conditions. Tools like Weka and RapidMiner facilitate experimentation with multiple validation techniques, providing deeper insights into model robustness.
7. Conclusions and Future Perspectives
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
Acronym | Extended Meaning |
IDS | Intrusion Detection System |
NIDS | Network-based Intrusion Detection System |
HIDS | Host-based Intrusion Detection System |
AI | Artificial Intelligence |
ML | Machine Learning |
SDN | Software-Defined Networking |
ICS | Industrial control system |
IoT | Internet of Things |
IIoT | Industrial Internet of Things |
APT | Advanced Persistent Threat |
DoS | Denial of service |
DDoS | Distributed denial of service |
XAI | Explainable Artificial Intelligence |
CNN | Convolutional neural network |
RNN | Recurrent neural network |
GAN | Generative Adversarial Network |
DRL | Deep Reinforcement Learning |
PCA | Principal Component Analysis |
PR | Precision–Recall |
ROC | Receiver Operating Characteristic |
AUC | Area Under the Curve |
TPR | True-Positive Rate |
FPR | False-Positive Rate |
FNR | False-Negative Rate |
F1-Score | Harmonic Mean of Precision and Recall |
NSL-KDD | Network Security Laboratory—Knowledge Discovery and Data Mining |
CVEs | Common Vulnerabilities and Exposures |
MQTT | Message Queuing Telemetry Transport |
SSH | Secure Shell |
FTP | File Transfer Protocol |
API | Application Programming Interface |
DPI | Deep Packet Inspection |
ELK Stack | Elasticsearch, Logstash, Kibana |
CICFlowMeter | Canadian Institute for Cybersecurity FlowMeter |
SMOTE | Synthetic Minority Oversampling Technique |
XSS | Cross-Site Scripting |
SCADA | Supervisory Control and Data Acquisition |
VPN | Virtual Private Network |
References
- Elsayed, M.A.; Wrana, M.; Mansour, Z.; Lounis, K.; Ding, S.H.H.; Zulkernine, M. AdaptIDS: Adaptive Intrusion Detection for Mission-Critical Aerospace Vehicles. IEEE Trans. Intell. Transp. Syst. 2022, 23, 23459–23473. [Google Scholar] [CrossRef]
- Mehedi, S.T.; Anwar, A.; Rahman, Z.; Ahmed, K.; Islam, R. Dependable Intrusion Detection System for IoT: A Deep Transfer Learning Based Approach. IEEE Trans. Ind. Inform. 2023, 19, 1006–1017. [Google Scholar] [CrossRef]
- Papamartzivanos, D.; Gómez Mármol, F.; Kambourakis, G. Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems. IEEE Access 2019, 7, 13546–13560. [Google Scholar] [CrossRef]
- Villegas-Ch, W.; Govea, J.; Gutierrez, R.; Maldonado Navarro, A.; Mera-Navarrete, A. Effectiveness of an Adaptive Deep Learning-Based Intrusion Detection System. IEEE Access 2024, 12, 184010–184027. [Google Scholar] [CrossRef]
- Uhm, Y.; Pak, W. Service-Aware Two-Level Partitioning for Machine Learning-Based Network Intrusion Detection With High Performance and High Scalability. IEEE Access 2021, 9, 6608–6622. [Google Scholar] [CrossRef]
- Khan, M.A.; Karim, M.R.; Kim, Y. A scalable and hybrid intrusion detection system based on the convolutional-LSTM network. Symmetry 2019, 11, 583. [Google Scholar] [CrossRef]
- Rahman, M.A.; Asyhari, A.T.; Leong, L.; Satrya, G.; Tao, M.H.; Zolkipli, M. Scalable machine learning-based intrusion detection system for IoT-enabled smart cities. Sustain. Cities Soc. 2020, 61, 102324. [Google Scholar] [CrossRef]
- Panigrahi, R.; Borah, S.; Bhoi, A.K.; Ijaz, M.F.; Pramanik, M.; Jhaveri, R.H.; Chowdhary, C.L. Performance assessment of supervised classifiers for designing intrusion detection systems: A comprehensive review and recommendations for future research. Mathematics 2021, 9, 690. [Google Scholar] [CrossRef]
- Arshad, J.; Azad, M.A.; Amad, R.; Salah, K.; Alazab, M.; Iqbal, R. A review of performance, energy and privacy of intrusion detection systems for IoT. Electronics 2020, 9, 629. [Google Scholar] [CrossRef]
- Dini, P.; Elhanashi, A.; Begni, A.; Saponara, S.; Zheng, Q.; Gasmi, K. Overview on intrusion detection systems design exploiting machine learning for networking cybersecurity. Appl. Sci. 2023, 13, 7507. [Google Scholar] [CrossRef]
- Spathoulas, G.P.; Katsikas, S.K. Reducing false positives in intrusion detection systems. Comput. Secur. 2010, 29, 35–44. [Google Scholar] [CrossRef]
- Al Jallad, K.; Aljnidi, M.; Desouki, M.S. Anomaly detection optimization using big data and deep learning to reduce false-positive. J. Big Data 2020, 7, 68. [Google Scholar] [CrossRef]
- Khraisat, A.; Alazab, A. A critical review of intrusion detection systems in the internet of things: Techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity 2021, 4, 18. [Google Scholar] [CrossRef]
- Chaabouni, N.; Mosbah, M.; Zemmari, A.; Sauvignac, C.; Faruki, P. Network Intrusion Detection for IoT Security Based on Learning Techniques. IEEE Commun. Surv. Tutor. 2019, 21, 2671–2701. [Google Scholar] [CrossRef]
- Ahmad, Z.; Shahid Khan, A.; Wai Shiang, C.; Abdullah, J.; Ahmad, F. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 2021, 32, e4150. [Google Scholar] [CrossRef]
- Liu, H.; Lang, B. Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey. Appl. Sci. 2019, 9, 4396. [Google Scholar] [CrossRef]
- Agrawal, S.; Sarkar, S.; Aouedi, O.; Yenduri, G.; Piamrat, K.; Alazab, M.; Bhattacharya, S.; Maddikunta, P.K.R.; Gadekallu, T.R. Federated Learning for intrusion detection system: Concepts, challenges and future directions. Comput. Commun. 2022, 195, 346–361. [Google Scholar] [CrossRef]
- Saranya, T.; Sridevi, S.; Deisy, C.; Chung, T.D.; Khan, M. Performance Analysis of Machine Learning Algorithms in Intrusion Detection System: A Review. Procedia Comput. Sci. 2020, 171, 1251–1260. [Google Scholar] [CrossRef]
- Adele, G.; Borah, A.; Paranjothi, A.; Khan, M.S.; Poulkov, V.K. A Comprehensive Systematic Review of Blockchain-Based Intrusion Detection Systems. In Proceedings of the 2024 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, 29–31 May 2024; pp. 605–611. [Google Scholar] [CrossRef]
