• Architecture and Design
  • Asian and Pacific Studies
  • Business and Economics
  • Classical and Ancient Near Eastern Studies
  • Computer Sciences
  • Cultural Studies
  • Engineering
  • General Interest
  • Geosciences
  • Industrial Chemistry
  • Islamic and Middle Eastern Studies
  • Jewish Studies
  • Library and Information Science, Book Studies
  • Life Sciences
  • Linguistics and Semiotics
  • Literary Studies
  • Materials Sciences
  • Mathematics
  • Social Sciences
  • Sports and Recreation
  • Theology and Religion
  • Publish your article
  • The role of authors
  • Promoting your article
  • Abstracting & indexing
  • Publishing Ethics
  • Why publish with De Gruyter
  • How to publish with De Gruyter
  • Our book series
  • Our subject areas
  • Your digital product at De Gruyter
  • Contribute to our reference works
  • Product information
  • Tools & resources
  • Product Information
  • Promotional Materials
  • Orders and Inquiries
  • FAQ for Library Suppliers and Book Sellers
  • Repository Policy
  • Free access policy
  • Open Access agreements
  • Database portals
  • For Authors
  • Customer service
  • People + Culture
  • Journal Management
  • How to join us
  • Working at De Gruyter
  • Mission & Vision
  • De Gruyter Foundation
  • De Gruyter Ebound
  • Our Responsibility
  • Partner publishers

research on intrusion detection system

Your purchase has been completed. Your documents are now available to view.

Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations

Machine learning (ML) and deep learning (DL) techniques have demonstrated significant potential in the development of effective intrusion detection systems. This study presents a systematic review of the utilization of ML, DL, optimization algorithms, and datasets in intrusion detection research from 2018 to 2023. We devised a comprehensive search strategy to identify relevant studies from scientific databases. After screening 393 papers meeting the inclusion criteria, we extracted and analyzed key information using bibliometric analysis techniques. The findings reveal increasing publication trends in this research domain and identify frequently used algorithms, with convolutional neural networks, support vector machines, decision trees, and genetic algorithms emerging as the top methods. The review also discusses the challenges and limitations of current techniques, providing a structured synthesis of the state-of-the-art to guide future intrusion detection research.

1 Introduction

Machine learning (ML) and deep learning (DL) techniques are transforming intrusion detection systems (IDS) [ 1 , 2 , 3 ], enabling enhanced security, adaptability, and scalability. Network intrusions through malicious attacks can disrupt services and operations, necessitating intelligent detection systems capable of identifying known and unknown threats. This has motivated extensive research on applying advanced ML and DL algorithms for IDS over the past decade. However, the rapid growth of studies presents challenges in synthesizing state-of-the-art advancements in a structured manner. This study provides a systematic literature review of ML- and DL-based intrusion detection techniques published between 2018 and 2023. A comprehensive search strategy is devised to survey recent studies from major scientific databases. After screening and analyzing 393 qualified papers, we extracted key information to understand publication trends, frequently adopted algorithms, datasets, limitations, and future challenges. Bibliometric analysis techniques help visualize research themes, prominent authors, and frequently studied algorithms like convolutional neural networks (CNNs), support vector machines (SVMs), XGBoost, and genetic algorithms (GAs) [ 1 , 2 , 3 , 4 , 5 ]. The structured taxonomy of the review categorizes techniques into four broad categories: ML, DL, optimization algorithms and datasets. Detailed sub-categorizations are presented to summarize advancements within each domain. The findings reveal SVM, CNN, decision trees (DTs), and GAs as leading techniques for attaining high classification performance [ 6 , 7 , 8 , 9 , 10 ]. Comparative analysis provides insights into the relative effectiveness and limitations of different algorithms and datasets. This systematic review consolidates scattered developments into an organized synthesis to benefit researchers and practitioners working on ML/DL-driven IDS. By clarifying the state-of-the-art, it can guide selection of appropriate algorithms and datasets while also highlighting open challenges for advancing intelligent anomaly detection. The taxonomy of techniques provides a starting point for new researchers to swiftly comprehend key concepts, methods, and terminology in this rapidly progressing field. The systematic literature review of IDS adds significant value to the field by addressing gaps, challenges, and establishing its significance in advancing the domain of cybersecurity. Here is how the research achieves these objectives: (1) Addressing gaps: The review consolidates scattered developments into an organized synthesis, providing a structured taxonomy of techniques and categorizations within the domain of IDS. By identifying key concepts, methods, and terminology, the review serves as a starting point for new researchers to swiftly comprehend the rapidly progressing field of trustworthy ML. The study offers insights into the relative effectiveness and limitations of different algorithms and datasets, addressing the need for comparative analysis in the field of IDS. (2) Adding value: The comprehensive science mapping analysis helps organize the outcomes of previous investigations, summarizes key issues, and identifies potential research gaps, contributing to the existing body of knowledge. The review provides valuable insights into the conceptual framework of trustworthy ML, benefiting practitioners, policymakers, and academics, thus adding value to the understanding of the current state of research in this area. By visualizing research themes, prominent authors, and frequently studied algorithms, the review offers a comprehensive overview of the research landscape in IDS, thereby adding value to researchers and practitioners working in this domain. (3) Establishing significance: The study establishes significance by offering insights into the annual scientific production and advancements in reliable ML in intrusion detection over the past 10 years, highlighting the continuous evolution and significance of the field. Through the utilization of bibliometric analysis techniques and the extraction of key information from a large number of qualified papers, the review establishes the significance of its findings in understanding publication trends, frequently adopted algorithms, datasets, limitations, and future challenges in the field of IDS. The identification of the most popular and crucial keywords from previous research using a word cloud adds significance by highlighting the broad and diverse nature of the field of trustworthy ML, covering a wide range of subjects and applications. In summary, the systematic literature review of IDS adds value by addressing gaps, providing valuable insights, and establishing its significance in advancing the field of cybersecurity through comprehensive analysis and synthesis of research findings. The reviewed literature has identified several challenges and limitations of current intrusion detection techniques. These include: (1) Limited availability of labeled datasets: The availability of labeled datasets is a significant challenge in intrusion detection research, as it limits the ability to train and evaluate ML models effectively. (2) Imbalanced datasets: Imbalanced datasets, where the number of samples in one class is significantly higher than the other, can lead to biased models and reduced performance. (3) Adversarial attacks: Adversarial attacks, where attackers intentionally manipulate data to evade detection, pose a significant challenge to IDS. (4) Interpretability and explainability: The interpretability and explainability of ML models are crucial in intrusion detection, as it is essential to understand how the models make decisions and identify potential vulnerabilities. (5) Scalability: The scalability of IDS is a significant challenge, particularly in large-scale networks, where the volume of data can be overwhelming. These challenges and limitations can significantly influence the overall effectiveness and reliability of IDS. For instance, limited availability of labeled datasets can lead to poorly trained models, while imbalanced datasets can result in biased models that perform poorly on underrepresented classes. Adversarial attacks can evade detection and compromise the security of the system, while the lack of interpretability and explainability can limit the ability to identify and address potential vulnerabilities. Finally, scalability challenges can limit the ability to deploy IDS in large-scale networks, reducing their overall effectiveness and reliability. Overall, addressing these challenges and limitations is crucial for enhancing the effectiveness and reliability of IDS, and future research should focus on developing solutions to overcome these obstacles.

2 Methodology

In this analytical section ( Figure 1 ), we followed the recommended reporting guidelines for a systematic review and meta-analysis technique. The procedure entailed the utilization of several bibliographic citation databases encompassing a broad spectrum of medical, scientific, and social science periodicals across various domains. Specifically, we considered three prominent digital databases: Scopus, IEEE Xplore, and Web of Science when searching for the target papers.

Figure 1 
               PRISMA protocol.

PRISMA protocol.

Scopus is renowned for its reliable resources across a wide array of disciplines, encompassing engineering, technology, science, medicine, and health. IEEE is a comprehensive repository of technical and scientific literature, offering full-text articles and abstracts across various publications in the fields of computer science, electronics, and electrical engineering. On the other hand, the Web of Science (WoS) database is a cross-disciplinary resource that incorporates research papers from diverse fields, including science, technology, art, and social science. These databases collectively offer extensive coverage of research in all scientific and technological domains, delivering valuable insights to researchers.

2.1 Search strategy

The three databases under consideration (Scopus, IEEE, and WoS) each underwent a thorough bibliographic search for academic papers written in English. All scientific articles production from 2018 to 2023 were included in this search.

This search used a Boolean query to link the keywords trustworthy, using two operator (AND) and (OR) as follows: “Intrusion detection system OR IDS” (AND) “machine learning OR deep learning OR classification algorithms” (AND) “optimisation algorithm OR optimization algorithm”).

2.2 Inclusion and exclusion criteria

The most crucial aspect of this conducted systematic review of the literature is the criteria taken into consideration for the inclusion/selection of studies ( Figure 1 ). And for this, the following parameters were taken into account:

Each of the components required to be considerably connected to reliable ML or DL in order to be integrated into various ML techniques/methods for the intrusion detection domain.

Highly relevant articles that were published from 2018 to 2023.

Papers that were not from peer reviewed publication forums.

Papers that were not written in English.

2.3 Study selection

This study adhered to the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) statement for conducting a systematic literature review. The methodology involved several phases, with the initial phase focusing on the removal of duplicate papers. To achieve this, the titles and abstracts of the contributions were screened using the Mendeley program. All authors participated in this process, leading to the exclusion of numerous unrelated works. Disagreements and discrepancies among the authors were resolved by the corresponding author. The third step entailed a detailed examination of the full texts, during which articles failing to meet the previously established inclusion criteria (as outlined in Section 2.2 ) were eliminated. Only studies meeting the stipulated requirements were incorporated into this research. The initial search yielded 696 entries, of which 261 originated from Scopus, 175 from IEEE, and 260 from WoS. After removing approximately 217 duplicates and carefully scrutinizing the remaining entries, 393 studies remained. According to the inclusion criteria, studies were deemed relevant and subsequently included in the final collection of publications. The analysis of these gathered articles is subject to various bibliometric techniques, which are discussed in Section 3. The bibliometric analysis conducted in the systematic literature review involved the extraction and analysis of key information from the 393 papers meeting the inclusion criteria. The analysis aimed to understand publication trends, frequently adopted algorithms, datasets, limitations, and future challenges in the field of IDS. Key information extracted from the papers included: (1) Publication trends in the field of IDS from 2018 to 2023, indicating the number of published papers each year. (2) Frequently adopted ML, DL, and optimization algorithms for intrusion detection. (3) Utilized benchmark datasets for evaluating IDS. (4) Limitations and future challenges identified in the reviewed studies. To assess the significance and impact of the identified studies, bibliometric analysis techniques were used to visualize research themes, prominent authors, and frequently studied algorithms like CNN, SVM, XGBoost, and GA. Additionally, the structured taxonomy of the review techniques were categorized into four broad categories: ML, DL, optimization algorithms, and datasets, with detailed sub-categorizations to summarize advancements within each domain. The bibliometric analysis provided insights into the relative effectiveness and limitations of different algorithms and datasets, consolidating scattered developments into an organized synthesis to benefit researchers and practitioners working on ML- and DL-driven IDS.

3 Comprehensive science mapping analysis

Finding crucial information in previous studies has become increasingly challenging due to the growing volume of contributions and applied research. Keeping pace with this vast stream of theoretical and practical input can be daunting. Managing the vast literature has posed a significant challenge. To help organize the outcomes of previous investigations, summarize key issues, and identify potential research gaps, some academics recommend employing the PRISMA approach. Systematic reviews, in comparison, bolster the study's framework, contribute to the existing body of knowledge, and amalgamate the literature's findings. Nonetheless, systematic reviews still contend with issues of impartiality and reliability, as they depend on the authors' perspective to restructure the results of previous investigations. Various studies have proposed the following measures to enhance transparency when summarizing the findings of earlier studies.

3.1 Annual scientific production

In the previous 10 years, reliable ML in intrusion detection has advanced. In particular, the annual scientific output depicted in Figure 2 provides an explanation for the emergence of earlier theoretical and practical investigations on reliable ML. The annual scientific output for intrusion detection is depicted in Figure 2 . The number of papers published in 2018 and 2019 reached approximately 23 papers, it can be seen that the quantity of publications has significantly expanded in recent years. There was an increase in the number of articles published in 2020 and 2021. In 2022, the number of articles grew even further, reaching a notable high of 138 papers. This pattern persisted in 2023, where 95 papers were published. The increase in research output suggests a growing interest and emphasis on the development and improvement of IDS over the years. Furthermore, specific authors have contributed significantly to this field, with some focusing on optimization and feature selection based on intrusion detection, while others have concentrated on IDS for Internet of Things (IoT) based on DL. These authors have achieved high accuracies in their research, indicating the advancement and effectiveness of the techniques employed in IDS. Overall, the observed publication trends demonstrate a substantial growth in research output in the field of IDS from 2018 to 2023, reflecting an increasing focus on enhancing the reliability and effectiveness of intrusion detection techniques. Figure 3 shows authors’ production over time, where Motwakel [ 4 , 5 , 6 , 7 , 8 , 9 , 10 ] published seven papers in 2022 and 2023 and he focused in his research on optimization and feature selection based on intrusion detection. In his research, the highest accuracy he reached was 99.87 using sand paper optimization. As for Al_Qaness [ 11 , 12 , 13 , 14 , 15 ], he published five papers in 2021–2023) and he focused on IDS for IOT based on DL. In his research, he reached the highest accuracy of 99.997 using swarm intelligence optimization. Bacanin [ 16 , 17 , 18 , 19 , 20 ] has published five papers from 2020 to 2023 and he focused on optimization algorithms and feature selection based on intrusion detection in his research, the highest accuracy he reached was 99.6878 using GOA and MPO. Chen [ 21 , 22 ] published five papers from 2020 to 2023 and he focused on intrusion detection using hybrid algorithms, the highest accuracy he reached was 99.44 using COBYLA optimization. Dahou [ 11 , 12 , 13 , 14 , 15 ] published five papers, one paper in 2021, two papers in 2022, and two papers in 2023 and he focused on IOT IDS using DL and optimization in his research, the highest accuracy he reached was 99.997 using swarm intelligence optimization. Fang [ 23 , 24 , 25 , 26 , 27 ] published five papers in 2018, 2020, and 2022 and he focused on optimization algorithm for feature selection of network intrusion detection in his research, the highest accuracy he reached was 97.89 using WOA and OPS optimization. Hilal [ 4 , 28 , 29 , 30 , 31 ] published five in 2022 and 2023, he focused on DL algorithms optimization based on intrusion detection in his research, the highest accuracy he reached was 99.77 using optimization IFSO-FS. Zivkovic [ 16 , 17 , 18 , 19 , 20 ] published five papers, three papers in 2022 and two papers in 2023, he focused on intrusion detection for optimization algorithms and feature selection in his research, the highest accuracy he reached was 99.6878 using GOA and MPO. Dahou [ 32 , 33 , 34 , 35 ] published four papers in 2020, 2022, and 2023) and he focused on IDS for optimization algorithms in his research, the highest accuracy he reached was 100 using Artificial organism algorithm (AOA) optimization. In addition to the mentioned authors, Al-Janabi [ 36 , 37 , 38 , 39 ] has contributed significantly by publishing four papers, with one in 2020 and three in 2021. His research was focused on IDS, optimization algorithms, and feature selection. Remarkably, his work achieved the highest accuracy of 100% using NTLBO optimization. Table 1 presents a comprehensive overview of the most influential authors in the field. Each of these authors has demonstrated exceptional achievements by reaching the highest accuracy through the utilization of classification and optimization algorithms.

Figure 2 
                  Annual scientific production.

Annual scientific production.

Figure 3 
                  Authors’ production over time.

Authors’ production over time.

Highest accuracy studies

Research name Highest accuracy Classification algorithm Optimization algorithm Dataset Optimization field Classification type Limitation of the study
1. Motwakel et al. [ ] 99.87 IGAN-OKELM Sequential parameter optimization (SPO) CICIDS2015 Optimal parameter Binary and multi-class classification During the upgrade phase, it is essential to implement the SPO behavior to optimize the location. This approach should be designed to strike a balance between minimizing computational complexity, maintaining accuracy, and reducing the overall cost function.
2. Al-qaness et al. [ ] 99.997 Recurrent neural network (RNN), ANN Swarm intelligence CIC2017 Feature selection Binary and multi-class classification The developed method exhibits a high time complexity, particularly during the feature extraction phase, and also during the process of selecting relevant features. This results in extended processing times and may hinder efficiency.
The Capuchin search algorithm (CSA) suffers from slow convergence, which ultimately diminishes the quality of solutions it produces.
3. Bacanin et al. [ ] 99.6878 XGBoost GOA, MPO USNW-NB15 Hyper parameter Binary The framework was assessed using a single dataset, underscoring the necessity for additional evaluations on different datasets to validate its overall effectiveness.
4. Chen [ ] 99.44 XGBoost COBYLA NSL-KDD Feature selection Multi-class classification Stronger defenses are consistently required to address all types of adversarial scenarios, often necessitating the retraining of models with larger training datasets, both of which are time-consuming processes. Despite these challenges, classifiers typically exhibit poor generalization.
5. Fang et al. [ ] 97.89 SVM WOA, Particle swarm optimization (PSO) KDD CUP 99 Feature selection Binary The algorithm still faces challenges related to delayed convergence and low accuracy.
One of the underlying issues is the optimization process itself. The basic Elephant Herding Optimization method lacks an efficient mutation mechanism. This deficiency often leads individuals to get trapped in local extreme values, resulting in premature convergence.
Furthermore, the position of the best individual significantly influences how the algorithm updates the positions of other individuals. When a local extreme value attracts the individual currently deemed the best, it can impact the overall performance of the algorithm.
6. Hilal et al. [ ] 99.77 BiLSTM IFSO-FS AOEDBC-DL Feature selection Multi-class classification Using a predetermined number of variables is a required process. Optimization variables are the same as FS characteristics.
7. Dahou [ ] 100 XGB, DT, ET AOA NF-BOT-IOT-V2 Feature selection Binary and multi-class classification An inappropriate balance between exploration and exploitation throughout the search can cause the AOA to become trapped in an early state of convergence. An additional challenge is the computational time, as we must perform the ML approach at every AOA iteration, which necessitates substantial processing resources.
8. Al-Janabi and Ismail [ ] 100 SVM, Extreme learning machine (ELM), LR NTLBO KDD CUP 99 Feature selection Binary The authors acknowledge that the proposed method might not be well-suited for real-time intrusion detection, primarily because of the time required for feature selection and model training.

3.2 Three-field chart

A three-field chart is used to display data with three parameters. In this representation, the left field corresponds to the Research Title (RT), the middle field represents the Journal in which the Research is published or source (SO), and the right field contains the Researcher's Name (RN). Figure 4 , is utilized to examine the relationships between these three parameters. According to the study, the RT on the left side is most frequently cited by Scopus, IEEE Xplore (IEEE), and WoS, as observed in the middle field (SO) of Figure 4 . Furthermore, among the Research Titles (TI) that focus on the subject of reliable and understandable ML, the Scopus journal stands out as the most prominent. Additionally, as indicated in the corresponding box (TI), when considering all keywords, the journals listed in the middle field (SO) most frequently match the most popular keywords, which include “IEEE Access,” “Sensors,” “Cluster Computing,” “Neural Computing and Application,” and “Soft Computing.”

Figure 4 
                  Three-field plot: left (TI), middle (SO), and right (AU).

Three-field plot: left (TI), middle (SO), and right (AU).

3.3 Word cloud

This study has effectively identified the most popular and crucial keywords from previous research using a word cloud. In order to provide a comprehensive overview of these keywords and reorganize the information, Figure 5 presents these essential keywords extracted from the results of previous studies. In Figure 5 , the keywords are displayed in different sizes, with the size indicating their frequency in the literature. Larger keywords are more prevalent, while smaller keywords occur less frequently. Based on the term frequency illustrated in Figure 5 , “ID,” “DL,” and “ML” emerge as some of the most frequently discussed topics in the field of trustworthy ML, with “DL” having the highest frequency. The image also highlights the significance of “IDS” and “Intrusion Detection System” as critical topics in this area. Additionally, other related terms with relatively high frequencies include “classification,” “optimization,” and “feature selection,” emphasizing the importance of considering these factors when designing and implementing ML systems. Figure 5 also showcases various specific applications of ML across a range of algorithms, such as GA, SVM, and PSO. Furthermore, it includes several methodologies related to ML, including “Internet of Things,” “network security,” and “artificial intelligence.” The word cloud of trustworthy ML articles reveals the broad and diverse nature of this field, covering a wide range of subjects.

Figure 5 
                  Word cloud.

Word cloud.

3.4 Co-occurrence

Another method employed in bibliometric analysis is the co-occurrence network, which involves studying common words in earlier research. This semantic network offers valuable insights into the conceptual framework of a specialized field, benefiting practitioners, policymakers, and academics. Figure 6 presents information specifically related to a co-occurrence network based on the titles of reliable ML articles.

Figure 6 
                  Co-occurrence network.

Co-occurrence network.

The network is composed of nodes, representing individual words in the titles, and edges connecting the nodes indicate how frequently these words appear together in a title. Figure 6 displays various nodes, including the clusters to which they belong and their proximity, a metric for gauging how well-connected a node is to other nodes in the network. Evidently, the nodes are divided into eight distinct clusters, with each cluster comprising words associated with a specific theme or idea related to trustworthy ML. For instance, Cluster 1 features terms like “support vector machine,” “DT,” “Extreme learning machine,” “cyber security,” “genetic algorithm,” and “bat algorithm.” These terms suggest a connection to the establishment of dependable ML systems in optimization. Cluster 2, on the other hand, includes words like “neural network,” “artificial intelligence,” “feature extraction,” “random forest,” “anomaly detection,” and “network security,” signifying a focus on IDS. Similarly, other clusters are linked to subjects such as clustering, the IoT, the NSL-KDD dataset, ML, and IDS. The closeness of a node within the network measures its centrality, and nodes with higher closeness values are more central to the topic of trustworthy ML, signifying their importance within the network. This figure offers an overview of the relationships between different concepts and words associated with trustworthy ML, as derived from the titles of papers in the field. This information is valuable for understanding the current state of research in this area and for identifying areas where further investigation is warranted.

4 Findings and analysis: A taxonomy

ML, comprising 249 papers

DL, with 144 papers

Optimization algorithms, covering all 393 papers

We also have a section displaying the taxonomy of subdivisions in Figure 7 , which includes ML, DL, Optimization, and Dataset.

Figure 7 
               Taxonomy.

These categories are discussed here comprehensively, aiming to offer academics and practitioners valuable insights on trustworthy ML in intrusion detection. This endeavor is reported to enhance the reliability of ML in intrusion detection. Consequently, 249 out of the 393 articles fall under this category within the context of intrusion detection.

Arthur Samuel originally described ML in 1959 as a branch of research that allows computers to learn without requiring them to first be programmed. This section describes network ID strategies with a focus on ML algorithms used to create security tools. In recent years, ML has gained increasing importance in IDS for computer networks [ 40 , 41 , 42 ]. The foundation of this lies in the model for training and prediction, which has the capability to quickly identify both attacks and typical cases [ 32 ]. The feature selection process can be considered as data preprocessing for ML algorithms. Intrusion detection can involve two types of classification: two-class, where intrusions are detected based on class labels, and multi-class, which categorizes attacks into different classes. ML techniques like Random forest (RF), SVM, ELM, and Naive Bayes classifiers can be applied in this field, as well as methods such as Self-Organizing Maps, Fuzzy clustering, and K-Means clustering. Figure 8 show the classification of ML algorithms.

Figure 8 
                  ML algorithms.

ML algorithms.

In the reviewed literature, several ML and DL algorithms have emerged as the most frequently used in intrusion detection research. Specifically, CNN, SVM, DTs, and GA have been prominently featured in the analyzed studies. Comparatively, these algorithms have demonstrated varying levels of popularity and effectiveness in the context of intrusion detection: (1) CNN: CNN has gained significant popularity and has been widely utilized in intrusion detection research due to its effectiveness in learning hierarchical representations of data, particularly in image-based intrusion detection scenarios. (2) SVM: SVM has also been frequently used and is known for its effectiveness in binary classification tasks, making it a popular choice for intrusion detection applications. (3) DTs: DTs have been commonly employed for their interpretability and ease of understanding, making them popular in certain intrusion detection contexts, especially when explainability is a priority. (4) GA: While GAs have been utilized, they may not be as prevalent as CNN, SVM, and DT in intrusion detection research. However, they offer the advantage of optimization and search capabilities, which can be beneficial in certain scenarios. In terms of effectiveness, the reviewed literature may provide insights into the comparative performance of these algorithms in specific intrusion detection contexts, such as their accuracy, precision, recall, and F 1 scores. Additionally, the specific datasets and features used in the studies may influence the relative effectiveness of these algorithms. Overall, while CNN, SVM, and DT have emerged as popular and effective choices in intrusion detection research, the comparative effectiveness of these algorithms may vary depending on the specific context, dataset, and evaluation metrics used in the reviewed studies.

In 1998, Vapnik Chih-Fong Tsai introduced the SVM. The SVM begins by transforming the input vector into a higher-dimensional feature space and subsequently identifies the optimal separating hyperplane. What distinguishes the SVM is its creation of a decision boundary, or separation hyperplane, using support vectors rather than the entire training sample. This property makes it highly robust against outliers. SVM classifiers are tailored for binary classification, meaning they are designed to divide a set of training vectors into two distinct classes. It is worth noting that the support vectors represent the training samples at the decision boundary. Additionally, the SVM incorporates a user-specified parameter known as the penalty factor, allowing users to strike a balance between the number of incorrectly classified samples and the width of the decision boundary [ 1 , 4 , 43 , 44 ].

Table 2 highlights the top five authors globally, who utilized SVM algorithms in their research, each achieving the highest accuracy using SVM classification and optimization algorithms. Alqarni [ 45 ] achieved the highest accuracy of 100%, followed by Aljanabi and Ismail [ 36 ] at 100%. Lavanya and Kannan [ 46 ] reached an accuracy of 99.98%, while Dwivedi et al. [ 47 ] achieved 99.89%, and Liu et al. [ 48 ] reached an accuracy of 99.88%.

Highest accuracy of SVM algorithm studies

Research name Highest accuracy Classification algorithm Optimization algorithm Dataset Optimization field Classification type Limitation of the study
1. Alqarni [ ] 100% SVM Ant colony optimization (ACO) KDD Cup 99 Feature selection Binary and multi-class classification It took a long time to reach the highest accuracy
2. Aljanabi and Ismail [ ] 100% SVM GA, TLBO KDD Cup 99 Feature subset selection Binary and multi-class classification Greater parameter values result in increased accuracy, albeit at the cost of longer computation times. However, the extended time required for researching a new person is considerable.
3. Lavanya and Kannan [ ] 99.98 SVM Krill herd NSL-KDD 2015 Parameters Binary and multi-class classification Installing non-traditional IDS like VANET-based IDS in a VANET application requires caution to ensure real-time performance is not compromised. The survey explores solutions to VANET-related challenges, including increased false positives, reduced detection rates, higher network overhead, longer detection times, and associated issues. However, it may struggle to identify newer and modified attacks.
4. Dwivedi et al. [ ] 99.89 SVM Grasshopper KDD Cup 99 Feature selection Binary Despite employing security measures like cryptography and communication protocols, preventing invasions entirely remains a challenge. Detecting when a user's actions disrupt the intended use of computer networks is crucial.
5. Liu et al. [ ] 99.88 SVM, SSA Swarm intelligence KDD Cup 99 Feature selection Multi-class classification While Simulated Annealing has several advantages for optimizing various problems, it still faces issues with convergence accuracy and escaping local optima.

Chih-Fong Tsai utilizes a sequence of decisions to categorize a sample, with each decision influencing the subsequent one. These decisions are represented in the form of a tree structure. When classifying a sample, you start at the root node and traverse the tree until you reach an end leaf node, each of which represents a distinct classification category. At each node, the sample's characteristics are considered, and the branch value matches the attributes. Classification and Regression Tree (CART) is a well-known tool for creating DTs. A classification tree employs discrete (symbolic) class labels, while a regression tree deals with continuous (numeric) attributes [ 48 ].

Many researchers used DT algorithms in their research. Table 3 highlights the top five authors worldwide, each achieving the highest accuracy using DT classification and optimization algorithms. Dahou [ 32 ] achieved the highest accuracy at 100%, followed by Injadat et al. [ 49 ] at 99.99%. Mousavi et al. [ 50 ] reached an accuracy of 99.92, Maza and Touahria [ 51 ] reached an accuracy of 99.83%, and Mahmood et al. [ 52 ] reached an accuracy of 99.36%.

Highest accuracy of DT algorithm studies

Research name Highest accuracy Classification algorithm Optimization algorithm Dataset Optimization field Classification type Limitation of the study
1. Dahou [ ] 100% XGB, DT, ET AOA NF-BOT-IOT-V2 Feature selection Binary and multi-class classification Enhancing and validating the suggested method can be achieved through diverse datasets and parallel execution to reduce computation time. Furthermore, incorporating the proposed AOA with other effective elements can bolster the balance between exploration and exploitation, ultimately improving the results.
2. Injadat et al. [ ] 99.99 DT PSO and Genetic CICIDS 2017 Optimal parameter Multi-class classification Both datasets are initially skewed, containing far fewer attack samples than standard samples. Consequently, the model struggles to detect attack patterns and behaviors.
3. Mousavi et al. [ ] 99.92 DT ACO KDD Cup 99 Feature selection Binary and multi class classification The method used in this research to select a small training subset for multiclass classification under imbalanced conditions is currently challenging but not optimal. It lacks flexibility and efficiency, and there is a need for a better and more suitable approach to address this issue.
4. Maza and Touahria [ ] 99.83 DT, MOEDAFS Multi-objective NSL-KDD Feature selection Multi-class classification Some crowd solutions that can restrict the algorithm's capacity for exploration are filtered away by MOEDAFS.
5. Mahmood et al. [ ] 99.36% DT, SVM, K-nearest neighbors (KNN) PSO and genetic NSL-KDD Feature selection Multi-class classification The experimental results suggest that reducing the number of features to a minimum, even if they are carefully chosen and relevant, does not always lead to higher accuracy. Instead, it is essential to select the right quantity of important and relevant features, which may even be a large number, to enhance the performance of ML models.

The ELM approach, introduced by Huang et al., is known for its speed and simplicity as it does not require iterative training. It consists of three layers: the input layer, a single hidden layer, and the output layer. ELM is specifically a single hidden layer feedforward neural network (SLFN) because it employs only one hidden layer. It excels at solving complex nonlinear mapping problems, and its adaptive training sets random input weights and biases for a number of nodes in the hidden layer utilized ELM algorithms in their research [ 36 ]. In Table 4 , we highlight the top five authors globally, each achieving the highest accuracy using ELM classification and optimization algorithms. Al-Janabi and Ismail [ 36 ] achieved the highest accuracy at 100%, ElDahshan et al. [ 53 ] achieved the highest accuracy at 100%, followed by. Vaiyapuri et al. [ 54 ] reached an accuracy of 99.63%, while Ghasemi et al. [ 55 ] achieved 98.73%, and Wang et al. [ 56 ] reached 89.1%.

Highest accuracy of ELM algorithm studies

Research name Highest accuracy Classification algorithm Optimization algorithm Dataset Optimization field Classification type Limitation of the study
1. Al-Janabi and Ismail [ ] 100 SVM, ELM, LR NTLBO KDD CUP 99 Feature selection Binary The authors acknowledge that the proposed method might not be well-suited for real-time intrusion detection, primarily because of the time required for feature selection and model training.
2. ElDahshan et al. [ ] 100 ELM Grey wolf optimization (GWO) CICIDS 2017 Parameter Binary and multi-class classification Resolving these problems should prioritize a focus on attack instances over normal instances, as misclassifying attacks among attack instances can cause more significant harm than misclassifying attacks among normal instances.
3. Vaiyapuri et al. [ ] 99.63 ELM SGOA FedMCCS, TON_IoT Feature selection Multi-class classification Due to the fact that this approach shares only taught methods of opinions prior to viewing specific local data, it reduces the transmission overhead of devices.
4. Ghasemi et al. [ ] 98.73 ELM Genetic -KDD cup 99 Feature selection Multi-class classification This technique is unable to accurately identify normal records. In KELM simulations, even though all features are considered, the results for attack labels are disappointing.
5. Wang et al. [ ] 89.1 ELM KDD 99 Parameter Multi-class classification Initial biases and weights are randomly selected in this algorithm. The only parameter to determine is the total number of hidden nodes in the network. During its operation, the algorithm does not modify the network's input weights and the thresholds of the hidden components, aiming to achieve a specific optimization solution. This approach differs from alternative feedforward neural networks.

4.1.4 Boosting (Light gradient boosting machine; LGBM, XGBOOST, Gradient boosting decision tree; GBDT)

Boosting is a potent ensemble learning technique widely applied in IDS to enhance the performance of individual weak classifiers. It combines multiple weak classifiers to construct a strong classifier capable of effectively identifying intrusions. Notable boosting algorithms include LGBM, GBDT, and XGBoost. XGBoost, initially proposed by Tianqi Chen has gained widespread acceptance among researchers and developers. This technique applies boosting to machines, utilizing numerous weak learners like shallow DTs (typically of depth 1 or 2). Each learner learns from the errors of the preceding one, and the combination of many weak learners (often hundreds) forms a powerful final model [ 57 ]. The authors employed boosting algorithms in their research. Table 5 present the top five authors globally, each achieving the highest accuracy using Boosting classification and optimization algorithms. Dahou [ 32 ] reached the highest accuracy at 100%, Kilincer et al. [ 58 ] attained the accuracy at 99.98%, followed by Xu and Fan [ 59 ] who achieved an accuracy of 99.92%. Bacanin et al. [ 16 ] reached an accuracy of 99.65% and Zivkovic et al. [ 17 ] reached an accuracy of 99.68%.

Highest accuracy of Boosting algorithm studies

Research name Highest accuracy Classification algorithm Optimization algorithm Dataset Optimization field Classification type Limitation of the study
1. Dahou [ ] 100 XGB, DT, ET AOA NF-BOT-IOT-V2 Feature selection Binary and multi-class classification An inappropriate balance between exploration and exploitation throughout the search can cause the AOA to become trapped in an early state of convergence. An additional challenge is the computational time, as we must perform the ML approach at every AOA iteration, which necessitates substantial processing resources.
2. Kilincer et al. [ ] 99.98% Boosting Hyper-parameter CICIDS 2017 Optimal feature Multi-class classification The dataset has an excessive amount of variables and observations, which causes the XGBoost training time to increase.
3. Xu and Fan [ ] 99.92% XGBoost PSO UNSW-NB15 Feature selection Multi class classification It significantly underperforms in terms of runtime compared to most IDS models.
4. Bacanin et al. [ ] 99.65% XGBoost Artificial bee colony (ABC) UNSW-NB15 Feature selection Multi-class classification One of the upcoming challenges in this domain is to validate the suggested hybrid model on additional intrusion detection datasets. This step is crucial for increasing confidence in the results before applying the model in real-world scenarios.
5. Zivkovic et al. [ ] 99.6878 XGBoost GOA, MPO USNW-NB15 Hyper parameter Binary The framework was assessed using a single dataset, underscoring the necessity for additional evaluations on different datasets to validate its overall effectiveness.

4.1.5 KNN and RF

4.1.5.1 knn.

KNN is a supervised classifier where data are divided into K clusters based on the Euclidean distance between data points. The data points with the smallest distance are grouped together due to their shared properties. KNN is simple to use and effective for large datasets.

RF is an ensemble method that combines multiple DTs to enhance model effectiveness. Bagging is employed to divide data into subsets, and DTs are built from these subgroups. RF is known for its low classification errors and absence of overfitting issues. Individual trees in the forest are constructed using bootstrap samples from the dataset. The Gini impurity measurement is used to determine the optimal node for splitting, and the model includes a maximum of 25 trees [ 67 ].

The authors utilized KNN and RF algorithms in their research. Table 6 presents the top five authors globally, each achieving the highest accuracy using KNN and RF classification and optimization algorithms. Gaber et al. [ 60 ] achieved the highest accuracy at 99.99%, followed by Samawi et al. [ 61 ] at 99.98%. Mohi-ud-din et al. [ 27 ] reached an accuracy of 99.95%, Bangui and Buhnova [ 62 ] reached an accuracy of 95.6%, and Mahmood et al. [ 52 ] reached an accuracy of 99.36%.

Highest accuracy of RF algorithm studies

Research name Highest accuracy Classification algorithm Optimization algorithm Dataset Optimization field Classification type Limitation of the study
1. Gaber et al. [ ] 99.99% RF PSO and Bat WUSTL-IIoT-2021 Feature selection Multi-class classification Limited availability of real-world data for evaluating IIoT system effectiveness.
Use of unbalanced datasets in ML-based IDS, potentially resulting in minority attack detection failures.
Examination of the suggested feature selection technique's performance using three ML algorithms (RF, KNN, and MLP).
Lack of consideration for how different attack types may impact the suggested intrusion detection method's effectiveness.
2. Samawi et al. [ ] 99.98% RF SMO NLS-KDD Feature selection Multi-class classification Using the entire dataset for training, while resulting in a high accuracy of (99.98), is not ideal. Also, it is crucial to develop an IDS capable of identifying new types of intrusions.
3. Mohi-ud-din et al. [ ] 99.95% RF CSA-PSO UNSW-NB15 Feature selection Multi-class classification To reach high-quality results, the algorithm CSA takes longer
4. Bangui and Buhnova [ ] 95.6% RF ACO CICIDS2017 Feature selection Multi class classification It took a long time to analyze the comprehensive data to enhance its security against various attacks
5. Mahmood et al. [ ] 99.36% DT, SVM, KNN PSO and Genetic NSL-KDD Feature selection Multi-class classification The experimental results suggest that reducing the number of features to a minimum, even if they are carefully chosen and relevant, does not always lead to higher accuracy. Instead, it is essential to select the right quantity of important and relevant features, which may even be a large number, to enhance the performance of ML models.