- Baziana, P.A. Optical Data Center Networking: A Comprehensive Review on Traffic, Switching, Bandwidth Allocation, and Challenges. IEEE Access 2024, 12, 186413–186444. [Google Scholar] [CrossRef]
- Chen, X.; Wu, C.; Liu, X.; Huang, Q.; Zhang, D.; Zhou, H.; Yang, Q.; Khan, M.K. Empowering Network Security With Programmable Switches: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2023, 25, 1653–1704. [Google Scholar] [CrossRef]
- Kanade, A.; Ranganthan, C.; Babu, A.; Ramachandran, G.; Kusuma, A.; Anand, M.; Reddy, L. Analysis of wireless network security in internet of things and its applications. Indian J. Eng. 2024, 21, e1ije1675. [Google Scholar] [CrossRef]
- Polónio, J.; Moura, J.; Neto Marinheiro, R. On the Road to Proactive Vulnerability Analysis and Mitigation Leveraged by Software Defined Networks: A Systematic Review. IEEE Access 2024, 12, 98546–98566. [Google Scholar] [CrossRef]
- Yahaya, A.S.; Javaid, N.; Almogren, A.; Ahmed, A.; Gulfam, S.M.; Radwan, A. A Two-Stage Privacy Preservation and Secure Peer-to-Peer Energy Trading Model Using Blockchain and Cloud-Based Aggregator. IEEE Access 2021, 9, 143121–143137. [Google Scholar] [CrossRef]
- Jamil, F.; Iqbal, N.; Imran; Ahmad, S.; Kim, D. Peer-to-Peer Energy Trading Mechanism Based on Blockchain and Machine Learning for Sustainable Electrical Power Supply in Smart Grid. IEEE Access 2021, 9, 39193–39217. [Google Scholar] [CrossRef]
- Mohamed, M.A.; Hajjiah, A.; Alnowibet, K.A.; Alrasheedi, A.F.; Awwad, E.M.; Muyeen, S.M. A Secured Advanced Management Architecture in Peer-to-Peer Energy Trading for Multi-Microgrid in the Stochastic Environment. IEEE Access 2021, 9, 92083–92100. [Google Scholar] [CrossRef]
- Ray, P.P. An Introduction to Dew Computing: Definition, Concept and Implications. IEEE Access 2018, 6, 723–737. [Google Scholar] [CrossRef]
- Lim, M. C2CFTP: Direct and Indirect File Transfer Protocols Between Clients in Client-Server Architecture. IEEE Access 2020, 8, 102833–102845. [Google Scholar] [CrossRef]
- Azhdari, A.; Ardakan, M.A. Reliability optimization of multi-state networks in a star configuration with bi-level performance sharing mechanism and transmission losses. Reliab. Eng. Syst. Saf. 2022, 226, 108556. [Google Scholar] [CrossRef]
- Lin, C.; Cui, L.; Coit, D.W.; Lv, M. Performance analysis for a wireless sensor network of star topology with random nodes deployment. Wirel. Pers. Commun. 2017, 97, 3993–4013. [Google Scholar] [CrossRef]
- Jiang, X.; Zhang, H.; Barsallo Yi, E.A.; Raghunathan, N.; Mousoulis, C.; Chaterji, S.; Peroulis, D.; Shakouri, A.; Bagchi, S. Hybrid Low-Power Wide-Area Mesh Network for IoT Applications. IEEE Internet Things J. 2021, 8, 901–915. [Google Scholar] [CrossRef]
- Ghori, M.R.; Wan, T.C.; Sodhy, G.C. Bluetooth low energy mesh networks: Survey of communication and security protocols. Sensors 2020, 20, 3590. [Google Scholar] [CrossRef] [PubMed]
- Badea, A.; Croitoru, V.; Gheorghica, D. Computer network vulnerabilities and monitoring. In Proceedings of the 2015 9th International Symposium on Advanced Topics in Electrical Engineering (ATEE), Bucharest, Romania, 7–9 May 2015; pp. 49–54. [Google Scholar] [CrossRef]
- Aslan, Ö.; Aktuğ, S.S.; Ozkan-Okay, M.; Yilmaz, A.A.; Akin, E. A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics 2023, 12, 1333. [Google Scholar] [CrossRef]
- Arogundade, O.R. Network security concepts, dangers, and defense best practical. Comput. Eng. Intell. Syst. 2023, 14. [Google Scholar]
- Heiding, F.; Katsikeas, S.; Lagerström, R. Research communities in cyber security vulnerability assessments: A comprehensive literature review. Comput. Sci. Rev. 2023, 48, 100551. [Google Scholar] [CrossRef]
- Hussain, K.; Rahmatyar, A.R.; Riskhan, B.; Sheikh, M.A.U.; Sindiramutty, S.R. Threats and Vulnerabilities of Wireless Networks in the Internet of Things (IoT). In Proceedings of the 2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC), Tandojam, Pakistan, 8–9 January 2024; pp. 1–8. [Google Scholar] [CrossRef]
- Drăguşin, S.A.; Bizon, N.; Boştinaru, R.N. Comprehensive Analysis Of Cyber-Attack Techniques And Vulnerabilities In Communication Channels Of Embedded Systems. In Proceedings of the 2024 16th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Iasi, Romania, 27–28 June 2024; pp. 1–12. [Google Scholar] [CrossRef]
- Almazrouei, O.S.M.B.H.; Magalingam, P.; Hasan, M.K.; Shanmugam, M. A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions. IEEE Access 2023, 11, 44350–44376. [Google Scholar] [CrossRef]
- Khan, M.M.I.; Nencioni, G. Resource Allocation in Networking and Computing Systems: A Security and Dependability Perspective. IEEE Access 2023, 11, 89433–89454. [Google Scholar] [CrossRef]
- Hidouri, A.; Hajlaoui, N.; Touati, H.; Hadded, M.; Muhlethaler, P. A survey on security attacks and intrusion detection mechanisms in named data networking. Computers 2022, 11, 186. [Google Scholar] [CrossRef]
- Ring, M.; Wunderlich, S.; Scheuring, D.; Landes, D.; Hotho, A. A survey of network-based intrusion detection data sets. Comput. Secur. 2019, 86, 147–167. [Google Scholar] [CrossRef]
- Ullah, S.; Ahmad, J.; Khan, M.A.; Alshehri, M.S.; Boulila, W.; Koubaa, A.; Jan, S.U.; Ch, M.M.I. TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks. Comput. Netw. 2023, 237, 110072. [Google Scholar] [CrossRef]
- Satilmiş, H.; Akleylek, S.; Tok, Z.Y. A Systematic Literature Review on Host-Based Intrusion Detection Systems. IEEE Access 2024, 12, 27237–27266. [Google Scholar] [CrossRef]
- Nallakaruppan, M.K.; Somayaji, S.R.K.; Fuladi, S.; Benedetto, F.; Ulaganathan, S.K.; Yenduri, G. Enhancing Security of Host-Based Intrusion Detection Systems for the Internet of Things. IEEE Access 2024, 12, 31788–31797. [Google Scholar] [CrossRef]
- Remya, S.; Pillai, M.J.; Arjun, C.; Ramasubbareddy, S.; Cho, Y. Enhancing Security in LLNs Using a Hybrid Trust-Based Intrusion Detection System for RPL. IEEE Access 2024, 12, 58836–58850. [Google Scholar] [CrossRef]