4.1.6 Naïve Bayes (NB)

NB employs a probabilistic approach based on Bayes theorem and conditional probability calculations. It is referred to as “naïve” due to the simplifying assumption of predictor variable independence, meaning it assumes that all attributes are unrelated to each other. This class of methods includes those offering categorization functions without explicitly producing a tree or set of rules [ 68 ]. Many researchers used the NB algorithm in their research. Table 7 presents the top five authors worldwide, each achieving the highest accuracy using NB classification and optimization algorithms. Shitharth et al. [ 63 ] achieved the highest accuracy at 99.99%, followed by Devi and Singh [ 64 ] at 99.91%. Kunhare et al. [ 57 ] reached an accuracy of 99.32%, while Samriya et al. [ 65 ] achieved and accuracy of 99.5%, and Iwendi et al. [ 66 ] achieved an accuracy of 98.81%.

Research name Highest accuracy Classification algorithm Optimization algorithm Dataset Optimization field Classification type Limitation of the study
1. Shitharth et al. [ ] 99.99% NB PPGO NLS-KDD Feature selection Multi-class classification Large amounts of noisy data can impair system performance by increasing false positives, misclassifying outcomes, and requiring a lot of time to train the model.
2. Devi and Singh [ ] 99.91% NB SMO KDD Cup 99 Feature selection Multi-class classification SMO achieves a high accuracy rate but is not recommended due to the lengthy model-building process. NB, while quick to build, has poor accuracy, making it an unsuitable choice. Depending on our criteria for both speed and accuracy in detection, we can opt for either J48 or RF.
3. Kunhare et al. [ ] 99.32% NB PSO NLS-KDD Feature selection Multi-class classification Research on parameter optimization for the PSO algorithm is in its early stages. Regarding accuracy, it is observed that the detection accuracy varies slightly between iterations, by about 0.5%, until the 27th iteration. This small variation occurs as the search particles alternate between their personal and awareness states.
4. Samriya et al. [ ] 99.5% NB ACO NLS-KDD Feature selection Binary and multi-class classification Detecting anomalies in IoT networks and identifying malware in uncertain and overcast conditions can be time-consuming.
5. Iwendi et al. [ ] 98.81% NB Genetic NSL-KDD Feature selection Multi-class classification While the ROS algorithm produced overfitting and redundant data, the RUS algorithm resulted in the loss of usable data. Data intersection and noise traffic were created via SMOTE interruption, and the amount of complex samples in the training assembly.

DL, a subcategory of ML, consists of multiple hidden layers and finds applications in various domains, including image processing and natural language processing. It excels in understanding the meaning of vast multidimensional data, performing feature selection, classification, and uncovering data correlations, particularly in speech recognition and language processing [ 69 ] ( Figure 9 ).

Figure 9 
                  Deep learning algorithms.

Deep learning algorithms.

The utilization of ML and DL techniques has significantly evolved in the development of IDS from 2018 to 2023. A systematic review of 393 studies revealed that ML and DL techniques have demonstrated significant potential in enhancing the reliability and effectiveness of IDS. The review identified frequently used algorithms, with CNN, SVM, DTs, and GA emerging as the top methods. Tables 2 and 3 and and 4 in the review indicate that SVM, DT, and ELM algorithms exhibit superior performance, particularly with the KDD Cup 1999 and NF-Bot datasets, both for multi-class and binary classification, as assessed by accuracy. In the realm of DL algorithms, Table 8 in the review showcases improved outcomes with the CNN algorithm and the NLS-KDD L dataset compared to Table 9 , which demonstrates lower results with the RNN algorithm and the CICIDS2017 dataset, once again, gauged by accuracy. Overall, the utilization of ML and DL techniques has evolved significantly in the development of IDS, with CNN, SVM, DT, and GA emerging as the top methods. These techniques have demonstrated significant potential in enhancing the reliability and effectiveness of IDS.

Highest accuracy of CNN algorithm studies

Research name Highest accuracy Classification algorithm Optimization algorithm Dataset Optimization field Classification type Limitation of the study
1. Vijayalakshmi et al. [ ] 99.99% CNN Swarm intelligence KDD Cup 99 Feature selection Binary and multi-class classification The established method still has several limitations, including AQO, which may be addressed with further research. Moreover, the IDS system to be employed in the IoT environment will incorporate various swarm intelligence approaches and DL designs.
2. Fatani et al. [ ] 99.99% CNN PSO, WOA NLS-KDD Feature selection Multi-class classification The developed method still exhibits several shortcomings, including AQU.
3. Prabhakaran and Kulandasamy [ ] 99.98% CNN CMBA NLS-KDD Feature selection Binary and multi-class classification The findings show that, for varying file sizes, the suggested approach marginally lengthens both the encryption and decryption times.
4. Om Kumar et al. [ ] 99.95% CNN MMBO CICIDS-2017 Feature selection Multi-class classification The performance measurements are quite low because of the constraints of the current methodologies, which include poor performance and time complexity.
5. Chen et al. [ ] 99.84% CNN MOEA/D AWID and CIC-IDS2107 parameters Binary and multi-class classification When there is a significant imbalance in the training data, MECNN performs marginally worse.

Highest accuracy of RNN algorithm studies

Research Name Highest accuracy Classification algorithm Optimization algorithm Dataset Optimization field Classification type Limitation of the study
1. Al-qaness et al. [ ] 99.997% RNN, ANN Swarm intelligence CIC2017 Feature selection Binary and multi-class classification The developed method exhibits high time complexity, particularly during feature extraction and the selection of relevant features. Additionally, the slow convergence of the CSA results in reduced solution quality.
2. Murugesh and Murugan [ ] 99.72% RNN Kaggle Feature selection Binary and multi-class classification NN training becomes hard due to the requirement of a low learning rate for the internal covariance migration event.
3. Al Sawafi et al. [ ] 99% RNN Adam, Adamax TON-IoT Feature selection Binary and multi-class classification The suggested approach still exhibits several drawbacks that should be addressed in future studies. For instance, the suggested system heavily relies on the ToN-IoT dataset, which may not comprehensively represent the diverse threats encountered in real-world scenarios.
4. Lateef et al. [ ] 98.34% RNN CSO KDD Cup 99 Feature selection Binary and multi-class classification To reach high-quality results, the algorithm CSO takes longer time
5. Keserwani et al. [ ] 98.11% RNN Genetic UNSW-NB15 Feature selection Binary and multi-class classification In a network this size, overfitting lowers the effectiveness of the classification methods.

The supervised learning algorithm CNN [ 47 ] is built upon the foundation of conventional artificial neural networks. CNN excels in strong feature extraction and efficiently analyzes high-dimensional data using shared convolutional kernels. While multilayer FNN has some drawbacks such as slow learning rates and susceptibility to overfitting, leveraging CNN features like local field perception, weight sharing, and pooling can enhance learning, expression, and neural network performance. Local field perception significantly reduces the number of weight parameters required for training, while weight sharing further reduces the training parameters. Additionally, pooling layers result in smaller-sized and dimension features.

Many researchers employed the CNN algorithm. Table 8 presents the top five authors globally, each achieving the highest accuracy using CNN classification and optimization algorithms. Vijayalakshmi et al. [ 70 ] achieved a perfect accuracy of 99.99% followed by Fatani et al. [ 11 ] at 99.99%, Prabhakaran and Kulandasamy [ 67 ] at 99.98%, and Om Kumar et al. [ 71 ] at 99.95%. Chen et al. [ 22 ] achieved an accuracy of 99.84%.

LSTM, a variant of RNN, was introduced to address the vanishing gradient issue. It consists of an input gate, an output gate, and a forget gate, allowing it to manage both single and series of input data. LSTMs find applications in areas such as speech recognition, handwriting recognition, and intrusion detection [ 69 ].

Another RNN variation, GRU, utilizes a gating mechanism to handle sequential data. Unlike LSTM, GRU incorporates two gates, an update gate and a reset gate. Update gates capture long-term dependencies in input sequences, while reset gates focus on short-term dependencies. GRU is suitable for handling input sequences with substantial time steps and is applied in domains like signal processing, music modeling, and natural language processing [ 69 ].

Table 9 presents the top five authors globally, each achieving the highest accuracy using RNN classification and optimization algorithms. Al-qaness et al. [ 11 ] achieved the highest accuracy at 99.997%, followed by Murugesh and Murugan [ 24 ] at 99.72%, Khan [ 72 ] at 99%, and Lateef et al. [ 73 ] at 98.34%, Keserwani et al. [ 74 ] at 98.11%.

4.3 Optimization (OP) algorithms

OP algorithms [ 76 ] is often the most efficient and accurate method for solving problems, although its definition can vary by context. In mathematics, it involves exploring the behavior of a problem by adjusting values within a specified range to either minimize or maximize a function. Optimization processes hold a significant role in DL, where various optimization functions are employed to minimize or maximize error functions. These functions have been developed in diverse environments. Figure 10 presents the most important OP algorithms used in research.

Figure 10 
                  Optimization algorithms.

Optimization algorithms.

OP algorithms have been extensively integrated into intrusion detection research, with several studies focusing on OP algorithms for feature selection and DL algorithms based on intrusion detection. The review identified GA, ACO, and GWO as significant OP algorithms, consistently delivering high results across Tables 10 , 12 , and 14 . For instance, Fang published five papers between 2018 and 2022, focusing on OP algorithms for feature selection of network intrusion detection. The highest accuracy he reached is 97.89 using WOA and OPS optimization. Similarly, Zivkovic published five papers between 2018 and 2023, focusing on intrusion detection for OP algorithms and feature selection. The highest he reached is 99.6878 using GOA, MPO optimization. The integration of OP algorithms has contributed significantly to the overall performance of IDS. For instance, the KDD Cup 1999 dataset, which is one of the most widely utilized in the field of intrusion detection, has been used in comparison to the PSO algorithm, with Table 11 indicating a marginal difference of 0.1. Overall, OP algorithms have been extensively integrated into intrusion detection research, with GA, ACO, and GWO emerging as significant OP algorithms. These algorithms have contributed significantly to the overall performance of IDS, enhancing their reliability and effectiveness.

Highest accuracy of GA algorithm studies

Research name Highest accuracy Classification algorithm Optimization algorithm Dataset Optimization field Classification type Limitation of the study
1. Duo et al. [ ] 100% CART Genetic KDD 99 Hyper-parameter Multi-class classification Despite its strong performance on the training dataset, it encountered challenges when applied to the test dataset. This discrepancy suggests that the IDS model may not be suitable for the specific scenarios considered in this article. In the context of real-time Ethernet scenarios on a train, the model must possess the capability to effectively recognize anomalous data. Additionally, in the case of the CART model, having either too many or too few nodes can significantly impact the accuracy of the DT’s classification.
2. Aljanabi and Ismail [ ] 100% SVM GA, TLBO KDD Cup 99 Feature selection Binary and multi-class classification Increasing these parameters will result in a more precise outcome, albeit at the cost of longer computation times. Researching a new population can be a time-consuming process.
3. Gorzałczany and Rudzinski [ ] 100% FRBC Genetic MQTT-IOT-IDS2020 Feature selection Binary and multi-class classification It took a long time to reach the highest accuracy.
4. Injadat et al. [ ] 99.99 DT PSO AND Genetic CICIDS 2017 Optimal parameter Multi-class classification The model faces challenges in detecting attack patterns and behaviors.
5. Mahmood et al. [ ] 99.36% DT, SVM, KNN PSO and Genetic NSL-KDD Feature selection Multi-class classification The experimental results suggest that reducing the number of features to a minimum, even if they are carefully chosen and relevant, does not always lead to higher accuracy. Instead, it is essential to select the right quantity of important and relevant features, which may even be a large number, to enhance the performance of ML models.

Highest accuracy of PSO algorithm studies

Research name Highest accuracy Classification algorithm Optimization algorithm Dataset Optimization field Classification type Limitation of the study
1. Injadat et al. [ ] 99.99 DT PSO AND Genetic CICIDS 2017 Optimal parameter Multi-class classification Both datasets are initially imbalanced, containing significantly fewer attack samples than standard samples. Consequently, the model encounters challenges in identifying attack patterns and behaviors.
2. Gaber et al. [ ] 99.99% RF PSO and Bat WUSTL-IIOT-2021 Feature selection Multi-class classification The IoT system's inability to collect sufficient real-world data for evaluating existing solutions.
The unbalanced dataset used in developing ML-based IDS, potentially resulting in the failure to detect minority attacks.
The study solely assessed the performance of the suggested feature selection technique with three ML algorithms (RF, k-NN, and MLP).
The study did not consider the potential impact of different attack types on the effectiveness of the proposed intrusion detection method.
3. Fatani et al. [ ] 99.99% CNN PSO, WOA NLS-KDD Feature selection Multi-class classification The developed method still exhibits several shortcomings, including AQU.
4. Al-qaness et al. [ ] 99.99% RNN, ANN Swarm intelligence CIC2017 Feature selection Binary and multi class classification The developed method exhibits high time complexity, particularly during feature extraction and the selection of relevant features.
The slow convergence of the CSA results in diminished solution quality.
5. Mohi-ud-din et al. [ ] 99.95% RF CSA-PSO UNSW-NB15 Feature selection Multi-class classification To reach high-quality results, the algorithm CSA takes a long time

One of the most commonly used evolutionary metaheuristic algorithms for IDS design in the literature is GAs [ 22 ]. Hogue utilized GAs to develop an IDS capable of effectively identifying various types of network intrusions, and his work has been published. This strategy incorporates an evolutionary information evolution mechanism for processing traffic data. The KDD Cup 99 standard dataset served as the foundation for developing and evaluating this IDS, with the results demonstrating a reasonable detection rate. To provide a comprehensive perspective, this IDS was compared with numerous other techniques. In a similar vein, a piece of work based on GA fuzzy-class association mining was presented by Dwivedi et al. [ 47 ]. Many of the rules essential for creating an intrusion detection model are generated using GAs. Instead of generating every possible rule that satisfies the criteria for misuse detection, an association rule mining technique is employed to identify a sufficient number of key rules aligned with the user's goals. In an experimental study using the KDD Cup 99 intrusion detection dataset, Ibrahim Hayat Hassan proposed a method that exhibited a higher detection rate compared to traditional data mining approaches.

Many researchers applied the GA to enhance the performance and achieve higher accuracy. Table 10 showcases the top five authors in the field, each achieving the highest accuracy using classification and GA. Notably, Duo et al. [ 68 ] reached a remarkable accuracy of 100%, while Aljanabi and Ismail [ 36 ] also achieved a 100% accuracy rate. Additionally, Gorzałczany and Rudzinski [ 77 ] reached a perfect accuracy of 100%, and Injadat et al. [ 49 ] achieved an accuracy rate of 99.99%. Finally, Mahmood et al. [ 52 ] reached an accuracy rate of 99.36%.

Lavanya and Kannan introduced PSO [ 46 ], a technique inspired by the behavior of birds in a flock, which guides particles to explore the optimal global solution. PSO is generally easier to implement than GA due to the absence of evolutionary operators.

The authors employed a PSO algorithm. Table 11 highlights the top five authors globally, each achieving the highest accuracy using PSO for classification and to enhance their work's performance and achieve high accuracy. Notably, Injadat et al. [ 49 ] stands out with an accuracy of 99.99%, followed closely by Gaber et al. [ 60 ] at 99.99%. Fatani et al. [ 11 ] reached a commendable 99.99% accuracy, while Al-qaness et al. [ 12 ] achieved 99.99% accuracy. Mohi-ud-din et al. [ 27 ] achieved an accuracy of 99.95%.

This algorithm is inspired by the real-world behavior of ants [ 51 ], which seek the shortest route between their colony and food sources, and ACO has been developed. ACO emulates the way ants communicate through pheromones within their population to discover the most optimal search space solution. It has been effectively employed to tackle discrete optimization challenges. ACO also offers an intriguing approach to feature selection for IDS, although its current application is somewhat limited.

Many researchers utilized the ACO algorithm to enhance the performance and achieve high accuracy in their work. Table 12 presents the top five authors globally, each achieving the highest accuracy using ACO for classification and OP algorithms. Notably, Alqarni et al. [ 45 ] attained a remarkable accuracy of 100%, followed closely by Mousavi et al. [ 50 ] at 99.92%. Samriya et al. [ 21 ] achieved an accuracy of 99.5%, while Bangui and Buhnova [ 62 ] reached 95.6% accuracy. Thakkar and Lohiya [ 69 ] reached 90.6% accuracy.

Highest accuracy of ACO algorithm studies

Research name Highest accuracy Classification algorithm Optimization algorithm Dataset Optimization field Classification type Limitation of the study
1. Alqarni et al. [ ] 100% SVM ACO KDD Cup 99 Feature selection Binary and multi-class classification It took a long time to reach the highest accuracy
2. Mousavi et al. [ ] 99.92% DT ACO KDD Cup 99 Feature selection Binary and multi-class classification The method used in this research to select a small training subset for multiclass classification under imbalanced conditions is currently challenging and suboptimal. It requires greater flexibility, compatibility, and efficiency. Consequently, there is a need to develop a better and more suitable method to address this issue.
3. Samriya et al. [ ] 99.5% NB ACO NLS-KDD Feature selection Binary and multi-class classification Detecting anomalies in IoT networks and identifying malware in uncertain and overcast conditions can be time-consuming.
4. Bangui and Buhnova [ ] 95.6% RF ACO CICIDS2017 Feature selection Multi-class classification It took a long time to analyze the comprehensive data to enhance its security against various attacks
5. Thakkar and Lohiya [ ] 90.6% SVM ACO, ABC KDD Cup 99 Feature selection Multi-class classification The performance evaluation dataset exhibits class imbalance, necessitating the development of SWEVO-based methods.

The inspiration for the ABC algorithm stems from the foraging behavior of bees [ 78 ]. Among the available solutions, ABC aims to locate the optimal one. The beehive consists of three types: scout bees, employed bees, and observer bees. These bees collaborate in various tasks, such as work distribution, food source selection, reproduction, scouting for the best food sources, and performing waggle dances to communicate the location of the optimal food sources. Initially, food sources are selected from the available options within the population. Employed bees then undertake random searches to discover superior food sources compared to those initially assigned to them.

Many researchers utilized the ABC algorithm to enhance the performance and achieve high accuracy. Table 13 shows the top five authors globally, each achieving the highest accuracy using ABC for classification and OP algorithms. Notably, Bacanin et al. [ 18 ] achieved an impressive accuracy of 99.65%, while Soni et al. [ 78 ] reached 97.42% accuracy. Mahboob et al. [ 79 ] achieved an accuracy of 97.23%, followed by Kalaivani et al. [ 80 ] with 97% accuracy, and Thakkar and Lohiya [ 69 ] reached 90.6% accuracy.

Highest accuracy of ABC algorithm studies

Research name Highest accuracy Classification algorithm Optimization algorithm Dataset Optimization field Classification type Limitation of the study
1. Bacanin et al. [ ] 99.65% XGBoost ABC UNSW-NB15 Feature selection Multi class classification One of the upcoming challenges in this domain is to validate the suggested hybrid model on additional intrusion detection datasets. This step is crucial for increasing confidence in the results before applying the model in real-world scenarios.
2. Soni et al. [ ] 97.42% CNN ABC NLS-KDD Feature selection Binary and multi-class classification The ABC algorithm took a long time to reach the required results and this may affect its performance
3. Mahboob et al. [ ] 97.23% KNN, ANN ABC NLS-KDD Feature selection Binary and multi-class classification The exploration of the mentioned properties may result in increased processing time and additional hardware overhead. However, it is possible to convert symbolic features into numerical ones.
4. Kalaivani et al. [ ] 97% ANN ABC CICIDS2017 Feature selection Multi-class classification The detection algorithm's error rate should be as low as possible given the appropriate limit setting. An ideal limit value was not found for the network's unidentified distribution model.
5. Thakkar and Lohiya [ ] 90.6% SVM ABC, ACO KDD Cup 99 Feature selection Multi-class classification The performance evaluation dataset exhibits class imbalance, necessitating the development of SWEVO-based methods to address this issue.

ML models often utilize meta-heuristic algorithms inspired by nature [395950-34]. One such algorithm, GWO, was introduced by Mirjalili et al. in 2014. GWO draws inspiration from the social structure and clever hunting tactics of grey wolves. In the natural world, grey wolves typically travel in packs consisting of 5–12 individuals. The GWO algorithm emulates the hunting behavior and leadership structure of these wolves [ 80 ].

Many researchers like Swarna Priya employed the GWO algorithm to enhance their work's performance and achieve high accuracy. Table 14 showcases the top five authors globally, each achieving the highest accuracy using GWO for classification and OP algorithms. Notably, ElDahshan et al. [ 53 ] attained a remarkable accuracy of 100%, while Alzubi et al. [ 33 ] reached an accuracy of 99.22%. Davahli et al. [ 81 ] achieved an accuracy of 99.10% and Swarna Priya et al. [ 82 ] reached 99.9% accuracy. Kunhare et al. [ 83 ] achieved an accuracy of 97.894%.

Highest accuracy of GWO algorithm studies

Research name Highest accuracy Classification algorithm Optimization algorithm Dataset Optimization field Classification type Limitation of the study
1. ElDahshan et al. [ ] 100 ELM GWO CICIDS 2017 Parameter Binary and multi-class classification Resolving these problems should prioritize a focus on attack instances over normal instances, as misclassifying attacks among attack instances can cause more significant harm than misclassifying attacks among normal instances. (1) The need for accurate detection of various attack instances. (2) The challenge of reducing false alarm rates. (3) The difficulty in efficiently identifying different types of attacks. (4) The issue of dealing with large amounts of data and class imbalance in datasets. (5) The challenge of selecting relevant features for ML-based IDS. (6) The need for effective hyperparameter optimization methods for ML models. (7) The challenge of achieving high detection rates with a small amount of data. (8) The issue of dealing with constantly evolving attack methods and techniques
2. Alzubi et al. [ ] 99.22 SVM GWO KDD Cup99 Feature selection Binary and multi-class classification MBGWO and bGWO convergence.
Due to its limited ability to identify a small number of FS with numerous aims, the bGWO has always been inadequate in addressingideal solutions in a single run, which entails making several runs to achieve a predetermined number of features.
a. Davahli et al. [ ] 99.10 SVM GWO AWID Feature selection Binary and multi-class classification The computational costs, such as the time and memory needed for intrusion detection, are very important in wireless networks due to resource limitations. Some initiatives or
attempts should be made to further shorten the GA-GWO runtime, such as parallelizing tasks.
4. Swarna Priya et al. [ ] 99.9 SVM GWO KDD Cup 99 Feature selection Multi-class classification Expanded the amount of data that have to be categorized and examined. High impact features should be chosen, while undesirable elements should be removed.
5. Kunhare et al. [ ] 97.894 DT GWO NSL-KDD Feature selection Multi-class classification The proposed work has certain limitations. The stochastic nature of GA results in longer convergence times. Optimization based on biological evolution can be computationally demanding. GWO exhibits a low convergence rate, limited precision in solving, and a limited ability for local searching.

Publication trends: The review identifies increasing publication volumes in the field of intrusion detection, indicating a growing interest and research activity in this domain.

Frequently adopted algorithms: The review highlights the dominance of specific ML and DL algorithms, such as SVM, CNN, DTs, and GA, as leading techniques for intrusion detection.

Utilized datasets: The review emphasizes the significance of benchmark datasets, including KDD Cup 1999, NSL-KDD, UNSW-NB15, and CICIDS2017, as commonly used resources for evaluating intrusion detection models.

Challenges and limitations: The review identifies challenges and limitations, such as limited availability of labeled datasets, imbalanced datasets, adversarial attacks, interpretability, explainability, and scalability, which influence the overall effectiveness and reliability of IDS.

Future research directions: The review suggests future research directions, including the exploration of DL methods, addressing computational complexity, enhancing model interpretability, and evaluating diverse new datasets.

By synthesizing these key insights and overarching themes, the review provides a comprehensive overview of the current state-of-the-art in intrusion detection research. It offers valuable guidance for researchers and practitioners, enabling them to understand the prominent trends, challenges, and potential areas for further investigation in the field of IDS.

4.4 Dataset

The datasets encompass fields containing both unprocessed and processed data extracted from underlying network traffic [ 90 ]. These data are typically generated through studies aimed at identifying network intrusions. An intentional effort is made to manipulate the data, creating adversarial examples capable of deceiving classifiers and detection systems. When creating adversarial instances that alter the source data in network security applications, caution is essential, as highlighted by [ 90 ]. The most prominent datasets utilized in research include KDD Cup99, NSL-KDD, CICIDS 2017, UNSW-NB15, AWID, Kaggle, and TON-IOT. Table 15 provides an overview of the most crucial datasets commonly used in the field of intrusion detection [ 37 – 39 , 91 – 97 ].

Most commonly used datasets

Dataset Dataset description Dataset size Link of the dataset Public or private Limitation
KDD Cup 99 The KDD Cup 99 dataset was developed by MIT Lincoln Laboratories and encompasses four main attack categories: Denial of Service , Remote to Local, User to Root, and probing. The dataset comprises 41 features and one label, which provides information about the type of attack. 4,900,000 records Public While the KDD Cup 99 dataset remains the most popular and widely used public dataset for IDS, it requires data cleaning or preprocessing due to roughly 78% redundant records. Record duplication can introduce bias towards frequent chromosomes, reducing the effectiveness of network intrusion detection.
Om Kumar et al. [ ] 41 attributes
NSL-KDD The NSL-KDD dataset is an upgrade of the KDD Cup 99 dataset, designed to address some of its underlying issues. 125,973 records Public Due to the limited availability of publicly accessible datasets for network-based IDS, this updated version of the KDD dataset still has some issues and may not fully represent the current real networks.
Li et al. [ ] 41 attributes
UNSW-NB15 The UNSW-NB15 dataset combines raw network packets to include a mixture of real, current normal activity and synthetic attacks 2,450,044 records Public Before using this dataset for model development, it is essential to address its two main issues: class imbalance and class overlap. Failure to resolve these problems could potentially hinder IDS in identifying and detecting attacks.
Li et al. [ ] 49 attributes
CICIDS 2017 The CIC-IDS-2017 dataset, created by the Faculty of Computer Science, encompasses both regular and various attack data within network traffic. 25,00,000 records Public The CICIDS 2017 dataset has a few shortcomings and weaknesses:
Large volume of data.
Yousef [ ] The dataset exhibits class imbalance, with an uneven distribution between the dominant and minority classes in the database. 78 attributes Missing values.
AWID The AWID dataset is a newly developed Wi-Fi network intrusion benchmark that is useful for evaluating IDSs employed by network IDS research communities. This dataset is particularly relevant for research involving IoT wireless networks connected to Wi-Fi networks. 162,385 records Private The AWID intrusion dataset encompasses various data types, including discrete, continuous, and symbolic (nominal) data with a wide range of values. These data variations pose a challenge for classifiers, even for high-performing classifiers like SVM, to effectively train on normal and abnormal patterns.
Davahli et al. [ ] 154 features

KDD Cup 1999: This dataset stands as one of the most widely utilized in the field of intrusion detection. It comprises a substantial and diverse collection of network traffic data, encompassing potential attacks.

NSL-KDD: An enhanced iteration of the KDD Cup 1999 dataset, it offers a more demanding and realistic environment for testing intrusion detection models.

UNSW-NB15: This dataset consists of samples of network traffic extracted from real-world internet environments, providing a formidable challenge for detecting advanced attacks.

CICIDS2017: This dataset encompasses a diverse range of data reflecting different attack scenarios, serving as an invaluable resource for evaluating the performance of intrusion detection models.

The reviewed studies have frequently utilized several benchmark datasets for evaluating IDS. The most commonly used datasets include: (1) KDD Cup 1999: This dataset is one of the most widely utilized in the field of intrusion detection. It comprises a substantial and diverse collection of network traffic data, encompassing potential attacks. (2) NSL-KDD: An enhanced iteration of the KDD Cup 1999 dataset, it offers a more demanding and realistic environment for testing intrusion detection models. (3) UNSW-NB15: This dataset consists of samples of network traffic extracted from real-world internet environments, providing a formidable challenge for detecting advanced attacks. (4) CICIDS2017: This dataset encompasses a diverse range of data reflecting different attack scenarios, serving as an invaluable resource for evaluating the performance of intrusion detection models. The utilization of these benchmark datasets has influenced the comparability of research outcomes by providing a standardized basis for evaluating the performance of IDS. Researchers can compare the effectiveness of different algorithms and techniques using these commonly accepted benchmark datasets, thereby facilitating the assessment of the reliability and generalizability of intrusion detection models.

5 Discussion

This section delves into the findings derived from comparing various ML algorithms. Notably, Tables 2 – 4 indicate that ML models exhibit superior performance when using SVM, DT, and ELM algorithms, particularly with the KDD Cup 1999 and NF-Bot datasets, both for multi-class and binary classification, as assessed by accuracy. In contrast, Table 5 presents slightly lower results when employing the XGBoost algorithm, and the CICIDS2017 dataset is utilized for multi-class classification. Tables 6 and 7 reveal results nearly identical to Table 5 with the RF and NB algorithms. Therefore, SVM, DT, and ELM algorithms outperform RF, NB, and XGBoost, though the margin is relatively small, typically within the range of 0.1–0.2 in terms of accuracy. In the realm of DL algorithms, Table 8 showcases improved outcomes with the CNN algorithm and the NLS-KDD L dataset compared to Table 9 , which demonstrates lower results with the RNN algorithm and the CICIDS2017 dataset, once again, gauged by accuracy. Notably, GA, ACO, and GWO stand out as significant OP algorithms, consistently delivering high results across Tables 10 and 12 and and 14 . For instance, the KDD CUP 99 and CICIDS2017 datasets are used in comparison to the PSO algorithm. While Table 11 indicates a marginal difference of 0.1, Table 13 reveals a discrepancy of approximately 0.34 when the ABC algorithm is utilized with the UNSW-NB15 dataset. The KDD CUP 99 dataset emerges as the most frequently employed in conjunction with ML and DL algorithms, signifying that these algorithms exhibit great potential for enhancing intrusion detection in both binary and multi-class classification scenarios.

6 Conclusion

This systematic review presents a structured synthesis of research on ML and DL techniques for intrusion detection published over the past 5 years. An analysis of 393 studies reveals a noticeable increase in publication volumes, indicating a growing interest in this field. The mapping of frequently used algorithms highlights SVM, CNN, DTs, and GA as dominant techniques. The most commonly used public datasets include KDD Cup 1999, NSL-KDD, CICIDS2017, and UNSW-NB15. The review methodology integrates findings from multiple studies to provide a holistic overview of the current state-of-the-art. The results can inform future research by identifying promising techniques and gaps for further investigation. For instance, DL methods show potential but require ongoing exploration. Aspects such as computational complexity, model interpretability, and evaluation on diverse new datasets require further attention. Overall, this review provides a valuable reference that captures the current landscape of intelligent intrusion detection techniques and datasets, helping researchers position their work in this evolving research domain and select appropriate methodologies for comparative evaluation. The conclusion of the systematic literature review on IDS presents key findings, insights, and implications derived from the research, emphasizing the significance of the study's outcomes in the broader context of the research area. The conclusion highlights the following key results, insights, and implications: (1) Key Results: Increasing publication trends: The review reveals increasing publication trends in the research domain of IDS, indicating the growing interest and significance of the field. Frequently used algorithms: The study identifies CNN, SVM, DTs, and GA as the top methods frequently used in intrusion detection research, providing insights into the prevalent algorithms in the field. - Commonly used datasets: The review identifies widely utilized datasets such as KDD Cup 1999, NSL-KDD, UNSW-NB15, and CICIDS 2017, emphasizing the importance of diverse and realistic datasets for evaluating intrusion detection models. (2) Insights: ML and DL Techniques: The review underscores the significant potential of ML and DL techniques in the development of effective IDS, highlighting their transformative impact on IDS in terms of security, adaptability, and scalability. Challenges and limitations: The study discusses the challenges and limitations of current techniques in intrusion detection, providing a structured synthesis of the state-of-the-art to guide future research in the field, thus offering valuable insights for researchers and practitioners. (3) Implications: Future research directions: The findings of the review have implications for guiding future intrusion detection research, particularly in the selection of algorithms, utilization of datasets, and addressing the challenges and limitations identified in the study. Advancements in cybersecurity: The study's outcomes have broader implications for advancing the field of cybersecurity by providing insights into the utilization of ML, DL, OP algorithms, and datasets in intrusion detection research, thus contributing to the enhancement of security measures against network intrusions. In summary, the systematic literature review provides valuable insights into the publication trends, frequently used algorithms, commonly utilized datasets, challenges, and implications for future research in the field of IDS. The study's outcomes have significant implications for advancing the field of cybersecurity and guiding future research endeavors in intrusion detection.

Based on the findings of the systematic review, several areas and methodologies warrant further exploration and improvement in future intrusion detection research. The review provides guidance for future research in the following areas: (1) DL methods: The review suggests ongoing exploration of DL methods for intrusion detection, indicating their potential for enhancing detection capabilities. Future research could focus on leveraging advanced DL architectures and techniques to improve the accuracy and robustness of IDS. (2) Computational complexity: Addressing the computational complexity of intrusion detection models is highlighted as an area for improvement. Future research could explore methods to optimize the computational efficiency of ML and DL algorithms, particularly in large-scale network environments. (3) Model Interpretability: Enhancing the interpretability of intrusion detection models is identified as a crucial area for improvement. Future research could focus on developing methods to improve the transparency and explainability of ML and DL models, enabling better understanding of their decision-making processes. 4. Evaluation on diverse new datasets: The review emphasizes the importance of evaluating intrusion detection models on diverse new datasets. Future research could involve the creation and utilization of novel datasets that capture a wide range of network traffic scenarios, including emerging threats and attack patterns. (5) Addressing adversarial attacks: Given the challenge of adversarial attacks, future research could focus on developing robust intrusion detection techniques that are resilient to adversarial manipulation of data. (6) Scalability: Addressing the scalability of IDS is highlighted as an important area for improvement. Future research could explore methods to ensure the effective deployment of IDS in large-scale network environments. Overall, the review guides future intrusion detection research by identifying promising areas for exploration and improvement, including the continued investigation of DL methods, addressing computational complexity, enhancing model interpretability, evaluating on diverse new datasets, addressing adversarial attacks, and ensuring scalability in real-world.

Acknowledgments

The corresponding auhtor would like to thank Imam Ja afar Al-Sadiq University for their support.

Funding information: No funding received for this paper.

Author contributions: Melad: collect the data, analysis, and write the results; Mohammad: methodology design, Rstudio results, and write the introduction and discussion section; Hassan: interpretation of results, and conclusion.

Conflict of interest: Authors declare no conflict of interest.

Data availability statement: Data sharing is not applicable to this article as no datasets were generated or analysed during the current study.