- Bakro, M.; Kumar, R.R.; Husain, M.; Ashraf, Z.; Ali, A.; Yaqoob, S.I.; Ahmed, M.N.; Parveen, N. Building a Cloud-IDS by Hybrid Bio-Inspired Feature Selection Algorithms Along with Random Forest Model. IEEE Access 2024, 12, 8846–8874. [Google Scholar] [CrossRef]
- Kwon, H.Y.; Kim, T.; Lee, M.K. Advanced intrusion detection combining signature-based and behavior-based detection methods. Electronics 2022, 11, 867. [Google Scholar] [CrossRef]
- Otoum, Y.; Nayak, A. As-ids: Anomaly and signature based ids for the internet of things. J. Netw. Syst. Manag. 2021, 29, 23. [Google Scholar] [CrossRef]
- Dini, P.; Begni, A.; Ciavarella, S.; De Paoli, E.; Fiorelli, G.; Silvestro, C.; Saponara, S. Design and Testing Novel One-Class Classifier Based on Polynomial Interpolation with Application to Networking Security. IEEE Access 2022, 10, 67910–67924. [Google Scholar] [CrossRef]
- Al-Fuhaidi, B.; Farae, Z.; Al-Fahaidy, F.; Nagi, G.; Ghallab, A.; Alameri, A. Anomaly-Based Intrusion Detection System in Wireless Sensor Networks Using Machine Learning Algorithms. Appl. Comput. Intell. Soft Comput. 2024, 2024, 2625922. [Google Scholar] [CrossRef]
- Kumari, S.; Prabha, C.; Karim, A.; Hassan, M.M.; Azam, S. A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023. IET Inf. Secur. 2024, 2024, 8821891. [Google Scholar] [CrossRef]
- Dini, P.; Saponara, S. Design and Experimental Assessment of Real-Time Anomaly Detection Techniques for Automotive Cybersecurity. Sensors 2023, 23, 9231. [Google Scholar] [CrossRef]
- Sen, Ö.; van der Velde, D.; Lühman, M.; Sprünken, F.; Hacker, I.; Ulbig, A.; Andres, M.; Henze, M. On specification-based cyber-attack detection in smart grids. Energy Inform. 2022, 5, 23. [Google Scholar] [CrossRef]
- Hotellier, E.; Sicard, F.; Francq, J.; Mocanu, S. Standard specification-based intrusion detection for hierarchical industrial control systems. Inf. Sci. 2024, 659, 120102. [Google Scholar] [CrossRef]
- Dini, P.; Diana, L.; Elhanashi, A.; Saponara, S. Overview of AI-Models and Tools in Embedded IIoT Applications. Electronics 2024, 13, 2322. [Google Scholar] [CrossRef]
- Dini, P.; Saponara, S. Analysis, design, and comparison of machine-learning techniques for networking intrusion detection. Designs 2021, 5, 9. [Google Scholar] [CrossRef]
- Aldweesh, A.; Derhab, A.; Emam, A.Z. Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues. Knowl.-Based Syst. 2020, 189, 105124. [Google Scholar] [CrossRef]
- Yang, Z.; Liu, X.; Li, T.; Wu, D.; Wang, J.; Zhao, Y.; Han, H. A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput. Secur. 2022, 116, 102675. [Google Scholar] [CrossRef]
- Saba, T.; Rehman, A.; Sadad, T.; Kolivand, H.; Bahaj, S.A. Anomaly-based intrusion detection system for IoT networks through deep learning model. Comput. Electr. Eng. 2022, 99, 107810. [Google Scholar] [CrossRef]
- Wang, C.; Zhu, H. Wrongdoing Monitor: A Graph-Based Behavioral Anomaly Detection in Cyber Security. IEEE Trans. Inf. Forensics Secur. 2022, 17, 2703–2718. [Google Scholar] [CrossRef]
- Saathvika, S.; Accamma, B.L.; Santhosh, K.B.J. Adaptive Layered Machine Learning Approach to Detect and Mitigate Behavioral Based Intrusions in Wireless Sensor Network. In Proceedings of the 2024 Control Instrumentation System Conference (CISCON), Manipal, India, 2–3 August 2024; pp. 1–7. [Google Scholar] [CrossRef]
- Yzzogh, H.; Kandil, H.; Benaboud, H. A comprehensive overview of AI-driven behavioral analysis for security in Internet of Things. In The Art of Cyber Defense; CRC Press: Boca Raton, FL, USA, 2024; pp. 40–51. [Google Scholar]
- Shamekhi, A.; Shamsinejad Babaki, P.; Javidan, R. An intelligent behavioral-based DDOS attack detection method using adaptive time intervals. Peer-to-Peer Netw. Appl. 2024, 17, 2185–2204. [Google Scholar] [CrossRef]
- Soliman, K.; Sobh, M.A.; Bahaa-Eldin, A.M. Survey of Machine Learning HIDS Techniques. In Proceedings of the 2021 16th International Conference on Computer Engineering and Systems (ICCES), Cairo, Egypt, 15–16 December 2021; pp. 1–5. [Google Scholar] [CrossRef]
- Maseno, E.M.; Wang, Z.; Xing, H. A systematic review on hybrid intrusion detection system. Secur. Commun. Netw. 2022, 2022, 9663052. [Google Scholar] [CrossRef]
- Onyema, E.M.; Dalal, S.; Romero, C.A.T.; Seth, B.; Young, P.; Wajid, M.A. Design of intrusion detection system based on cyborg intelligence for security of cloud network traffic of smart cities. J. Cloud Comput. 2022, 11, 26. [Google Scholar] [CrossRef]
- Chiba, Z.; Abghour, N.; Moussaid, K.; Rida, M. Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms. Comput. Secur. 2019, 86, 291–317. [Google Scholar] [CrossRef]
- Sethi, K.; Kumar, R.; Prajapati, N.; Bera, P. Deep reinforcement learning based intrusion detection system for cloud infrastructure. In Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS), Bengaluru, India, 7–11 January 2020; pp. 1–6. [Google Scholar]
- Faber, K.; Faber, L.; Sniezynski, B. Autoencoder-based IDS for cloud and mobile devices. In Proceedings of the 2021 IEEE/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid), Melbourne, Australia, 10–13 May 2021; pp. 728–736. [Google Scholar] [CrossRef]
- Arunkumar, M.; Kumar, K.A. GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment. Int. J. Inf. Technol. 2023, 15, 1653–1660. [Google Scholar] [CrossRef]
- Vashishtha, L.K.; Singh, A.P.; Chatterjee, K. HIDM: A hybrid intrusion detection model for cloud based systems. Wirel. Pers. Commun. 2023, 128, 2637–2666. [Google Scholar] [CrossRef]
- Alkadi, O.; Moustafa, N.; Turnbull, B.; Choo, K.K.R. A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Internet Things J. 2020, 8, 9463–9472. [Google Scholar] [CrossRef]
- Maseer, Z.K.; Yusof, R.; Mostafa, S.A.; Bahaman, N.; Musa, O.; Al-Rimy, B.A.S. DeepIoT. IDS: Hybrid deep learning for enhancing IoT network intrusion detection. Comput. Mater. Contin. 2021, 69, 3946–3967. [Google Scholar]
- Eskandari, M.; Janjua, Z.H.; Vecchio, M.; Antonelli, F. Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet Things J. 2020, 7, 6882–6897. [Google Scholar] [CrossRef]
- Wani, A.; Khaliq, R. SDN-based intrusion detection system for IoT using deep learning classifier (IDSIoT-SDL). CAAI Trans. Intell. Technol. 2021, 6, 281–290. [Google Scholar] [CrossRef]
- Alzahrani, A.O.; Alenazi, M.J.F. Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks. Future Internet 2021, 13. [Google Scholar] [CrossRef]
- Krishnan, P.; Jain, K.; Aldweesh, A.; Prabu, P.; Buyya, R. OpenStackDP: A scalable network security framework for SDN-based OpenStack cloud infrastructure. J. Cloud Comput. 2023, 12, 26. [Google Scholar] [CrossRef]
- Bour, H.; Abolhasan, M.; Jafarizadeh, S.; Lipman, J.; Makhdoom, I. A multi-layered intrusion detection system for software defined networking. Comput. Electr. Eng. 2022, 101, 108042. [Google Scholar] [CrossRef]
- Alzahrani, A.O.; Alenazi, M.J. ML-IDSDN: Machine learning based intrusion detection system for software-defined network. Concurr. Comput. Pract. Exp. 2023, 35, e7438. [Google Scholar] [CrossRef]
- Liang, W.; Li, K.C.; Long, J.; Kui, X.; Zomaya, A.Y. An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Trans. Ind. Inform. 2019, 16, 2063–2071. [Google Scholar] [CrossRef]
- Awotunde, J.B.; Chakraborty, C.; Adeniyi, A.E. Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection. Wirel. Commun. Mob. Comput. 2021, 2021, 7154587. [Google Scholar] [CrossRef]
- Arsalan, M.; Mubeen, M.; Bilal, M.; Abbasi, S.F. 1D-CNN-IDS: 1D CNN-based Intrusion Detection System for IIoT. In Proceedings of the 2024 29th International Conference on Automation and Computing (ICAC), Sunderland, UK, 28–30 August 2024; pp. 1–4. [Google Scholar] [CrossRef]
- Rosa, L.; Cruz, T.; De Freitas, M.B.; Quitério, P.; Henriques, J.; Caldeira, F.; Monteiro, E.; Simões, P. Intrusion and anomaly detection for the next-generation of industrial automation and control systems. Future Gener. Comput. Syst. 2021, 119, 50–67. [Google Scholar] [CrossRef]
- Li, B.; Wu, Y.; Song, J.; Lu, R.; Li, T.; Zhao, L. DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber–Physical Systems. IEEE Trans. Ind. Inform. 2021, 17, 5615–5624. [Google Scholar] [CrossRef]
- Abdel-Basset, M.; Chang, V.; Hawash, H.; Chakrabortty, R.K.; Ryan, M. Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment. IEEE Trans. Ind. Inform. 2021, 17, 7704–7715. [Google Scholar] [CrossRef]
- Gulia, N.; Solanki, K.; Dalal, S.; Dhankhar, A.; Dahiya, O.; Salmaan, N.U. Intrusion Detection System Using the G-ABC with Deep Neural Network in Cloud Environment. Sci. Program. 2023, 2023, 7210034. [Google Scholar] [CrossRef]
- Sethi, K.; Kumar, R.; Mohanty, D.; Bera, P. Robust adaptive cloud intrusion detection system using advanced deep reinforcement learning. In Proceedings of the Security, Privacy, and Applied Cryptography Engineering: 10th International Conference, SPACE 2020, Kolkata, India, 17–21 December 2020; Proceedings 10. Springer: Berlin/Heidelberg, Germany, 2020; pp. 66–85. [Google Scholar]
- Shafay, M.; Ahmad, R.W.; Salah, K.; Yaqoob, I.; Jayaraman, R.; Omar, M. Blockchain for deep learning: Review and open challenges. Clust. Comput. 2023, 26, 197–221. [Google Scholar] [CrossRef]
- Hussain, J.; Hnamte, V. Deep Learning Based Intrusion Detection System: Software Defined Network. In Proceedings of the 2021 Asian Conference on Innovation in Technology (ASIANCON), Pune, India, 27–29 August 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Liu, Z.; Ye, D.; Yang, C.; Ding, Y.; Liu, Y.; Tang, L.; Chen, C. Simplicity over Complexity: An ARN-Based Intrusion Detection Method for Industrial Control Network. arXiv 2024, arXiv:2412.14669. [Google Scholar]
- Pan, C.C.; Leu, Y. A Study of Imbalanced Dataset Classification on KDD99 Datasets with Reinforcement Learning Mechanism. In Proceedings of the 2023 International Conference on Machine Learning and Cybernetics (ICMLC), Adelaide, Australia, 9–11 July 2023; pp. 399–404. [Google Scholar] [CrossRef]
- Landge, P.; Sherekar, S.S.; Chavan, S.R. An Intelligent Cyber Security System Approach using Machine Learning Techniques on KDD-99 Dataset. In Proceedings of the 2024 IEEE International Conference on Communication, Computing and Signal Processing (IICCCS), Asansol, India, 19–20 September 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Devarakonda, A.; Sharma, N.; Saha, P.; Ramya, S. Network intrusion detection: A comparative study of four classifiers using the NSL-KDD and KDD’99 datasets. J. Phys. Conf. Ser. 2022, 2161, 012043. [Google Scholar] [CrossRef]
- Choudhary, S.; Kesswani, N. Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 datasets using deep learning in IoT. Procedia Comput. Sci. 2020, 167, 1561–1573. [Google Scholar] [CrossRef]
- Al-Daweri, M.S.; Zainol Ariffin, K.A.; Abdullah, S.; Md Senan, M.F.E. An analysis of the KDD99 and UNSW-NB15 datasets for the intrusion detection system. Symmetry 2020, 12, 1666. [Google Scholar] [CrossRef]
- Barach, J. Enhancing Intrusion Detection with CNN Attention Using NSL-KDD Dataset. In Proceedings of the 2024 Artificial Intelligence for Business (AIxB), Laguna Hills, CA, USA, 30 September–2 October 2024; pp. 15–20. [Google Scholar] [CrossRef]
- Thana-Aksaneekorn, C.; Kosolsombat, S.; Luangwiriya, T. Machine Learning Classification for Intrusion Detection Systems Using the NSL-KDD Dataset. In Proceedings of the 2024 IEEE International Conference on Cybernetics and Innovations (ICCI), Chonburi, Thailand, 29–31 March 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Ngueajio, M.K.; Washington, G.; Rawat, D.B.; Ngueabou, Y. Intrusion detection systems using support vector machines on the kddcup’99 and nsl-kdd datasets: A comprehensive survey. In Proceedings of the SAI Intelligent Systems Conference, Amsterdam, The Netherlands, 1–2 September 2022; pp. 609–629. [Google Scholar]