[1] Yaseen MG, Aljanabi M. Recent advances in control theory for complex systems. Babylon J Math. 2023;2023:7–11. 10.58496/BJM/2023/002 Search in Google Scholar

[2] Gopi RS, Dhanesh L, Aljanabi M, Rao TV, Thiruveni M, Mahalakshmi S. Design of Covid19 disease detection for risk identification using deep learning approach. J Adv Res Appl Sci Eng Technol. 2023;32(1):139–54. 10.37934/araset.32.1.139154 Search in Google Scholar

[3] Aljanabi M, Mohammed SY. Metaverse: Open possibilities. Iraqi J Computer Sci Math. 2023;4(3):79–86. 10.52866/ijcsm.2023.02.03.007 Search in Google Scholar

[4] Hilal AM, Al-Otaibi S, Mahgoub H, Al-Wesabi FN, Aldehim G, Motwakel A, et al. Deep learning enabled class imbalance with sand piper optimization based intrusion detection for secure cyber physical systems. Clust Comput. 2023;26(3):2085–98. 10.1007/s10586-022-03628-w . Search in Google Scholar

[5] A. Alissa K, S. Alrayes F, Tarmissi K, Yafoz A, Alsini R, Alghushairy O, et al. Planet optimization with deep convolutional neural network for lightweight intrusion detection in resource-constrained IoT networks. Appl Sci (Switz). 2022;12(17):1–15. 10.3390/app12178676 . Search in Google Scholar

[6] Mohamed HG, Alotaibi SS, Eltahir MM, Mohsen H, Ahmed Hamza M, Sarwar Zamani A, et al. Feature selection with stacked autoencoder based intrusion detection in drones environment. Computers Mater Continua. 2022;73(3):5441–58. 10.32604/cmc.2022.031887 . Search in Google Scholar

[7] Alissa KA, Alotaibi SS, Alrayes FS, Aljebreen M, Alazwari S, Alshahrani H, et al. Crystal structure optimization with deep-autoencoder-based intrusion detection for secure internet of drones environment. Drones. 2022;6(10):297. 10.3390/drones6100297 . Search in Google Scholar

[8] Mohamed HG, Alrowais F, Al-Hagery MA, Al Duhayyim M, Hilal AM, Motwakel A. Optimal wavelet neural network-based intrusion detection in internet of things environment. Computers Mater Continua. 2023;75(2):4467–83. 10.32604/cmc.2023.036822 . Search in Google Scholar

[9] Ahmed Hamza M, Hassan Abdalla Hashim A, Mohamed HG, Alotaibi SS, Mahgoub H, Mehanna AS, et al. Hyperparameter tuned deep learning enabled intrusion detection on Internet of Everything environment. Computers Mater Continua. 2022;73(3):6579–94. 10.32604/cmc.2022.031303 . Search in Google Scholar

[10] Duhayyim MA, Alissa KA, Alrayes FS, Alotaibi SS, Tag El Din EM, Abdelmageed AA, et al. Evolutionary-based deep stacked autoencoder for intrusion detection in a cloud-based cyber-physical system. Appl Sci (Switz). 2022;12(14):6875. 10.3390/app12146875 . Search in Google Scholar

[11] Fatani A, Dahou A, Al-Qaness MAA, Lu S, Elaziz MA. Advanced feature extraction and selection approach using deep learning and aquila optimizer for IoT intrusion detection system. Sensors. 2022;22(1):140. 10.3390/s22010140 . Search in Google Scholar PubMed PubMed Central

[12] Abd Elaziz M, Al-qaness MAA, Dahou A, Ibrahim RA, El-Latif AAA. Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm. Adv Eng Softw. 2023;176(September 2022):103402. 10.1016/j.advengsoft.2022.103402 . Search in Google Scholar

[13] Dahou A, M AbdElaziz, Chelloug SA, Awadallah MA, Al-Betar MA, Al-Qaness M, et al. Intrusion detection system for IoT based on deep learning and modified reptile search algorithm. Comput Intell Neurosci. 2022;2022:1–15. 10.1155/2022/6473507 . Search in Google Scholar PubMed PubMed Central

[14] Fatani A, Elaziz MA, Dahou A, Al-Qaness MAA, Lu S. IoT intrusion detection system using deep learning and enhanced transient search optimization. IEEE Access. 2021;9:123448–64. 10.1109/ACCESS.2021.3109081 . Search in Google Scholar

[15] Fatani A, Dahou A, M AbdElaziz, Al-Qaness M, Lu S, Alfadhli SA, et al. Enhancing intrusion detection systems for IoT and cloud environments using a growth optimizer algorithm and conventional neural networks. Sensors. 2023;23(9):1–14. 10.3390/s23094430 . Search in Google Scholar PubMed PubMed Central

[16] Stankovic M, Zivkovic M, Antonijevic M, Tanaskovic M, Bacanin N, Jovanovic D. Feature selection by hybrid artificial bee colony algorithm for intrusion detection. International Conference on Edge Computing and Applications, ICECAA 2022 – Proceedings, no. Icecaa; 2022. p. 500–5. 10.1109/ICECAA55415.2022.9936116 . Search in Google Scholar

[17] Zivkovic M, Tair M, Venkatachalam K, Bacanin N, Hubálovský Š, Trojovský P. Novel hybrid firefly algorithm: An application to enhance XGBoost tuning for intrusion detection classification. PeerJ Comput Sci. 2022;8:1–38. 10.7717/peerj-cs.956 . Search in Google Scholar PubMed PubMed Central

[18] Bacanin N, Petrovic A, Antonijevic M, Zivkovic M, Sarac M, Tuba E, et al. Intrusion detection by XGBoost model tuned by improved social network search algorithm. In International Conference on Modelling and Development of Intelligent Systems. Cham: Springer Nature Switzerland; 2022. p. 104–21. 10.1007/978-3-031-27034-5_7 Search in Google Scholar

[19] Jovanovic D, Marjanovic M, Antonijevic M, Zivkovic M, Budimirovic N, Bacanin N. Feature selection by improved sand cat swarm optimizer for intrusion detection. Proceedings - 2022 International Conference on Artificial Intelligence in Everything, AIE 2022; 2022. p. 685–90. 10.1109/AIE57029.2022.00134 . Search in Google Scholar

[20] Jovanovic L, Jovanovic D, Antonijevic M, Zivkovic M, Budimirovic N, Strumberger I, et al. The XGBoost tuning by improved firefly algorithm for network intrusion detection. In 2022 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC). IEEE; 2022. p. 268–75. 10.1109/SYNASC57785.2022.00050 Search in Google Scholar

[21] Chen Y, Lin Q, Wei W, Ji J, Wong KC, Coello CAC. Intrusion detection using multi-objective evolutionary convolutional neural network for Internet of Things in Fog computing. Knowl Based Syst. 2022;244:108505. 10.1016/j.knosys.2022.108505 . Search in Google Scholar

[22] Chen P, You C, Ding P. Event classification using improved salp swarm algorithm based probabilistic neural network in fiber-optic perimeter intrusion detection system. Optical Fiber Technol. 2020;56(September 2019):102182. 10.1016/j.yofte.2020.102182 . Search in Google Scholar

[23] Xu H, Przystupa K, Fang C, Marciniak A, Kochan O, Beshley M. A combination strategy of feature selection based on an integrated optimization algorithm and weighted k-nearest neighbor to improve the performance of network intrusion detection. Electronics (Switzerland). 2020;9(8):1–22. 10.3390/electronics9081206 . Search in Google Scholar

[24] Murugesh C, Murugan S. Moth search optimizer with deep learning enabled intrusion detection system in wireless sensor networks. SSRG Int J Electr Electron Eng. 2023;10(4):77–90. 10.14445/23488379/IJEEE-V10I4P108 . Search in Google Scholar

[25] Chaudhary DK, Yadav P, Gupta S, Jha K. IOT network feature based intrusion detection techniques - Review. Proceedings of 2022 IEEE International Conference on Current Development in Engineering and Technology, CCET 2022; 2022. p. 1–5. 10.1109/CCET56606.2022.10080392 . Search in Google Scholar

[26] Pathania A. A hybrid approach for intrusion detection system using data minining and artificial neural network. 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). 2018, 2021. p. 1508–14. 10.1109/ICAC3N53548.2021.9725482 . Search in Google Scholar

[27] Mohi-ud-din G, Zhiqiang L, Jiangbin Z, Sifei W, Zhijun L, Asim M, et al. Intrusion detection using hybrid enhanced CSA-PSO and multivariate WLS random-forest technique. IEEE Trans Netw Serv Manag. 2023;20:1. 10.1109/tnsm.2023.3258901 . Search in Google Scholar

[28] Almuqren L, Al-Mutiri F, Maashi M, Mohsen H, Hilal AM, Alsaid MI, et al. Sine-cosine-adopted African vultures optimization with ensemble autoencoder-based intrusion detection for cybersecurity in CPS environment. Sensors. 2023;23(10):1–19. 10.3390/s23104804 . Search in Google Scholar PubMed PubMed Central

[29] Alohali MA, Al-Wesabi FN, Hilal AM, Goel S, Gupta D, Khanna A. Artificial intelligence enabled intrusion detection systems for cognitive cyber-physical systems in industry 4.0 environment. Cogn Neurodyn. 2022;16(5):1045–57. 10.1007/s11571-022-09780-8 . Search in Google Scholar PubMed PubMed Central

[30] Alrowais F, Marzouk R, Nour MK, Mohsen H, Hilal AM, Yaseen I, et al. Intelligent intrusion detection using arithmetic optimization enabled density based clustering with deep learning. Electron (Switz). 2022;11(21):1–15. 10.3390/electronics11213541 . Search in Google Scholar

[31] Kavitha S, Maheswari NU, Venkatesh R. Intelligent intrusion detection system using enhanced arithmetic optimization algorithm with deep learning model. Tehnicki Vjesn. 2023;30(4):1217–24. 10.17559/TV-20221128071759 . Search in Google Scholar

[32] Dahou A, AbdElaziz M, Chelloug SA, Awadallah MA, Al-Betar MA, Al-Qaness M, et al. Intrusion detection system for IoT based on deep learning and modified reptile search algorithm. Comput Intell Neurosci. 2022;2022:1–15. 10.1155/2022/6473507 Search in Google Scholar PubMed PubMed Central

[33] Alzubi QM, Anbar M, Alqattan ZNM, Al-Betar MA, Abdullah R. Intrusion detection system based on a modified binary grey wolf optimisation. Neural Comput Appl. 2020;32(10):6125–37. 10.1007/s00521-019-04103-1 . Search in Google Scholar

[34] Alawad NA, Abed-alguni BH, Al-Betar MA, Jaradat A. Binary improved white shark algorithm for intrusion detection systems. Neural Comput Appl. 2023;35(26):19427–51. 10.1007/s00521-023-08772-x . Search in Google Scholar

[35] Ramasamy M, Eric PV. A novel classification and clustering algorithm for intrusion detection system on convolutional neural network. Bull Electr Eng Inform. 2022;11(5):2845–55. 10.11591/eei.v11i5.4145 . Search in Google Scholar

[36] Aljanabi M, Ismail M. Improved intrusion detection algorithm based on TLBO and GA algorithms. Int Arab J Inf Technol. 2021;18(2):170–9. 10.34028/IAJIT/18/2/5 . Search in Google Scholar

[37] Aljanabi M, Ismail MA, Mezhuyev V. Improved TLBO-JAYA algorithm for subset feature selection and parameter optimisation in intrusion detection system. Complexity. 2020;2020:1–18. 10.1155/2020/5287684 . Search in Google Scholar

[38] Alhayali RAI, Aljanabi M, Ali AH, Mohammed MA, Sutikno T. Optimized machine learning algorithm for intrusion detection. Indonesian J Electr Eng Computer Sci. 2021;24(1):590–9. 10.11591/ijeecs.v24.i1.pp590-599 . Search in Google Scholar

[39] Aljanabi M, Ismail MA, Ali AH. Intrusion detection systems, issues, challenges, and needs. Int J Comput Intell Syst. 2021;14(1):560–71. 10.2991/ijcis.d.210105.001 . Search in Google Scholar

[40] Mijwil MM, Aljanabi M. A comparative analysis of machine learning algorithms for classification of diabetes utilizing confusion matrix analysis. Baghdad Sci J. 2023. Search in Google Scholar

[41] Aljanabi M. Safeguarding connected health: Leveraging trustworthy AI techniques to harden intrusion detection systems against data poisoning threats in IoMT environments. Babylon J Internet Things. 2023;2023:31–7. 10.58496/BJIoT/2023/005 Search in Google Scholar

[42] Aljanabi M. Navigating the landscape: A comprehensive bibliometric analysis of decision-making research in civil engineering. Mesopotamian J Civ Eng. 2023;2023:35. 10.58496/MJCE/2023/005 Search in Google Scholar

[43] Omran AH, Mohammed SY, Aljanabi M. Detecting data poisoning attacks in federated learning for healthcare applications using deep learning. Iraqi J Computer Sci Math. 2023;4(4):225–37. 10.52866/ijcsm.2023.04.04.018 Search in Google Scholar

[44] Aljanabi M, Yaseen MG, Ali AH, Mohammed MA. Prompt engineering: Guiding the way to effective large language models. Iraqi J Computer Sci Math. 2023;4(4):151–5. 10.52866/ijcsm.2023.04.04.012 Search in Google Scholar

[45] Alqarni AA. Toward support-vector machine-based ant colony optimization algorithms for intrusion detection. Soft Comput. 2023;27(10):6297–305. 10.1007/s00500-023-07906-6 . Search in Google Scholar

[46] Lavanya R, Kannan S. Intrusion detection system for energy efficient cluster based vehicular adhoc networks. Intell Autom Soft Comput. 2022;32(1):323–37. 10.32604/iasc.2022.021467 . Search in Google Scholar

[47] Dwivedi S, Vardhan M, Tripathi S. Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection. Clust Comput. 2021;24(3):1881–900. 10.1007/s10586-020-03229-5 . Search in Google Scholar

[48] Liu Z, Shi R, Lei M, Wu Y. Intrusion detection method based on improved sparrow algorithm and optimized SVM. Proceedings - 2022 4th International Conference on Data Intelligence and Security, ICDIS 2022; 2022. p. 27–30. 10.1109/ICDIS55630.2022.00012 . Search in Google Scholar

[49] Injadat M, Moubayed A, Nassif AB, Shami A. Multi-stage optimized machine learning framework for network intrusion detection. IEEE Trans Netw Serv Manag. 2021;18(2):1803–16. 10.1109/TNSM.2020.3014929 . Search in Google Scholar

[50] Mousavi SM, Majidnezhad V, Naghipour A. A new intelligent intrusion detector based on ensemble of decision trees. J Ambient Intell Humaniz Comput. 2022;13(7):3347–59. 10.1007/s12652-019-01596-5 . Search in Google Scholar

[51] Maza S, Touahria M. Feature selection for intrusion detection using new multi-objective estimation of distribution algorithms. Appl Intell. 2019;49(12):4237–57. 10.1007/s10489-019-01503-7 . Search in Google Scholar

[52] Mahmood RAR, Abdi AH, Hussin M. Performance evaluation of intrusion detection system using selected features and machine learning classifiers. Baghdad Sci J. 2021;18(2):884–98. 10.21123/bsj.2021.18.2(Suppl.).0884 . Search in Google Scholar

[53] ElDahshan KA, AlHabshy AAA, Hameed BI. Meta-heuristic optimization algorithm-based hierarchical intrusion detection system. Computers. 2022;11(12):170. 10.3390/computers11120170 . Search in Google Scholar

[54] Vaiyapuri T, Algamdi S, John R, Sbai Z, Al‐Helal M, Alkhayyat A, et al. Metaheuristics with federated learning enabled intrusion detection system in Internet of Things environment. Expert Syst. 2022;40(July 2022):1–16. 10.1111/exsy.13138 . Search in Google Scholar

[55] Ghasemi J, Esmaily J, Moradinezhad R. Intrusion detection system using an optimized kernel extreme learning machine and efficient features. Sadhana - Acad Proc Eng Sci. 2020;45(1):1–9. 10.1007/s12046-019-1230-x . Search in Google Scholar

[56] Wang C, Cai W, Ye Z, Yan L, Wu P, Wang Y. Network intrusion detection based on lightning search algorithm optimized extreme learning machine. 13th International Conference on Computer Science and Education, ICCSE 2018, no. Iccse; 2018. p. 562–6. 10.1109/ICCSE.2018.8468727 . Search in Google Scholar

[57] Kunhare N, Tiwari R, Dhar J. Particle swarm optimization and feature selection for intrusion detection system. Sadhana - Acad Proc Eng Sci. 2020;45(1):1–14. 10.1007/s12046-020-1308-5 . Search in Google Scholar

[58] Kilincer IF, Ertam F, Sengur A. A comprehensive intrusion detection framework using boosting algorithms. Computers Electr Eng. 2022;100(May 2021):107869. 10.1016/j.compeleceng.2022.107869 . Search in Google Scholar

[59] Xu W, Fan Y. Intrusion detection systems based on logarithmic autoencoder and XGBoost. Secur Commun Netw. 2022;2022:1–8. 10.1155/2022/9068724 . Search in Google Scholar

[60] Gaber T, Awotunde JB, Folorunso SO, Ajagbe SA, Eldesouky E. Industrial Internet of Things intrusion detection method using machine learning and optimization techniques. Wirel Commun Mob Comput. 2023;2023:1–15. 10.1155/2023/3939895 . Search in Google Scholar

[61] Samawi VW, Yousif SA, Al-Saidi NMG. Intrusion detection system: An automatic machine learning algorithms using auto-WEKA. 2022 IEEE 13th Control and System Graduate Research Colloquium, ICSGRC 2022 - Conference Proceedings; 2022. July. p. 42–6. 10.1109/ICSGRC55096.2022.9845166 . Search in Google Scholar

[62] Bangui H, Buhnova B. Lightweight intrusion detection for edge computing networks using deep forest and bio-inspired algorithms. Computers Electr Eng. 2022(July 2021);100:107901. 10.1016/j.compeleceng.2022.107901 . Search in Google Scholar

[63] Shitharth S, Kshirsagar PR, Balachandran PK, Alyoubi KH, Khadidos AO. An innovative perceptual pigeon galvanized optimization (PPGO) based Likelihood Naïve Bayes (LNB) classification approach for network intrusion detection system. IEEE Access. 2022;10:46424–41. 10.1109/ACCESS.2022.3171660 . Search in Google Scholar

[64] Devi TJ, Singh KJ. Anomaly-based intrusion detection system in two benchmark datasets using various learning algorithms. vol. 225, Singapore: Springer; 2021. 10.1007/978-981-16-0878-0_19 . Search in Google Scholar

[65] Samriya JK, Tiwari R, Cheng X, Singh RK, Shankar A, Kumar M. Network intrusion detection using ACO-DNN model with DVFS based energy optimization in cloud framework. Sustain Comput: Inform Syst. 2022;35(September 2021):100746. 10.1016/j.suscom.2022.100746 . Search in Google Scholar

[66] Iwendi C, Anajemba JH, Biamba C, Ngabo D. Security of things intrusion detection system for smart healthcare. Electron (Switz). 2021;10(12):1–27. 10.3390/electronics10121375 . Search in Google Scholar

[67] Prabhakaran V, Kulandasamy A. Hybrid semantic deep learning architecture and optimal advanced encryption standard key management scheme for secure cloud storage and intrusion detection. Neural Comput Appl. 2021;33(21):14459–79. 10.1007/s00521-021-06085-5 . Search in Google Scholar

[68] Duo R, Nie X, Yang N, Yue C, Wang Y. Anomaly detection and attack classification for train real-time ethernet. IEEE Access. 2021;9:22528–41. 10.1109/ACCESS.2021.3055209 . Search in Google Scholar

[69] Thakkar A, Lohiya R. Role of swarm and evolutionary algorithms for intrusion detection system: A survey. Swarm Evol Comput. 2020;53(December 2019):100631. 10.1016/j.swevo.2019.100631 . Search in Google Scholar

[70] Vijayalakshmi S, Subha TD, Manimegalai L, Reddy ES, Yaswanth D, Gopinath S. A novel approach for IoT intrusion detection system using modified optimizer and convolutional neural network. 6th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2022 - Proceedings; 2022. p. 180–6. 10.1109/I-SMAC55078.2022.9987314 . Search in Google Scholar

[71] Om Kumar CU, Marappan S, Murugeshan B, Beaulah PMR. Intrusion detection model for IoT using recurrent Kernel convolutional neural network. Wirel Pers Commun. 2023;129(2):783–812. 10.1007/s11277-022-10155-9 . Search in Google Scholar

[72] Al Sawafi Y, Touzene A, Hedjam R. Hybrid deep learning-based intrusion detection system for RPL IoT networks. J Sens Actuator Netw. 2023;12(2):13491–520. 10.3390/jsan12020021 . Search in Google Scholar

[73] Lateef AAA, Al-Janabi STF, Al-Khateeb B. Hybrid intrusion detection system based on deep learning. 2020 International Conference on Data Analytics for Business and Industry: Way Towards a Sustainable Economy, ICDABI 2020; 2020. 10.1109/ICDABI51230.2020.9325669 . Search in Google Scholar

[74] Keserwani PK, Govil MC, Pilli ES. An effective NIDS framework based on a comprehensive survey of feature optimization and classification techniques. Neural Comput Appl. 2023;35(7):4993–5013. 10.1007/s00521-021-06093-5 . Search in Google Scholar