- Abrar, I.; Ayub, Z.; Masoodi, F.; Bamhdi, A.M. A Machine Learning Approach for Intrusion Detection System on NSL-KDD Dataset. In Proceedings of the 2020 International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 10–12 September 2020; pp. 919–924. [Google Scholar] [CrossRef]
- Kunhare, N.; Tiwari, R. Study of the Attributes using Four Class Labels on KDD99 and NSL-KDD Datasets with Machine Learning Techniques. In Proceedings of the 2018 8th International Conference on Communication Systems and Network Technologies (CSNT), Bhopal, India, 24–26 November 2018; pp. 127–131. [Google Scholar] [CrossRef]
- Meena, G.; Choudhary, R.R. A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA. In Proceedings of the 2017 International Conference on Computer, Communications and Electronics (Comptelix), Jaipur, India, 1–2 July 2017; pp. 553–558. [Google Scholar] [CrossRef]
- Ravipati, R.D.; Abualkibash, M. Intrusion detection system classification using different machine learning algorithms on KDD-99 and NSL-KDD datasets—A review paper. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 2019, 11, 65–80. [Google Scholar] [CrossRef]
- Song, J.; Takakura, H.; Okabe, Y.; Eto, M.; Inoue, D.; Nakao, K. Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. In Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, Salzburg, Austria, 10–13 April 2011; pp. 29–36. [Google Scholar]
- Ferriyan, A.; Thamrin, A.H.; Takeda, K.; Murai, J. Generating network intrusion detection dataset based on real and encrypted synthetic attack traffic. Appl. Sci. 2021, 11, 7868. [Google Scholar] [CrossRef]
- Sato, H.; Kobayashi, R. Koga2022 Dataset: Comprehensive Dataset with Detailed Classification for Network Intrusion Detection Systems. In Proceedings of the 2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW), Himeji, Japan, 21–24 November 2022; pp. 351–357. [Google Scholar]
- Miyamoto, K.; Iida, M.; Han, C.; Ban, T.; Takahashi, T.; Takeuchi, J. Consolidating Packet-Level Features for Effective Network Intrusion Detection: A Novel Session-Level Approach. IEEE Access 2023, 11, 132792–132810. [Google Scholar] [CrossRef]
- Sheet, O.I.; Ibrahim, L.M. Intrusion Detection System Based on Machine Learning Techniques: A Survey. In Proceedings of the 2022 2nd International Conference on Advances in Engineering Science and Technology (AEST), Istanbul, Turkey, 28–29 March 2022; pp. 797–802. [Google Scholar] [CrossRef]
- Lopes, I.O.; Zou, D.; Abdulqadder, I.H.; Akbar, S.; Li, Z.; Ruambo, F.; Pereira, W. Network intrusion detection based on the temporal convolutional model. Comput. Secur. 2023, 135, 103465. [Google Scholar] [CrossRef]
- Soheily-Khah, S.; Marteau, P.F.; Béchet, N. Intrusion Detection in Network Systems Through Hybrid Supervised and Unsupervised Machine Learning Process: A Case Study on the ISCX Dataset. In Proceedings of the 2018 1st International Conference on Data Intelligence and Security (ICDIS), South Padre Island, TX, USA, 8–10 April 2018; pp. 219–226. [Google Scholar] [CrossRef]
- Kasongo, S.M.; Sun, Y. Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J. Big Data 2020, 7, 105. [Google Scholar] [CrossRef]
- Moualla, S.; Khorzom, K.; Jafar, A. Improving the Performance of Machine Learning-Based Network Intrusion Detection Systems on the UNSW-NB15 Dataset. Comput. Intell. Neurosci. 2021, 2021, 5557577. [Google Scholar] [CrossRef]
- Fathima, A.; Khan, A.; Uddin, M.F.; Waris, M.M.; Ahmad, S.; Sanin, C.; Szczerbicki, E. Performance evaluation and comparative analysis of machine learning models on the UNSW-NB15 dataset: A contemporary approach to cyber threat detection. Cybern. Syst. 2023, 1–17. [Google Scholar] [CrossRef]
- Kumar, A.; Guleria, K.; Chauhan, R.; Upadhyay, D. Advancing Intrusion Detection with Machine Learning: Insights from the UNSW-NB15 Dataset. In Proceedings of the 2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS), Bangalore, India, 28–29 June 2024; pp. 1–5. [Google Scholar]
- Sallam, Y.F.; Abd El-Nabi, S.; El-Shafai, W.; Ahmed, H.E.d.H.; Saleeb, A.; El-Bahnasawy, N.A.; Abd El-Samie, F.E. Efficient implementation of image representation, visual geometry group with 19 layers and residual network with 152 layers for intrusion detection from UNSW-NB15 dataset. Secur. Priv. 2023, 6, e300. [Google Scholar] [CrossRef]
- More, S.; Idrissi, M.; Mahmoud, H.; Asyhari, A.T. Enhanced Intrusion Detection Systems Performance with UNSW-NB15 Data Analysis. Algorithms 2024, 17, 64. [Google Scholar] [CrossRef]
- Elhanashi, A.; Dini, P.; Saponara, S.; Zheng, Q. Advancements in TinyML: Applications, Limitations, and Impact on IoT Devices. Electronics 2024, 13, 3562. [Google Scholar] [CrossRef]
- Elhanashi, A.; Dini, P.; Saponara, S.; Zheng, Q. Integration of deep learning into the iot: A survey of techniques and challenges for real-world applications. Electronics 2023, 12, 4925. [Google Scholar] [CrossRef]
- Korium, M.S.; Saber, M.; Beattie, A.; Narayanan, A.; Sahoo, S.; Nardelli, P.H. Intrusion detection system for cyberattacks in the Internet of Vehicles environment. Ad Hoc Netw. 2024, 153, 103330. [Google Scholar] [CrossRef]
- Turukmane, A.V.; Devendiran, R. M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning. Comput. Secur. 2024, 137, 103587. [Google Scholar] [CrossRef]
- Najafi Mohsenabad, H.; Tut, M.A. Optimizing cybersecurity attack detection in computer networks: A comparative analysis of bio-inspired optimization algorithms using the CSE-CIC-IDS 2018 dataset. Appl. Sci. 2024, 14, 1044. [Google Scholar] [CrossRef]
- Verkerken, M.; D’hooge, L.; Sudyana, D.; Lin, Y.D.; Wauters, T.; Volckaert, B.; De Turck, F. A Novel Multi-Stage Approach for Hierarchical Intrusion Detection. IEEE Trans. Netw. Serv. Manag. 2023, 20, 3915–3929. [Google Scholar] [CrossRef]
- Alzughaibi, S.; El Khediri, S. A cloud intrusion detection systems based on dnn using backpropagation and pso on the cse-cic-ids2018 dataset. Appl. Sci. 2023, 13, 2276. [Google Scholar] [CrossRef]
- Elhanashi, A.; Gasmi, K.; Begni, A.; Dini, P.; Zheng, Q.; Saponara, S. Machine learning techniques for anomaly-based detection system on CSE-CIC-IDS2018 dataset. In Proceedings of the International Conference on Applications in Electronics Pervading Industry, Environment and Society, Genova, Italy, 26–27 September 2022; pp. 131–140. [Google Scholar]
- Cao, Z.; Zhao, Z.; Shang, W.; Ai, S.; Shen, S. Using the ToN-IoT dataset to develop a new intrusion detection system for industrial IoT devices. Multimed. Tools Appl. 2024, 1–29. [Google Scholar] [CrossRef]
- Tareq, I.; Elbagoury, B.M.; El-Regaily, S.; El-Horbaty, E.S.M. Analysis of ton-iot, unw-nb15, and edge-iiot datasets using dl in cybersecurity for iot. Appl. Sci. 2022, 12, 9572. [Google Scholar] [CrossRef]
- Gad, A.R.; Nashat, A.A.; Barkat, T.M. Intrusion Detection System Using Machine Learning for Vehicular Ad Hoc Networks Based on ToN-IoT Dataset. IEEE Access 2021, 9, 142206–142217. [Google Scholar] [CrossRef]
- Li, J.; Othman, M.S.; Chen, H.; Yusuf, L.M. Cybersecurity Insights: Analyzing IoT Data Through Statistical and Visualization Techniques. In Proceedings of the 2024 International Symposium on Parallel Computing and Distributed Systems (PCDS), Singapore, 21–22 September 2024; pp. 1–10. [Google Scholar] [CrossRef]
- Jagdish Kumar, P.; Neduncheliyan, S.; Mundher Adnan, M.; K, S.; Sudhakar, A. Anomaly-Based Intrusion Detection System Using Bidirectional Long Short-Term Memory for Internet of Things. In Proceedings of the 2024 Third International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), Ballari, India, 26–27 April 2024; pp. 1–4. [Google Scholar] [CrossRef]
- Ahmim, A.; Maazouzi, F.; Ahmim, M.; Namane, S.; Dhaou, I.B. Distributed Denial of Service Attack Detection for the Internet of Things Using Hybrid Deep Learning Model. IEEE Access 2023, 11, 119862–119875. [Google Scholar] [CrossRef]
- Zhao, J.; Liu, Y.; Zhang, Q.; Zheng, X. CNN-AttBiLSTM Mechanism: A DDoS Attack Detection Method Based on Attention Mechanism and CNN-BiLSTM. IEEE Access 2023, 11, 136308–136317. [Google Scholar] [CrossRef]
- Yilmaz, A.A. Intrusion Detection in Computer Networks using Optimized Machine Learning Algorithms. In Proceedings of the 2022 3rd International Informatics and Software Engineering Conference (IISEC), Ankara, Turkey, 15–16 December 2022; pp. 1–5. [Google Scholar] [CrossRef]
- Sayed, M.I.; Sayem, I.M.; Saha, S.; Haque, A. A Multi-Classifier for DDoS Attacks Using Stacking Ensemble Deep Neural Network. In Proceedings of the 2022 International Wireless Communications and Mobile Computing (IWCMC), Dubrovnik, Croatia, 30 May–3 June 2022; pp. 1125–1130. [Google Scholar] [CrossRef]
- Wu, Z.; Zhang, H.; Wang, P.; Sun, Z. RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System. IEEE Access 2022, 10, 64375–64387. [Google Scholar] [CrossRef]
- Aktar, S.; Nur, A.Y. Towards DDoS attack detection using deep learning approach. Comput. Secur. 2023, 129, 103251. [Google Scholar] [CrossRef]
- Gondi, L.; Sambangi, S.; Priya, P.K.; Anjum, S.S. A Machine Learning Approach for DDoS Attack Detection in CIC-DDoS2019 Dataset Using Multiple Linear Regression Algorithm. In Proceedings of the XVIII International Conference on Data Science and Intelligent Analysis of Information, Kakinada, India, 24–25 April 2023; pp. 393–403. [Google Scholar]
- Stolfo, J.; Fan, W.; Lee, W.; Prodromidis, A.; Chan, P.K. Cost-based modeling and evaluation for data mining with application to fraud and intrusion detection. In Proceedings of the DARPA Information Survivability Conference and Exposition. DISCEX’00, Hilton Head, SC, USA, 25–27 January 2000; pp. 130–144. [Google Scholar]
- Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.A. A detailed analysis of the KDD CUP 99 data set. In Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, 8–10 July 2009; pp. 1–6. [Google Scholar] [CrossRef]
- Shiravi, A.; Shiravi, H.; Tavallaee, M.; Ghorbani, A.A. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 2012, 31, 357–374. [Google Scholar] [CrossRef]
- Sarhan, M.; Layeghy, S.; Moustafa, N.; Portmann, M. Netflow datasets for machine learning-based network intrusion detection systems. In Proceedings of the Big Data Technologies and Applications: 10th EAI International Conference, BDTA 2020, and 13th EAI International Conference on Wireless Internet, WiCON 2020, Virtual Event, 11 December 2020; Proceedings 10. Springer: Berlin/Heidelberg, Germany, 2021; pp. 117–135. [Google Scholar]
- Moustafa, N.; Creech, G.; Slay, J. Big data analytics for intrusion detection system: Statistical decision-making using finite dirichlet mixture models. In Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications; Springer: Berlin/Heidelberg, Germany, 2017; pp. 127–156. [Google Scholar]
- Moustafa, N.; Slay, J.; Creech, G. Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks. IEEE Trans. Big Data 2019, 5, 481–494. [Google Scholar] [CrossRef]
- Moustafa, N.; Slay, J. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf. Secur. J. A Glob. Perspect. 2016, 25, 18–31. [Google Scholar] [CrossRef]
- Moustafa, N.; Slay, J. UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 10–12 November 2015; pp. 1–6. [Google Scholar] [CrossRef]
- Sharafaldin, I.; Lashkari, A.H.; Ghorbani, A.A. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. In Proceedings of the International Conference on Information Systems Security and Privacy, Madeira, Portugal, 22–24 January 2018. [Google Scholar]
- Ashraf, J.; Keshk, M.; Moustafa, N.; Abdel-Basset, M.; Khurshid, H.; Bakhshi, A.D.; Mostafa, R.R. IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities. Sustain. Cities Soc. 2021, 72, 103041. [Google Scholar] [CrossRef]
- Moustafa, N. A systemic IoT–fog–cloud architecture for big-data analytics and cyber security systems: A review of fog computing. In Secure Edge Computing; CRC Press: Boca Raton, FL, USA, 2021; pp. 41–50. [Google Scholar]
- Moustafa, N.; Ahmed, M.; Ahmed, S. Data Analytics-Enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December 2020–1 January 2021; pp. 727–735. [Google Scholar] [CrossRef]