[75] Almaghthawi Y, Ahmad I, Alsaadi FE. Performance analysis of feature subset selection techniques for intrusion detection. Mathematics. 2022;10(24):4745. 10.3390/math10244745 . Search in Google Scholar

[76] Karatas G, Demir O, Sahingoz OK. A deep learning based intrusion detection system on GPUs. Proceedings of the 11th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2019; 2019. 10.1109/ECAI46879.2019.9042132 . Search in Google Scholar

[77] Gorzałczany MB, Rudzinski F. Intrusion detection in Internet of Things with MQTT protocol - An accurate and interpretable genetic-fuzzy rule-based solution. IEEE Internet Things J. 2022;9(24):24843–55. 10.1109/JIOT.2022.3194837 . Search in Google Scholar

[78] Soni M, Singhal M, Jatin, Katarya R. Optimizing deep neural network using enhanced artificial bee colony algorithm for an efficient intrusion detection system. 2022 2nd International Conference on Intelligent Technologies, CONIT 2022; 2022. p. 1–7. 10.1109/CONIT55038.2022.9848014 . Search in Google Scholar

[79] Mahboob AS, Shahhoseini HS, Ostadi Moghaddam MR, Yousefi S. A coronavirus herd immunity optimizer for intrusion detection system. 2021 29th Iranian Conference on Electrical Engineering, ICEE 2021; 2021. p. 579–85. 10.1109/ICEE52715.2021.9544165 . Search in Google Scholar

[80] Kalaivani S, Vikram A, Gopinath G. An effective swarm optimization based intrusion detection classifier system for cloud computing. 2019 5th International Conference on Advanced Computing and Communication Systems, ICACCS 2019; 2019. p. 185–8. 10.1109/ICACCS.2019.8728450 . Search in Google Scholar

[81] Davahli A, Shamsi M, Abaei G. Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks. J Ambient Intell Humaniz Comput. 2020;11(11):5581–609. 10.1007/s12652-020-01919-x . Search in Google Scholar

[82] Swarna Priya RM, Maddikunta PKR, Koppu S, Gadekallu TR, Chowdhary CL, et al. An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Comput Commun. 2020;160(June):139–49. 10.1016/j.comcom.2020.05.048 . Search in Google Scholar

[83] Kunhare N, Tiwari R, Dhar J. Intrusion detection system using hybrid classifiers with meta-heuristic algorithms for the optimization and feature selection by genetic algorithm. Computers Electr Eng. 2022;103(September):108383. 10.1016/j.compeleceng.2022.108383 . Search in Google Scholar

[84] Aljanabi M, Hayder R, Talib S, Ali AH, Mohammed MA, Sutikno T. Distributed denial of service attack defense system-based auto machine learning algorithm. Bull Electr Eng Inform. 2023;12(1):544–51. 10.11591/eei.v12i1.4537 Search in Google Scholar

[85] Mijwil M, Aljanabi M. Towards artificial intelligence-based cybersecurity: the practices and ChatGPT generated ways to combat cybercrime. Iraqi J Computer Sci Math. 2023;4(1):65–70. 10.52866/ijcsm.2023.01.01.0019 Search in Google Scholar

[86] Mijwil M, Filali Y, Aljanabi M, Bounabi M, Al-Shahwani H. The purpose of cybersecurity governance in the digital transformation of public services and protecting the digital environment. Mesopotamian J Cybersecur. 2023;2023:1–6. 10.58496/MJCS/2023/001 Search in Google Scholar

[87] Yaseen MG, Aljanabi M, Ali AH, Abd SA. Current cutting-edge research in computer science. Mesopotamian J Computer Sci. 2022;2022:1–4. 10.58496/MJCSC/2022/001 Search in Google Scholar

[88] Ali AH, Yaseen MG, Aljanabi M, Abed SA, et al. Transfer learning: A new promising techniques. Mesopotamian J Big Data. 2023;2023:31–2. 10.58496/MJBD/2023/004 Search in Google Scholar

[89] Li K, Zhang Y, Wang S. An intrusion detection system based on PSO-GWO hybrid optimized support vector machine. Proceedings of the International Joint Conference on Neural Networks; 2021-July, 2021. p. 1–7. 10.1109/IJCNN52387.2021.9534325 . Search in Google Scholar

[90] Alhajjar E, Maxwell P, Bastian N. Adversarial machine learning in network intrusion detection systems. Expert Syst Appl. 2021;186(August):115782. 10.1016/j.eswa.2021.115782 . Search in Google Scholar

[91] Khaleel MK, Ismail MA, Yunan U, Kasim S. Review on intrusion detection system based on the goal of the detection system. Int J Integr Eng. 2018. 10.30880/ijie.2018.10.06.028 Search in Google Scholar

[92] Mohammed MA, Hasan RA, Ahmed MA, Tapus N, Shanan MA, Khaleel MK, et al. A focal load balancer based algorithm for task assignment in cloud environment. In 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE; 2018. p. 1–4. 10.1109/ECAI.2018.8679043 Search in Google Scholar

[93] Ali AH, Aljanabi M, Ahmed MA. Fuzzy generalized Hebbian algorithm for large-scale intrusion detection system. Int J Integr Eng. 2020;12(1):81–90. 10.30880/ijie.2020.12.01.008 Search in Google Scholar

[94] Al-Janabi M, Ismail MA. Improved intrusion detection algorithm based on TLBO and GA algorithms. Int Arab J Inf Technol. 2021;18(2):170–9. 10.34028/iajit/18/2/5 Search in Google Scholar

[95] Abd SN, Alsajri M, Ibraheem HR. Rao-SVM machine learning algorithm for intrusion detection system. Iraqi J Computer Sci Math. 2020;1(1):23–7. 10.52866/ijcsm.2019.01.01.004 Search in Google Scholar

[96] Ali AH, Abdullah MZ, Abdul-wahab SN, Alsajri M. A brief review of big data analytics based on machine learning. Iraqi J Computer Sci Math. 2020;1(2):13–5. 10.52866/ijcsm.2020.01.02.002 Search in Google Scholar

[97] Aljanabi M, Abd-Alwahab SN, Saedudin R, Ebraheem HR, Defni, Hadi R, et al. Cloud computing issues, challenges, and needs: A survey. JOIV: Int J Inform Vis. 2021;5(3):298–305. 10.30630/joiv.5.3.671 Search in Google Scholar

© 2024 the author(s), published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

  • X / Twitter

Supplementary Materials

Please login or register with De Gruyter to order this product.

Journal of Intelligent Systems

Journal and Issue

Articles in the same issue.

research on intrusion detection system

Grab your spot at the free arXiv Accessibility Forum

Help | Advanced Search

Computer Science > Cryptography and Security

Title: extending network intrusion detection with enhanced particle swarm optimization techniques.

Abstract: The present research investigates how to improve Network Intrusion Detection Systems (NIDS) by combining Machine Learning (ML) and Deep Learning (DL) techniques, addressing the growing challenge of cybersecurity threats. A thorough process for data preparation, comprising activities like cleaning, normalization, and segmentation into training and testing sets, lays the framework for model training and evaluation. The study uses the CSE-CIC-IDS 2018 and LITNET-2020 datasets to compare ML methods (Decision Trees, Random Forest, XGBoost) and DL models (CNNs, RNNs, DNNs, MLP) against key performance metrics (Accuracy, Precision, Recall, and F1-Score). The Decision Tree model performed better across all measures after being fine-tuned with Enhanced Particle Swarm Optimization (EPSO), demonstrating the model's ability to detect network breaches effectively. The findings highlight EPSO's importance in improving ML classifiers for cybersecurity, proposing a strong framework for NIDS with high precision and dependability. This extensive analysis not only contributes to the cybersecurity arena by providing a road to robust intrusion detection solutions, but it also proposes future approaches for improving ML models to combat the changing landscape of network threats.
Subjects: Cryptography and Security (cs.CR)
Cite as: [cs.CR]
  (or [cs.CR] for this version)
  Focus to learn more arXiv-issued DOI via DataCite
: Focus to learn more DOI(s) linking to related resources

Submission history

Access paper:.

  • Other Formats

license icon

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

  • Intrusion Detection
  • Computer Science
  • Computer Security and Reliability
  • Intrusion Detection System

Network Intrusion Detection Systems: A Systematic Literature Review of Hybrid Deep Learning Approaches

Stephen Kahara Wanjau at Murang'a University of Technology

  • Murang'a University of Technology

Geoffrey Wambugu at Murang'a University of Technology, Kenya

  • Murang'a University of Technology, Kenya

Aaron Mogeni Oirere at Murang’a University of Technology

  • Murang’a University of Technology

Discover the world's research

  • 25+ million members
  • 160+ million publication pages
  • 2.3+ billion citations
  • COMPUT NETW

Ahmed Burhan Mohammed

  • Ahmed M. Fakhrudeen
  • D D V Sivaram Rolangi
  • D. Lalitha Bhaskari
  • Dr. Kannan Balasubramanian
  • Dr. C Kiranmai
  • B Sneha Yesshaswi

Prakash Somasundaram

  • V S Mohan Kumar
  • Anny Leema A
  • Rohith Muralidharan
  • Neenu Kuriakose
  • Sangeetha J
  • Srivalli Bojja
  • Thoti. Sasikala
  • Kanusu Srinivasa Rao
  • B. Reddaiah
  • Bodi. Susheel Kumar

Tsega Asresa Mengistu

  • Zhipeng Liu
  • Addison Shaver

Kaushik Dutta Roy

  • ENG APPL ARTIF INTEL

Mudasir Ganaie

  • J SUPERCOMPUT

Abdulrahman Saad

  • INT J COMPUT INT SYS

Md Al-Imran

  • Misbah Anwer
  • Ghufran Ahmed

Adnan Akhunzada

  • Achmad Akbar Megantara
  • Tohari Ahmad

Wei Liang

  • Xiaobing Pei
  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

electronics-logo

Article Menu

research on intrusion detection system

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

A bibliometric review of intrusion detection research in iot: evolution, collaboration, and emerging trends.

research on intrusion detection system

1. Introduction

  • Comprehensive Overview of Research Trends: By analyzing publication trends from 2017 to 2023, our study provides a detailed overview of the growth and evolution of research in IoT intrusion detection. This helps in understanding how interest in this field has developed over time.
  • Visualization of Collaborative Networks: To analyze collaboration networks, examine the patterns of collaboration among researchers, institutions, and nations, and identify the research groups that have contributed the most in this field.
  • Keyword Analysis: To find out the most frequently used keywords in the field of IoT intrusion detection.
  • Emerging Trends and Future Directions: To identify emerging trends and technologies in the field of IoT intrusion detection, particularly focusing on the latest developments as of 2024. This provides valuable insights into future research directions and potential areas of innovation.

2. Methodology

2.1. data gathering, 2.2. search strategy, 2.3. analytical approach, 2.4. data visualization, 3. publication structure analysis, 3.1. analysis of publications year over year, 3.2. publications category, 3.3. source of publication, 3.4. productive organizations and researchers, 3.5. trends in countries, 3.6. popular research areas, 3.7. web of science categories and indexed publications, 3.8. funding agencies, 3.9. access type, 4. co-authorship analysis, 4.1. author-based co-authorship analysis, 4.2. organization-based co-authorship analysis, 4.3. country-based co-authorship analysis, 5. analysis of co-occurrence, 5.1. all keyword-based co-occurrence analysis, 5.2. author’s keyword-based co-occurrence analysis, 6. citation analysis, 6.1. documents-based citation analysis, 6.2. source-based citation analysis, 6.3. author-based citation analysis, 6.4. organization-based citation analysis, 6.5. country-based citation analysis, 7. burst detection analysis, 7.1. keyword burst detection, 7.1.1. trends from 2017–2023, 7.1.2. trends in 2024, 7.1.3. comparative analysis of keyword trends: 2017–2023 vs. 2024, 7.2. references burst detection, 7.2.1. trends from 2017–2023, 7.2.2. trends in 2024, 7.2.3. comparative analysis of reference trends: 2017–2023 vs. 2024, 8. conclusions and future directions.

  • From 2019 onwards, WoS published more than 200 articles pertaining to IoT intrusion detection.
  • The majority of these publications consist of research articles, accounting for 72.01%.
  • The majority of intrusion detection in IoT papers (80) from WoS were published in the journal IEEE Access.
  • The Egyptian Knowledge Bank (EKB) of Egypt has published the greatest number of papers, with a total of 49.
  • Moustafa N from Australia has authored the highest number of publications (19) on intrusion detection in IoT, serving as the first author.
  • Researchers from the USA published the greatest number of publications from 2018 to 2020. Since 2021, India has been the top source for publication output.
  • Computer science is the predominant field of research with the highest number of papers (893) on intrusion detection in IoT.
  • The majority of the WoS IoT intrusion detection publications (791) belong to the Science Citation Index Expanded (SCI-EXPANDED).
  • The majority of IoT intrusion detection publications in the WoS database are categorized under ‘Computer Science Information Systems’, with a total of 553 publications, followed closely by the category of ‘Engineering Electrical Electronic’, which has 465 publications.
  • The National Natural Science Foundation of China (NSFC) is the leading funding agency in IoT intrusion detection research, with a significant contribution of approximately 5.68%.
  • Approximately half of the total records consist of Open Access publications.
  • Kumar, Prabhat from India holds the highest co-authorship-based TLS of 16 with 12 co-author links and 16 publications.
  • The co-authorship-based TLS of Princess Nourah Bint Abdul Rahman University is the highest among all, with a score of 26. This university has established co-author linkages with 43 other organizations.
  • Saudi Arabia boasts the highest co-authorship-based TLS of 482, establishing strong collaborative connections with 44 other nations.
  • Intrusion Detection has the highest co-occurrence-based TLS of 482 with links to 489 other author-defined keywords indexed in WoS.
  • Intrusion detection has the highest co-occurrence-based TLS of 324 with links to 346 other author-defined IoT intrusion detection keywords.
  • IEEE Access has the maximum citation-based TLS of 558, with citation linkages to 2606 journals.
  • Moustafa, Nour (Australia) has the highest citation-based TLS of 668, with citation links to 1632 intrusion detection in IoT researchers.
  • The University of New South Wales (Australia) has the highest citation-based TLS (428), with citation links to 1327 institutions.
  • India has the highest citation-based TLS of 2651, with citation links to 3925 nations.
  • During 2022–2023 the keywords ‘deep neural network’, ‘network intrusion detection system’, ‘deep learning (dl)’, and ‘iot network’ obtained burst strengths of 4.03, 3.43, 3.43, and 2.57, respectively.
  • The document published by Chaabouni N. et al. [ 7 ] witnessed a burst strength of 16.08 during 2021–2023.
  • During 2021–2023, the National Institute of Technology (NIT System) and SRM Institute of Science and Technology Chennai witnessed burst strengths of 4.43 and 3.78, respectively.

9. Limitations, Scope, and Future Work

Author contributions, data availability statement, conflicts of interest.

  • Gyamfi, E.; Jurcut, A. Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets. Sensors 2022 , 22 , 3744. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Internet of Things (IoT) and Non-IoT Active Device Connections Worldwide from 2010 to 2025. Available online: https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide/ (accessed on 29 May 2024).
  • Sanju, P. Enhancing intrusion detection in IoT systems: A hybrid metaheuristics-deep learning approach with ensemble of recurrent neural networks. J. Eng. Res. 2023 , 11 , 356–361. [ Google Scholar ] [ CrossRef ]
  • Thakkar, A.; Lohiya, R.A. Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges. Arch. Comput. Methods Eng. 2021 , 28 , 3211–3243. [ Google Scholar ] [ CrossRef ]
  • Sharma, D.; Mittal, R.; Sekhar, R.; Shah, P.; Renz, M. A bibliometric analysis of cyber security and cyber forensics research. Results Control. Optim. 2023 , 10 , 100204. [ Google Scholar ] [ CrossRef ]
  • Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset. arXiv 2018 , arXiv:1811.00701. [ Google Scholar ] [ CrossRef ]
  • Chaabouni, N.; Mosbah, M.; Zemmari, A.; Sauvignac, C.; Faruki, P. Network Intrusion Detection for IoT Security Based on Learning Techniques. IEEE Commun. Surv. Tutor. 2019 , 21 , 2671–2701. [ Google Scholar ] [ CrossRef ]
  • Alsaedi, A.; Moustafa, N.; Tari, Z.; Mahmood, A.; Anwar, A. TON-IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access 2020 , 8 , 165130–165150. [ Google Scholar ] [ CrossRef ]
  • Ferrag, M.A.; Maglaras, L.; Moschoyiannis, S.; Janicke, H. Deep Learning for Cyber Security Intrusion Detection: Approaches, Datasets, and Comparative Study. J. Inf. Secur. Appl. 2019 , 50 , 102419. [ Google Scholar ] [ CrossRef ]
  • Moustafa, N.; Turnbull, B.; Choo, K.-K.R. An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things. IEEE Internet Things J. 2019 , 6 , 4815–4830. [ Google Scholar ] [ CrossRef ]
  • Pajouh, H.H.; Javidan, R.; Khayami, R.; Dehghantanha, A.; Choo, K.-K.R.A. Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks. IEEE Trans. Emerg. Top. Comput. 2019 , 7 , 314–323. [ Google Scholar ] [ CrossRef ]
  • Ullah, I.; Mahmoud, Q.H. Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks. IEEE Access 2021 , 9 , 103906–103926. [ Google Scholar ] [ CrossRef ]
  • Almi’ani, M.; Abughazleh, A.; Al-rahayfeh, A.; Atiewi, S.; Razaque, A. Deep Recurrent Neural Network For IoT Intrusion Detection System. Simul. Model. Pract. Theory 2019 , 101 , 102031. [ Google Scholar ] [ CrossRef ]
  • Swarna Priya, R.M.; Maddikunta, P.K.R.; Parimala, M.; Koppu, S.; Gadekallu, T.R.; Chowdhary, C.L.; Alazab, M. An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Comput. Commun. 2020 , 160 , 139–149. [ Google Scholar ] [ CrossRef ]
  • Verma, A.; Ranga, V. Machine Learning Based Intrusion Detection Systems for IoT Applications. Wirel. Pers. Commun. 2020 , 111 , 2287–2310. [ Google Scholar ] [ CrossRef ]
  • Diro, A.; Chilamkurti, N. Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener. Comput. Syst. 2018 , 82 , 761–768. [ Google Scholar ] [ CrossRef ]
  • Bogaz Zarpelão, B.; Miani, R.; Kawakani, C.; Alvarenga, S. A Survey of Intrusion Detection in I nternet of Things. J. Netw. Comput. Appl. 2017 , 84 , 25–37. [ Google Scholar ] [ CrossRef ]
  • Kolias, C.; Kambourakis, G.; Stavrou, A.; Voas, J. DDoS in the IoT: Mirai and Other Botnets. Computer 2017 , 50 , 80–84. [ Google Scholar ] [ CrossRef ]
  • Moustafa, N.; Slay, J. UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In Proceedings of the Military Communications and Information Systems Conference (MilCIS), Canberra, ACT, Australia, 10–12 November 2015; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015 , 17 , 2347–2376. [ Google Scholar ] [ CrossRef ]
  • Hodo, E.; Bellekens, X.; Hamilton, A.; Dubouilh, P.-L.; Iorkyase, E.; Tachtatzis, C.; Atkinson, R. Threat analysis of IoT networks using artificial neural network intrusion detection system. In Proceedings of the 2016 International Symposium on Networks, Computers and Communications (ISNCC), Yasmine Hammamet, Tunisia, 11–13 May 2016; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Ferrag, M.A.; Friha, O.; Hamouda, D.; Maglaras, L.; Janicke, H. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning. IEEE Access 2022 , 10 , 40281–40306. [ Google Scholar ] [ CrossRef ]
  • Maseer, Z.K.; Yusof, R.; Bahaman, N.; Mostafa, S.A.; Foozy, C.F.M. Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset. IEEE Access 2021 , 9 , 22351–22370. [ Google Scholar ] [ CrossRef ]
  • Otoum, Y.; Liu, D.; Nayak, A. DL-IDS: A deep learning–based intrusion detection framework for securing IoT. Trans. Emerg. Telecommun. Technol. 2022 , 33 , e3803. [ Google Scholar ] [ CrossRef ]
  • Anthi, E.; Williams, L.; Słowińska, M.; Theodorakopoulos, G.; Burnap, P. A Supervised Intrusion Detection System for Smart Home IoT Devices. IEEE Internet Things J. 2019 , 6 , 9042–9053. [ Google Scholar ] [ CrossRef ]