- Moustafa, N.; Keshky, M.; Debiez, E.; Janicke, H. Federated TON_IoT Windows Datasets for Evaluating AI-Based Security Applications. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December 2020–1 January 2021; pp. 848–855. [Google Scholar] [CrossRef]
- Alsaedi, A.; Moustafa, N.; Tari, Z.; Mahmood, A.; Anwar, A. TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems. IEEE Access 2020, 8, 165130–165150. [Google Scholar] [CrossRef]
- Booij, T.M.; Chiscop, I.; Meeuwissen, E.; Moustafa, N.; Hartog, F.T.H.d. ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets. IEEE Internet Things J. 2022, 9, 485–496. [Google Scholar] [CrossRef]
- Moustafa, N. A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets. Sustain. Cities Soc. 2021, 72, 102994. [Google Scholar] [CrossRef]
- Saheb, M.C.P.; Yadav, M.S.; Babu, S.; Pujari, J.J.; Maddala, J.B. A review of DDoS evaluation dataset: CICDDoS2019 dataset. In Proceedings of the International Conference on Energy Systems, Drives and Automations, Kolkata, India, 30–31 December 2021; pp. 389–397. [Google Scholar]
- Sharafaldin, I.; Lashkari, A.H.; Hakak, S.; Ghorbani, A.A. Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy. In Proceedings of the 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India, 1–3 October 2019; pp. 1–8. [Google Scholar] [CrossRef]
- Halbouni, A.; Gunawan, T.S.; Habaebi, M.H.; Halbouni, M.; Kartiwi, M.; Ahmad, R. Machine Learning and Deep Learning Approaches for CyberSecurity: A Review. IEEE Access 2022, 10, 19572–19585. [Google Scholar] [CrossRef]
- Salman, T.; Ghubaish, A.; Unal, D.; Jain, R. Safety score as an evaluation metric for machine learning models of security applications. IEEE Netw. Lett. 2020, 2, 207–211. [Google Scholar] [CrossRef]
- Jha, S.; Kumar, R.; Hoang Son, L.; Abdel-Basset, M.; Priyadarshini, I.; Sharma, R.; Viet Long, H. Deep Learning Approach for Software Maintainability Metrics Prediction. IEEE Access 2019, 7, 61840–61855. [Google Scholar] [CrossRef]
- Xin, Y.; Kong, L.; Liu, Z.; Chen, Y.; Li, Y.; Zhu, H.; Gao, M.; Hou, H.; Wang, C. Machine Learning and Deep Learning Methods for Cybersecurity. IEEE Access 2018, 6, 35365–35381. [Google Scholar] [CrossRef]
- Vivone, G.; Dalla Mura, M.; Garzelli, A.; Pacifici, F. A Benchmarking Protocol for Pansharpening: Dataset, Preprocessing, and Quality Assessment. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2021, 14, 6102–6118. [Google Scholar] [CrossRef]
- Alghamdi, T.A.; Javaid, N. A Survey of Preprocessing Methods Used for Analysis of Big Data Originated from Smart Grids. IEEE Access 2022, 10, 29149–29171. [Google Scholar] [CrossRef]
- Hasnain, M.; Pasha, M.F.; Ghani, I.; Mehboob, B.; Imran, M.; Ali, A. Benchmark Dataset Selection of Web Services Technologies: A Factor Analysis. IEEE Access 2020, 8, 53649–53665. [Google Scholar] [CrossRef]
- Kahloot, K.M.; Ekler, P. Algorithmic Splitting: A Method for Dataset Preparation. IEEE Access 2021, 9, 125229–125237. [Google Scholar] [CrossRef]
- Lansky, J.; Ali, S.; Mohammadi, M.; Majeed, M.K.; Karim, S.H.T.; Rashidi, S.; Hosseinzadeh, M.; Rahmani, A.M. Deep Learning-Based Intrusion Detection Systems: A Systematic Review. IEEE Access 2021, 9, 101574–101599. [Google Scholar] [CrossRef]
- Khan, I.A.; Pi, D.; Khan, Z.U.; Hussain, Y.; Nawaz, A. HML-IDS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems. IEEE Access 2019, 7, 89507–89521. [Google Scholar] [CrossRef]
- Sadiq, A.S.; Alkazemi, B.; Mirjalili, S.; Ahmed, N.; Khan, S.; Ali, I.; Pathan, A.S.K.; Ghafoor, K.Z. An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs. IEEE Access 2018, 6, 29041–29053. [Google Scholar] [CrossRef]
- Narayanan, A.; Sena, A.S.D.; Gutierrez-Rojas, D.; Melgarejo, D.C.; Hussain, H.M.; Ullah, M.; Bayhan, S.; Nardelli, P.H.J. Key Advances in Pervasive Edge Computing for Industrial Internet of Things in 5G and Beyond. IEEE Access 2020, 8, 206734–206754. [Google Scholar] [CrossRef]
- Kornaros, G. Hardware-Assisted Machine Learning in Resource-Constrained IoT Environments for Security: Review and Future Prospective. IEEE Access 2022, 10, 58603–58622. [Google Scholar] [CrossRef]
- Dasgupta, S.; Das, A.; Yogamani, S.; Das, S.; Eising, C.; Bursuc, A.; Bhattacharya, U. UnShadowNet: Illumination Critic Guided Contrastive Learning for Shadow Removal. IEEE Access 2023, 11, 87760–87774. [Google Scholar] [CrossRef]
- Zhang, X.; Li, L.; Wang, Y.; Chen, E.; Shou, L. Zeus: Improving Resource Efficiency via Workload Colocation for Massive Kubernetes Clusters. IEEE Access 2021, 9, 105192–105204. [Google Scholar] [CrossRef]
- Ruíz, L.M.; Pueyo, P.P.; Mateo-Fornés, J.; Mayoral, J.V.; Tehàs, F.S. Autoscaling Pods on an On-Premise Kubernetes Infrastructure QoS-Aware. IEEE Access 2022, 10, 33083–33094. [Google Scholar] [CrossRef]
- Phuc, L.H.; Phan, L.A.; Kim, T. Traffic-Aware Horizontal Pod Autoscaler in Kubernetes-Based Edge Computing Infrastructure. IEEE Access 2022, 10, 18966–18977. [Google Scholar] [CrossRef]
- Kaur, K.; Garg, S.; Kaddoum, G.; Ahmed, S.H.; Atiquzzaman, M. KEIDS: Kubernetes-Based Energy and Interference Driven Scheduler for Industrial IoT in Edge-Cloud Ecosystem. IEEE Internet Things J. 2020, 7, 4228–4237. [Google Scholar] [CrossRef]
- Yang, A.; Zhuansun, Y.; Liu, C.; Li, J.; Zhang, C. Design of Intrusion Detection System for Internet of Things Based on Improved BP Neural Network. IEEE Access 2019, 7, 106043–106052. [Google Scholar] [CrossRef]
- Mendonça, R.V.; Teodoro, A.A.M.; Rosa, R.L.; Saadi, M.; Melgarejo, D.C.; Nardelli, P.H.J.; Rodríguez, D.Z. Intrusion Detection System Based on Fast Hierarchical Deep Convolutional Neural Network. IEEE Access 2021, 9, 61024–61034. [Google Scholar] [CrossRef]
- Sadaf, K.; Sultana, J. Intrusion Detection Based on Autoencoder and Isolation Forest in Fog Computing. IEEE Access 2020, 8, 167059–167068. [Google Scholar] [CrossRef]
Type of IDS | Main Techniques | Typical Applications | Advantages | Disadvantages |
---|---|---|---|---|
NIDS [43] | DPI, flow analysis | Enterprise networks, distributed infrastructures | Monitors multiple devices simultaneously, suitable for large networks | Performance degrades with high traffic, challenges with encrypted data |
HIDS [65] | System log monitoring, process behavior | Endpoints, servers, virtual machines | Detects host-specific threats, effective on encrypted endpoints | Difficult scalability in large environments, limited in detecting network-wide attacks |
Hybrid IDS [66] | Combination of NIDS and HIDS | Holistic security in complex infrastructures | Enhances detection accuracy, reduces false positives | High complexity, requires significant computational resources |
Signature-based [48] | Comparison with threat signature databases | Traditional networks, known malware protection | High precision for documented threats, low false positives | Ineffective against new or evolving threats, requires frequent updates |
Anomaly-based [52] | Detection of deviations from normal behavior baselines | Dynamic environments like cloud, IoT | Capable of detecting unknown threats, suitable for zero-day threats | High false positives, requires robust infrastructure |
Specification-based [55] | Detection based on predefined specifications of expected behavior | Industrial systems, IoT | Higher precision in controlled environments, effective in ICS or IoT | Manual effort to define specifications, limited adaptability |
Behavior-based [64] | Behavior profiling, action correlation | Critical systems, financial institutions, healthcare | Detects complex attacks, insider threats | Requires significant computational resources, challenging to maintain |
Application Type | IDS Type | Pros | Cons |
---|---|---|---|
Cloud and Virtualized Networks [67] | Cyborg Intelligence Framework (QIDI, CSOM, RMML) | High precision and reduced computational complexity; optimized feature selection and accurate classification | Requires integration of multiple advanced methodologies, increasing implementation complexity |
Cloud [87] | Deep Learning + G-ABC | Better detection compared to traditional methods; high accuracy and detection speed | Depends on specific datasets (NSL-KDD, UNSW-NB15); complexity of hybrid models |
Cloud [88] | Adaptive IDS with DRL | Adaptive architecture; high accuracy (>90%) and low FPR | Continuous tuning required and challenges in generalizing across different attack types |
IoT and Sensor Networks [89] | Deep Blockchain Framework (DBF) | Improved data privacy and security; distributed detection through smart contracts | Complexity of blockchain integration; potential latency increase |
IoT [74] | Hybrid Weighted Deep Belief Network (HW-DBN) | High detection accuracy; adaptability to dynamic IoT data | Risk of computational overload with high-dimensional data |
IoT [75] | Passban (Anomaly-based on Edge Computing) | Suitable for resource-constrained IoT devices; low FPRs | Limited to attacks showing clear anomaly patterns |
IoT [49] | AS-IDS (Anomaly + Signature-based) | Combines benefits of anomaly and signature-based detection; high accuracy (99.81%) | Requires constant signature updates; dependent on dataset quality |
SDN [90] | Deep Learning-based IDS | High flexibility and capability to adapt to various attack scenarios | Implementation complexity and need for continuous strategy updates |
Industrial Networks [91] | Multi-feature Clustering with ARN and S-ATT | High accuracy (95.48% and 97.61%) on specific datasets; real-time detection optimization | Complexity in managing high-dimensional data and temporal correlations |
IIoT [83] | 1D-CNN for Industrial Networks | Reduced computational complexity; suitable for sequential and time-series scenarios | Potential limitation to specific attack patterns; less effective in non-sequential scenarios |
IIoT [85] | DeepFed with Federated Learning | Improved data privacy; reduced bandwidth needs due to distributed model updates | Complexity in implementing security protocols; challenges in device synchronization |
Dataset | Year | Number of Features | Attack Type Classes |
---|---|---|---|
KDD CUP 99 [137] | 1998–1999 | 43 | DoS, Remote-to-Local (R2L), User-to-Root (U2R), Probing |
NSL-KDD 99 [99,138] | 1999 | 43 | Normal, DoS, Remote-to-Local (R2L), User-to-Root (U2R), Probing |
Kyoto 2006–2009 [104] | 2006–2009 | 23 | Oth, rej, rsto, rstos0, rstr, rstrh, s0, s1, s2, s3, sf, sh, shr |
SCX-2012 [110,139] | 2012 | 80 | Normal, Attacker |
UNSW-NB15 2015 [111,140,141,142,143,144] | 2015 | 49 | Fuzzers, Analysis, Backdoors, DoS, Exploits, Generic, Reconnaissance, Shellcode, Worms |
CSE-CIC-IDS 2017–2018 [121,145] | 2017–2018 | 80 | DoS Golden Eye, Bening, DoS Hulk, DoS Slow http, DoS Slowloris, DDoS-LOIC HTTP, DDoS-LOIC-UDP, DDoS-HOIC, SSH-Patator, FTP Patator, Brute Force, XSS, Botnet, Infiltration, SQL Injection |
TON_IoT [125,146,147,148,149,150,151,152] | 2020 | 44 | DDoS, Ransomware, Backdoor, Injection |
CIC-DDoS2019 [153,154] | 2019 | 88 | UDP Flood, HTTP Flood, SYN Flood, DNS Amplification, TFTP Amplification |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Diana, L.; Dini, P.; Paolini, D. Overview on Intrusion Detection Systems for Computers Networking Security. Computers 2025, 14, 87. https://doi.org/10.3390/computers14030087
Diana L, Dini P, Paolini D. Overview on Intrusion Detection Systems for Computers Networking Security. Computers. 2025; 14(3):87. https://doi.org/10.3390/computers14030087
Chicago/Turabian StyleDiana, Lorenzo, Pierpaolo Dini, and Davide Paolini. 2025. "Overview on Intrusion Detection Systems for Computers Networking Security" Computers 14, no. 3: 87. https://doi.org/10.3390/computers14030087
APA StyleDiana, L., Dini, P., & Paolini, D. (2025). Overview on Intrusion Detection Systems for Computers Networking Security. Computers, 14(3), 87. https://doi.org/10.3390/computers14030087