Click here to enlarge figure

AuthorPublished NamePublished OrganizationCountryRecord
Moustafa NMoustafa, NourAustralian Defense Force Academy University of New South Wales Sydney, Melbourne Genomics Health Alliance Univ New South Wales Canberra, ADFA Campbell Univ New South Wales UNSW Canberra Canberra Cyber Secur Cooperat Res Ctr CSCRC Univ New South Wales UNSW Canberra Univ New South Wales UNSWs UNSW Canberra Fayoum UniversityAustralia19
Kumar PKumar, Prabhat Kumar, P.Lappeenranta-Lahti University of Technology LUT National Institute of Technology Raipur National Institute of Technology Manipur Indian Institute of Technology (IIT)—Hyderabad Indian Institute of Technology (IIT)—Guwahati National Institute of Technology (NIT System) National Institute of Technology Patna Netaji Subhas University of Technology (East Campus) Texas A&M University SystemIndia16
Gupta GPGupta, Govind P. Gupta, GovindNational Institute of Technology Raipur, National Institute of Technology (NIT System), Jaypee Institute of Information Technology (JIIT), Indian Institute of Technology (IIT)—RoorkeeIndia14
Khan MAKhan, Muazzam A.Quaid I Azam University City Univ Sci and IT Agricultural University PeshawarPakistan14
Tripathi RTripathi, RakeshNational Institute of Technology Raipur National Institute of Technology (NIT System)India14
Kumar RKumar, RandhirNational Institute of Technology (NIT System) National Institute of Technology RaipurIndia13
Azrour MAzrour, Mourade Azrour, Mourad Mourade, AzrourCadi Ayyad University of Marrakech Moulay Ismail University of MeknesMorocco12
Guezzaz AGuezzaz, AzidineCadi Ayyad University of Marrakech Univ Cadi Ayyad Zohr Essaouira Cadi Ayyad Univ Ibn Zohr University of Agadir SCCAM TeamMorocco12
Ahmad JAhmad, Jawad
Ahmed, Jamil
Ahmad, Jamil
Ahmad, J. Ahmad
, Jeffrey
Ahmed, Jawad
Sch Comp Engn and Built Environm Edinburgh Napier University Coventry University Sylhet Agricultural University University of Engineering and Technology Taxila Hazara University Isra Univ Isra Univ Hyderabad University of Peshawar Glasgow Caledonian University Avanture Bytes Chenab Coll Engn and Technol DATEV eG Hazara Univ Mansehra Quaid e Azam Univ Islamabad Kohat University of Science and Technology Balochistan University of Information Technology, Engineering and Management Sciences BUITEMS Rehman Med Coll University of Malakand Aga Khan University National University of Sciences and Technology—Pakistan Bennett Univ Poole Hosp NHS Trust University of Aberdeen Pakistan Atom Energy Commiss Salisbury District Hospital Bahauddin Zakariya University HITEC Univ Taxila NITEC University Tehsil Head Quarter Hosp Sichuan University Abasyn Univ PMC Guy’s and St Thomas’ NHS Foundation Trust University of Engineering and Technology Peshawar Western University (University of Western Ontario) Pakistan Institute of Engineering and Applied Science Dow University of Health Sciences Univ Coll Agr Univ Informat Technol Engn and Management Sci Iqra University Caboolture Hosp Centre National de la Recherche Scientifique (CNRS) Jinnah Hosp Quaid I Azam University Bolan Med Coll Isra Univ Hosp Bolan Med Coll Quetta PMRC Res Ctr BMCHPeople R China11
Research AreaArticleProceeding PaperReview Article
Computer Science60922529
Engineering40511335
Telecommunication21813614
Chemistry104 7
Instruments and Instrumentation7816
Physics80 3
Material Science6611
Science Technology Other Topics4134
Automation Control System3551
Mathematics147
RankCountryAuthorNpLinksTLS
1IndiaKumar, Prabhat161216
2IndiaTripathi, Rakesh141014
3AustraliaMoustafa, Nour181313
4IndiaGupta, Govind P.141013
5MoroccoAzrour, Mourade12412
6MoroccoBenkirane, Said12412
7MoroccoGuezzaz, Azidine12412
8UKAhmad, Jawad11911
9IndiaKumar, Randhir111211
10AlgeriaFerrag, Mohammed Amine10610
11USAAlsmadi, Izzat858
12PakistanKhan, Muazzam A.686
13EnglandMaglaras, Leandros646
14CanadaMahmoud, Qusay H.646
15CanadaUllah, Imtiaz716
RankOrganizationCountryNpLinksTLS
1Princess Nourah Bint Abdul Rahman UniversitySaudi Arabia264326
2Prince Sattam Bin Abdulaziz UniversitySaudi Arabia263223
3King Khalid UniversitySaudi Arabia182416
4Prince sultan UniversitySaudi Arabia152215
5Vellore Institute of TechnologyIndia212113
6Edinburgh Napier UniversityUK181812
7Ummul Al Qura UniversitySaudi Arabia132011
8Cadi Ayyad UniversityMorocco12311
9King Abdulaziz UniversitySaudi Arabia241511
10Moulay Ismail University MeknesMorocco11311
RankCountryNpLinksTLS
1Saudi Arabia20044139
2India2564694
3People r China1744187
4Pakistan863781
5England783564
6Australia832860
7USA1343459
8Malaysia553346
9Egypt542541
10Canada692231
11United Arab Emirates372230
12South Korea512429
13Jordan382228
14Algeria241920
15Taiwan281720
RankKeywordNpLinksTLS
1Intrusion Detection241489482
2Internet233360355
3Machine Learning227306305
4Internet of Things211303303
5IoT211297295
6Deep Learning216254254
7Security222250250
8Intrusion Detection System215240236
9Anomaly Detection194188187
10Things196182182
11Internet of Things (IoT)144118117
12Ids1308686
13Cybersecurity1378383
RankKeywordNpLinksTLS
1Intrusion Detection169346324
2Machine Learning166306305
3Internet of Things153303300
4Deep Learning156254251
5IoT125197195
6Intrusion Detection System131177170
7Anomaly Detection116131128
8Security126129128
9Internet of Things (IoT)99118113
10Cybersecurity958078
11Feature Selection728078
12Ids857876
13Network Security746666
14Intrusion Detection System (IDs)726361
15IoT security626451
RankTitle of ArticleSourceAuthorsYearCitationLink
1Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset [ ]Future Generation Computer SystemsNickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, and Benjamin Turnbull2019605142
2Network Intrusion Detection for IoT Security Based on Learning Techniques dataset [ ]IEEE Communications Surveys and TutorialsN. Chaabouni, M. Mosbah, A. Zemmari, C. Sauvignac, and P. Faruki201937371
3TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems dataset [ ]IEEE AccessA. Alsaedi, N. Moustafa, Z. Tari, A. Mahmood, and A. Anwar202020261
4Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
dataset [ ]
Journal of Information
Security and Applications
Mohamed Amine Ferrag, Leandros Maglaras, Sotiris Moschoyiannis, and Helge Janicke202039360
5An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things dataset [ ]IEEE Internet of Things JournalN. Moustafa, B. Turnbull, and K. -K. R. Choo201923845
6A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks [ ]IEEE Transactions on Emerging Topics in ComputingH. H. Pajouh, R. Javidan, R. Khayami, A. Dehghantanha, and K. -K. R. Choo201923242
7Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks [ ]IEEE AccessUllah and Q. H. Mahmoud202110821
8Deep recurrent neural network for IoT intrusion detection system
[ ]
Simulation Modelling Practice and TheoryMuder Almiani, Alia AbuGhazleh, Amer Al-Rahayfeh, Saleh Atiewi, and Abdul Razaqu202016333
9An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture [ ]Computer CommunicationsSwarna Priya R.M., Praveen Kumar Reddy Maddikunta, Parimala M., Srinivas Koppu, Thippa Reddy Gadekallu, Chiranji Lal Chowdhary, and Mamoun Alazab202023131
10Machine Learning Based Intrusion Detection Systems for IoT Applications [ ]Wireless Personal CommunicationsVerma, A., Ranga, V.202013931
RankSourceNpLinksCitationTLS
1IEEE Access 80 62 2606 558
2Sensors 79 62 1460 538
3Electronics 46 57 894 283
4Future Generation Computer Systems—The International Journal of eScience 16 53 1094 257
5Applied Sciences—Basel 32 42 427 199
6Internet of Things 19 38 137 124
7Computers and Security 26 38 365 119
8Computer Networks 15 43 368 118
9Cmc—Computer Materials and Continua 35 42 259 115
10Computer Communications 14 39 475 102
RankAuthorCountryNpCitationLinksTLS
1Moustafa, NourAustralia181632173668
2Kumar, PrabhatIndia1688195442
3Tripathi, RakeshIndia1489492432
4Gupta, Govind P.India1489692424
5Ferrag, Mohammed AmineAlgeria101203117362
6Turnbull, BenjaminAustralia4932148362
7Maglaras, LeandrosEngland694598291
8Koroniotis, NickolaosAustralia3626121289
9Kumar, RandhirIndia1153549285
10Janicke, HelgeAustralia569587232
RankOrganizationCountryNpCitationLinksTLS
1University New South WalesAustralia13132793428
2Guelma UniversityAlgeria9118777283
3National Institute TechnologyIndia2290270265
4De Montfort UniversityUK694571232
5Princess Nourah Bint Abdul Rahman UniversitySaudi Arabia2621473229
6Vellore Institute of TechnologyIndia2152470221
7University of Texas San AntonioUSA1167571203
8King Saud UniversitySaudi Arabia1635268195
9Prince Sattam Bin Abdulaziz UniversitySaudi Arabia2619472194
10Edinburgh Napier UniversityUK1833177191
RankCountryNpCitationLinksTLS
1India2563925632651
2Saudi Arabia2002598592383
3Australia833990582152
4People’s Republic of China1743452611820
5USA1342813591452
6England783029571390
7Pakistan861089591094
8Canada69200758930
9Egypt5478757779
10Algeria24144955681
RankKeywordYearStrengthBeginEnd
1deep neural network20194.0320222023
2neural networks20173.7520172021
3network intrusion detection system20223.4320222023
4deep learning (dL)20223.4320222023
5computer crime20213.2220212023
6support vector machine20193.2120202021
7edge computing20203.1220202021
8ddos attack20213.0820212021
9big data20192.7720212023
10network traffic20202.7320202021
11iot network20222.5720202023
12machine learning (mL)20212.4720212023
13fog computing20192.3720212021
14smart cities20202.3420202021
15genetic algorithm20192.2220192021
RankKeywordStrengthBeginEnd
1intrusion detection system3AprilApril
2feature selection2.74MarchJune
3feature extraction2.34FebruaryFebruary
RankInstitutionYearStrengthBeginEnd
1Diro AA, 2018, Future Gener Comp Sy, V82, P761 [ ]201820.4820202021
2Chaabouni N, 2019, IEEE Commun Surv Tut, V21, P2671 [ ]201916.0820212023
3Zarpelao BB, 2017, J Netw Comput Appl, V84, P25 [ ]201716.0720192021
4Kolias C, 2017, Computer, V50, P80 [ ]201712.6920192020
5Nour, 2015, 2015 MIL Comm INF Sy, V0, PP1 [ ]20157.3920182019
6Al-Fuqaha A, 2015, IEEE Commun Surv Tut, V17, P2347 [ ]20153.120172019
7Hodo E, 2016, 2016 International Symposium On Networks, P1 [ ]20163.120172019
RankReferencesYearStrengthBeginEnd
1Alsaedi A, 2020, IEEE Access, V8, P165130 [ ]20203.27MayJune
2Ferrag MA, 2022, IEEE Access, V10, P4028 [ ]20223.01MayJune
3Maseer ZK, 2021, IEEE Access, V9, P22351 [ ]20212.31AprilApril
4Otoum Y, 2022, T Emerg Telecommun T, V33, P0 [ ]20222.31AprilApril
5Anthi E, 2019, IEEE Internet Things, V6, P9042 [ ]20192.16FebruaryFebruary
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Goranin, N.; Hora, S.K.; Čenys, H.A. A Bibliometric Review of Intrusion Detection Research in IoT: Evolution, Collaboration, and Emerging Trends. Electronics 2024 , 13 , 3210. https://doi.org/10.3390/electronics13163210

Goranin N, Hora SK, Čenys HA. A Bibliometric Review of Intrusion Detection Research in IoT: Evolution, Collaboration, and Emerging Trends. Electronics . 2024; 13(16):3210. https://doi.org/10.3390/electronics13163210

Goranin, Nikolaj, Simran Kaur Hora, and Habil Antanas Čenys. 2024. "A Bibliometric Review of Intrusion Detection Research in IoT: Evolution, Collaboration, and Emerging Trends" Electronics 13, no. 16: 3210. https://doi.org/10.3390/electronics13163210

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Federated Deep Learning Models for Intrusion Detection in IoT

New citation alert added.

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

Information & Contributors

Bibliometrics & citations, index terms.

Security and privacy

Intrusion/anomaly detection and malware mitigation

Intrusion detection systems

Recommendations

Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial iot networks: a survey.

The industrial internet of things (IIoT) is an evolutionary extension of the traditional Internet of Things (IoT) into processes and machines for applications in the industrial sector. The IIoT systems generate a large amount of private and ...

Collaborative Botnet Detection in Heterogeneous Devices of Internet of Things using Federated Deep Learning

This research introduces a pioneering approach, termed Hierarchical Collaborative Botnet Detection, leveraging Federated Deep Learning to address the escalating security concerns within the Internet of Things (IoT) ecosystems characterized by ...

Deep Learning in IoT Intrusion Detection

The Internet of Things (IoT) is the new paradigm of our times, where smart devices and sensors from across the globe are interconnected in a global grid, and distributed applications and services impact every area of human activity. With its huge ...

Information

Published in.

cover image ACM Other conferences

Association for Computing Machinery

New York, NY, United States

Publication History

Permissions, check for updates, author tags.

  • Deep learning
  • Federated learning
  • Intrusion detection
  • Research-article
  • Refereed limited

Contributors

Other metrics, bibliometrics, article metrics.

  • 0 Total Citations
  • 0 Total Downloads
  • Downloads (Last 12 months) 0
  • Downloads (Last 6 weeks) 0

View Options

Login options.

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

View options.

View or Download as a PDF file.

View online with eReader .

HTML Format

View this article in HTML Format.

Share this Publication link

Copying failed.

Share on social media

Affiliations, export citations.

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

research on intrusion detection system

  • Tips & How-To
  • Newsletters
  • White Papers
  • .NET Tips and Tricks

The Data Science Lab

  • Practical .NET
  • The Practical Client
  • Data Driver
  • PDF Back Issues
  • HTML Issue Archive
  • Code Samples
  • Agile/Scrum
  • Open Source
  • Cross-Platform C#
  • Mobile Corner
  • Live! Video

research on intrusion detection system

  • Visual Studio
  • Visual Studio Code
  • Blazor/ASP.NET
  • C#/VB/TypeScript
  • Xamarin/Mobile
  • AI/Machine Learning

research on intrusion detection system

Artificial Immune Systems for Intrusion Detection Using C#

Dr. James McCaffrey from Microsoft Research presents a demonstration program that models biological immune systems to identify network intrusion threats. The demo illustrates challenges with artificial immune systems as well as promising new approaches.

  • By James McCaffrey

An artificial immune system (AIS) for intrusion detection is a software system that loosely models some parts of the behavior of the human immune system to protect computer networks from viruses and similar cyber-attacks.

This article presents a demo program that illustrates the main ideas of artificial immune systems. The demo is not a practical system for intrusion detection. The demo is intended to help you understand how commercial systems work.

The best way to see where this article is headed is to take a look at the screenshot of the demo program in Figure 1 . The demo program begins by loading a set of six normal data patterns:

These patterns represent normal, non-threat incoming TCP/IP network packets in binary form. This is called the self-set in AIS terminology. Of course, in a real AIS system, the self-set would likely contain tens or hundreds of thousands of patterns and each pattern would be much larger (typically 48-256 bits) than the 12 bits used in the demo.

Next the demo creates three artificial lymphocytes:

Each lymphocyte has a simulated antibody that has four bits (again artificially small), and an age and a stimulation field. The antibody is essentially a detector of patterns that are suspicious. The lymphocytes are created so that none of them detect any of the patterns in the self-set. For example, lymphocyte [0] has antibody = 1111 but none of the six items in the self-set has four consecutive 1s.

Figure 1: Artificial Immune System Demo

After the system has been initialized, the demo program begins a tiny simulation with six input patterns. The first incoming pattern is:

The incoming pattern is detected by the antibody in lymphocyte [0] because the incoming pattern has "1111." The incoming pattern is also detected by lymphocyte [1] ("1000") and lymphocyte [2] ("1110"). A single detection does not trigger an alert by a lymphocyte. Instead, each lymphocyte has a threshold number of detections that must be reached before an alert is triggered. The demo lymphocytes all have a threshold of 3.

The second incoming pattern is:

The incoming pattern is not detected by lymphocyte [0] so its stimulation value stays at 1. The incoming pattern is detected by lymphocytes [1] and [2] so both of their stimulation values increment to 2.

The third incoming pattern is:

The incoming pattern is detected by lymphocyte [1] so its stimulation value is incremented to 3 and an alert is triggered that the incoming pattern is suspicious and should be examined.

The final, fourth incoming pattern is:

The incoming pattern is detected by lymphocyte [2], so its stimulation reaches the threshold value of 3, and an alert is triggered.

This article assumes you have at least intermediate level programming skill with a C-family language, preferably C#, but does not assume you know anything about artificial immune systems.

The code for the demo program is a bit too long to be presented in its entirety in this article. The complete code is available in the accompanying file download, and is also available online .

The Human Immune System The key elements of the human immune system are illustrated in Figure 2 . Harmful items are proteins called antigens. In the figure, the antigens are colored red and have sharp corners. The human body also contains many non-harmful antigens called self-antigens, or just self-items. These are naturally occurring proteins and in the figure are colored green and have rounded sides.

Antigens are detected by lymphocytes. Each lymphocyte has several antibodies which can be thought of as detectors. Each antibody is specific to a particular antigen. Typically, because antibody-antigen matching is only approximate, a lymphocyte will not trigger a reaction when a single antibody detects a single antigen. Only after several antibodies detect their corresponding antigens will a lymphocyte become stimulated and trigger some sort of defensive reaction.

Figure 2: Simplified Immune System

Notice that no lymphocyte has antibodies that detect a self-item. Real antibodies are generated by the immune system in the thymus, but any antibodies which detect self are destroyed before being released into the blood stream, a process called apoptosis.

In terms of an intrusion detection system, antigens correspond to TCP/IP network packets that indicate the content contains some sort of harmful data, such as a computer virus. Self-antigens correspond to normal, non-harmful network packets. An antibody corresponds to a bit pattern that approximately matches an unknown, potentially harmful network packet. A lymphocyte represents two or more antibodies/detectors. Apoptosis is modeled using a technique called negative selection.

Overall Program Structure I used Visual Studio 2022 (Community Free Edition) for the demo program. I created a new C# console application and checked the "Place solution and project in the same directory" option. I specified .NET version 8.0. I named the project ArtificialImmuneSystem. I checked the "Do not use top-level statements" option to avoid the program entry point shortcut syntax.

The demo has no significant .NET dependencies and any relatively recent version of Visual Studio with .NET (Core) or the older .NET Framework will work fine. You can also use the Visual Studio Code program if you like.

After the template code loaded into the editor, I right-clicked on file Program.cs in the Solution Explorer window and renamed the file to the slightly more descriptive ArtificialImmuneSystemProgram.cs. I allowed Visual Studio to automatically rename class Program.

The overall program structure is presented in Listing 1 . All the control logic of the demo simulation is in the Main() method. All of the lymphocyte and antibody functionality is in a Lymphocyte class.

Listing 1: Artificial Immune System Demo Program Structure

The demo program begins by setting up the parameters for the simulation:

The Random object is used to generate random incoming bit patterns. The meaning of the other parameters should be clear from their names.

Creating the Self-Set and the Lymphocytes The Main() method creates the self-set of historical, non-threat patterns using these statements:

The LoadSelfSet() function has six hard-coded patterns where each pattern is an array of char values:

In a non-demo scenario, the self-set would be loaded from a text file, or perhaps be supplied by some other system. The demo uses arrays of type char, but there are several other ways to represent the patterns.

The Lymphocyte objects are created like so:

The Lymphocytes are created so that none of them detect any of the patterns in the self-set. This is called negative selection. Each Lymphocyte object has an antibody which has length (4) that is less than the length of the patterns in the self-set and the length of incoming patterns (both 12). This is called r-chunks detection.

The Simulation The artificial immune system simulation is essentially a while-loop:

An incoming pattern is an array of 12 random "0" or "1" characters. Each of the three Lymphocyte objects in the lymphocyteSet List collection is examined:

The critical code occurs in the Lymphocyte.Detects() method. If a Lymphocyte detects the current incoming pattern, the Lymphocyte's stimulation counter is increments. If the new stimulation value reaches the simulation threshold value, and an alert is triggered:

The demo program does not use the Lymphocyte age field. Some non-demo AIS systems kill off a simulated lymphocytes if it reaches a maximum age, or if the lymphocyte's stimulation value hasn't changed over a specified length of simulation time steps, or if the lymphocyte has triggered a specified number of consecutive alerts.

The Lymphocyte Detects() Method In a non-demo artificial immune system, the length of the incoming bit patterns can be very large, and the length of simulated antigens can be large too. Therefore, it's important to use an efficient algorithm to determine if the simulated antigen pattern, such as "1000," is contained in an incoming pattern such as "111011111000."

  • « previous
  • next »

Printable Format

research on intrusion detection system

Microsoft Spotlights .NET 9, Cloud in First Visual Studio 2022 v17.12 Preview

With Visual Studio 2022 v17.11 shipping this week, the first preview of the next edition sees Microsoft emphasizing support for the coming .NET 9 and cloud development with Aspire.

research on intrusion detection system

Visual Studio 2022 v17.11 Ships 'Shaped by Your Feedback' (and AI)

Microsoft's Mads Kristensen heavily emphasized the community contributions that helped the dev team ship the brand-new Visual Studio 2022 version 17.11, which includes new features, improvements and fixes across the board spawned from the ideas of users.

research on intrusion detection system

Building and Deploying a .NET 9 App Using Azure, Bicep and GitHub Actions

.NET 9 is coming in November, so here is help in how to build and deploy a modern .NET 9 app using cloud and DevOps tools.

research on intrusion detection system

VSLive! Dev Conference Tip Leads to New IDE Extension: Sql Formatter

"During the VS Live conference last week, it was brought to my attention that Visual Studio has no support for formatting SQL files."

  • Most Popular Articles
  • Most Emailed Articles

'GitHub Models' AI Playground Debuts with Llama 3.1, GPT-4o and More

With .net 6 support ending, security vulnerabilities loom, semantic kernel ai sdk gets autonomous agents (experimental).

research on intrusion detection system

Subscribe on YouTube

Visual Studio Magazine Readers Choice Awards

Upcoming Training Events

research on intrusion detection system

Free Webcasts

  • Myths and Realities in Telemetry Data Handling
  • How .NET MAUI Changes the Cross-Platform Game Summit
  • MoneyTree Achieves Compliance and Speeds Innovation with AWS and Sumo Logic
  • Best Practices for AWS Monitoring

> More Webcasts

research on intrusion detection system

Intrusion Detection System Based on ViTCycleGAN and Rules

  • Conference paper
  • First Online: 13 August 2024
  • Cite this conference paper

research on intrusion detection system

  • Menghao Fang 10 ,
  • Xia Li 11 ,
  • Yuanyuan Wang 12 ,
  • Qiuxuan Wang 13 ,
  • Xinlei Sun 14 &
  • Shuo Zhang 11  

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14864))

Included in the following conference series:

  • International Conference on Intelligent Computing

10 Accesses

This paper explores the application of deep learning techniques in the field of intrusion detection and its potential problems. Possible challenges of deep learning in intrusion detection include handling the imbalance between positive and negative samples, which leads to unstable model performance in distinguishing normal and abnormal traffic. To address this issue, the paper proposes combining deep learning-based intrusion detection techniques with a rule-based approach to enhance the system's adaptability and intelligence. The specific scheme includes four Vision Transformer models, two generators, and two discriminators. The discriminators are used to differentiate normal traffic and detect abnormal behaviors, following strict detection rules to reach a final determination. Through validation on the NSL-KDD dataset and CIC-DDOS2019 dataset, the proposed scheme achieves accuracies of 98.32% and 99.23%, respectively, providing new research insights and solutions in the field of intrusion detection.

M. Fang, X. Li—These authors contributed equally to this work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Jin, K., Ye, D.: Optimal innovation-based stealthy attacks in networked LQG systems with attack cost. IEEE Trans. Cybern. 54 (2), 787–796 (2024)

Article   Google Scholar  

Hwang, R.-H., Lee, C.-L., Lin, Y-D., Po-Chin Lin, Hsiao-Kuang Wu, Yuan-Cheng Lai, C.K. Chen,

Google Scholar  

Quincozes, S.E., Raniery, C., Nunes, R.C., Albuquerque, C., Passos, D., Mossé, D.: Counselors network for intrusion detection. Int. J. Netw. Manag. 31 (3), May/June 2021

Host-based intrusion detection with multi-datasource and deep learning. J. Inf. Secur. Appl. 78 (2023),103625, ISSN 2214-2126

Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Houlsby, N.: An image is worth 16x16 words: transformers for image recognition at scale (2020)

Zhu, J.-Y., Park, T., Isola, P., Efros, A.A.: Unpaired image-to-image translation using cycle-consistent adversarial networks. In: 2017 IEEE International Conference on Computer Vision (ICCV), Venice, Italy, pp. 2242–2251 (2017)

https://www.unb.ca/cic/datasets/ddos-2019.html

https://www.unb.ca/cic/datasets/nsl.html

S.V. Pingale, Sanjay R. Sutar,Remora whale optimization-based hybrid deep learning for network intrusion detection using CNN features,Expert Systems with Applications,Volume210,2022,118476,ISSN,0957–4174,

Sheikhan, M., Jadidi, Z., Farrokhi, A.: Intrusion detection using reduced-size RNN based on feature grouping. Neural Comput. & Applic. 21 , 1185–1190 (2012)

Giuseppina Andresini, Annalisa Appice, Luca De Rose, Donato Malerba,GAN augmentation to deal with imbalance in imaging-based intrusion detection,Future Generation Computer Systems,Volume 123,2021,Pages 108–127,ISSN 0167–739X

Laghrissi, F., Douzi, S., Douzi, K., et al.: IDS-attention: an efficient algorithm for intrusion detection systems using attention mechanism. J Big Data 8 , 149 (2021)

Naik, N., Diao, R., Shen, Q.: Dynamic Fuzzy Rule Interpolation and Its Application to Intrusion Detection. IEEE Trans. Fuzzy Syst. 26 (4), 1878–1892 (2018)

Andresini, G., Appice, A., Malerba, D.: Autoencoder-based deep metric learning for network intrusion detection. Inf. Sci. 569 , 706–727 (2021). ISSN 0020–0255

Subham Kumar Gupta, Meenakshi Tripathi, Jyoti Grover,Hybrid optimization and deep learning based intrusion detection system,Computers and Electrical Engineering,Volume100,2022,107876,ISSN00457906

P Rajesh Kanna, P Santhi,Unified Deep Learning approach for Efficient Intrusion Detection System using Integrated Spatial–Temporal Features,Knowledge-Based Systems,Volume226,2021,107132,ISSN09507051

Download references

Author information

Authors and affiliations.

School of Cyber Science and Engineering, University of International Relations, Beijing, 100091, China

Menghao Fang

Marine Engineering College, Dalian Maritime University, Liaoning, 116026, China

Xia Li & Shuo Zhang

School of Mathematics and Statistics, Anyang Normal University, Anyang, 455099, China

Yuanyuan Wang

Navigation College, Dalian Maritime University, Liaoning, 116026, China

Qiuxuan Wang

Information Science and Technology College, Dalian Maritime University, Liaoning, 116026, China

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Shuo Zhang .

Editor information

Editors and affiliations.

Eastern Institute of Technology, Ningbo, China

De-Shuang Huang

Tianjin University of Science and Technology, Tianjin, China

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper.

Fang, M., Li, X., Wang, Y., Wang, Q., Sun, X., Zhang, S. (2024). Intrusion Detection System Based on ViTCycleGAN and Rules. In: Huang, DS., Si, Z., Pan, Y. (eds) Advanced Intelligent Computing Technology and Applications. ICIC 2024. Lecture Notes in Computer Science, vol 14864. Springer, Singapore. https://doi.org/10.1007/978-981-97-5588-2_18

Download citation

DOI : https://doi.org/10.1007/978-981-97-5588-2_18

Published : 13 August 2024

Publisher Name : Springer, Singapore

Print ISBN : 978-981-97-5587-5

Online ISBN : 978-981-97-5588-2

eBook Packages : Computer Science Computer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

IMAGES

  1. Intrusion detection system overview

    research on intrusion detection system

  2. Applications of network intrusion detection system.

    research on intrusion detection system

  3. 1: Components of Intrusion Detection System

    research on intrusion detection system

  4. INTRUSION DETECTION SYSTEM

    research on intrusion detection system

  5. -Typical Intrusion Detection and Prevention Systems [8]

    research on intrusion detection system

  6. Intrusion Detection Framework

    research on intrusion detection system

COMMENTS

  1. Research Trends in Network-Based Intrusion Detection Systems: A Review

    An intrusion detection system (IDS) is also an effective and powerful network security system to detect unauthorized and abnormal network traffic flow. This article presents a review of the research trends in network-based intrusion detection systems (NIDS), their approaches, and the most common datasets used to evaluate IDS Models.

  2. Systematic literature review on intrusion detection systems: Research

    Machine learning (ML) and deep learning (DL) techniques have demonstrated significant potential in the development of effective intrusion detection systems. This study presents a systematic review of the utilization of ML, DL, optimization algorithms, and datasets in intrusion detection research from 2018 to 2023. We devised a comprehensive search strategy to identify relevant studies from ...

  3. Network intrusion detection system: A systematic study of machine

    1 INTRODUCTION With the recent interest and progress in the development of internet and communication technologies over the last decade, network security has emerged as a vital research domain. It employs tools like firewall, antivirus software, and intrusion detection system (IDS) to ensure the security of the network and all its associated assets within a cyberspace. 1 Among these, network ...

  4. Survey of intrusion detection systems: techniques, datasets and

    Numerous intrusion detection methods have been proposed in the literature to tackle computer security threats, which can be broadly classified into Signature-based Intrusion Detection Systems (SIDS) and Anomaly-based Intrusion Detection Systems (AIDS).

  5. A comprehensive review of AI based intrusion detection system

    The paper provides a fine-grained review of ML, DL, and ensemble models for intrusion detection and proposes a novel classification in the field of AI-based intrusion detection. The paper evaluates the experimental results in tabular form for further use in the research community.

  6. A Comprehensive Systematic Literature Review on Intrusion Detection Systems

    Effectively detecting intrusions in the computer networks still remains problematic. This is because cyber attackers are changing packet contents to disguise the intrusion detection system (IDS) recently. Besides, everyday a lot of new devices are added to the computer networks. These new devices are also raising security issues in the computer networks. To effectively manage the computer ...

  7. Intrusion detection system: A comprehensive review

    NIST ( Bace and Mell, 2001) describes the intrusion as an attempt to compromise CIA, or to bypass the security mechanisms of a computer or network, intrusion detection is the process of monitoring the events occurring in a computer system or network, and analyzing them for signs of intrusions. Especially, wireless networks have recently been ...

  8. Intrusion Detection Systems using Supervised Machine Learning

    In this paper, we investigate the subject of intrusion detection using supervised machine learning methods. The main goal is to provide a taxonomy for…

  9. A Systematic Review on Hybrid Intrusion Detection System

    The focus area of research on this type of intrusion detection system is on how to reduce the volume consumed by the database. Another potential area of research is how to make this IDS able to detect zero-day attacks.

  10. A systematic literature review for network intrusion detection system

    In response to RQ 6, the use of ML and DL algorithms for anomaly-based network intrusion detection systems, in particular, still faces several open research hurdles and problems.

  11. Research Trends in Network-Based Intrusion Detection Systems: A Review

    This article presents a review of the research trends in network-based intrusion detection systems (NIDS), their approaches, and the most common datasets used to evaluate IDS Models.

  12. [2408.07729] Extending Network Intrusion Detection with Enhanced

    The present research investigates how to improve Network Intrusion Detection Systems (NIDS) by combining Machine Learning (ML) and Deep Learning (DL) techniques, addressing the growing challenge of cybersecurity threats. A thorough process for data preparation, comprising activities like cleaning, normalization, and segmentation into training and testing sets, lays the framework for model ...

  13. (PDF) Network Intrusion Detection Systems: A Systematic Literature

    Network Intrusion Detection Systems (NIDSs) have become standard security solutions that endeavours to discover unauthorized access to an organizational computer network by scrutinizing incoming ...

  14. Intrusion detection techniques in network environment: a systematic

    The intrusion detection system is an emerging research domain, and it has key criticism for the capacities of retorting to crises, plummeting losses due to network attacks, detecting abnormal behavior, enabling the system to respond to the attacks.

  15. A Review on Recent Intrusion Detection Systems and Intrusion Prevention

    An Intrusion Detection and Prevention System (IDS & IPS) have a vital influence in finding and restricting various intrusion attempts and gives a positive secure framework. The expanding sensors in an IoT framework accompany constraints, for example, interoperability, adaptability, and capacity.

  16. A Survey on Intrusion Detection and Prevention Systems

    Intrusion prevention and detection system (IPDS) forms a strong line of defense against malicious attempts that try to violate the privacy and security of the monitored device (s). This paper is an up-to-date survey of 113 research articles published in the area of IPSs, IDSs, and IDRSs in the past 7 years.

  17. A Bibliometric Review of Intrusion Detection Research in IoT: Evolution

    As the IoT market continues to rapidly expand, ensuring the security of IoT systems becomes increasingly critical. This paper aims to identify emerging trends and technologies in IoT intrusion detection. A bibliometric analysis of research trends in IoT intrusion detection, leveraging data from the Web of Science (WoS) repository, is conducted to understand the landscape of publications in ...

  18. A critical review of intrusion detection systems in the internet of

    The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack on the end nodes. To this end, Numerous IoT intrusion detection Systems (IDS) have been proposed in the ...

  19. Network Intrusion Detection System using Deep Learning

    Research has further advanced self-learning intrusion detection systems to detect and classify recognized and zero-day intrusions; such detection methods facilitate proactive measures to identify and deter malicious network traffic.

  20. Intrusion detection systems for wireless sensor networks using

    Network Intrusion Detection Systems (NIDS) are utilized to find hostile network connections. This can be accomplished by looking at traffic network activity, but it takes a lot of work. The NIDS heavily utilizes approaches for data extraction and machine learning to find anomalies. In terms of feature selection, NIDS is far more effective. This is accurate since anomaly identification uses a ...

  21. Towards Understanding Alerts raised by Unsupervised Network Intrusion

    Abstract The use of Machine Learning for anomaly detection in cyber security-critical applications, such as intrusion detection systems, has been hindered by the lack of explainability. Without understanding the reason behind anomaly alerts, it is too expensive or impossible for human analysts to verify and identify cyber-attacks. Our research addresses this challenge and focuses on ...

  22. Intrusion Detection System Based on Machine Learning Algorithms: A

    Due to the widespread use of the internet, computer networks are vulnerable to cyber-attacks, prompting various researchers to suggest intrusion detection systems (IDSs). Detecting intrusions is one of the important research topics in network security. As a precaution to guarantee the network's security, it aids in the detection of unwanted usage and assaults. This study summarizes significant ...

  23. Federated Deep Learning Models for Intrusion Detection in IoT

    Securing electronic data in Internet of Things (IoT) devices necessitates the implementation of robust Intrusion Detection Systems (IDS) to ensure a secure environment. Our proposal focuses on enhancing attacks detection in IoT devices through the implementation of federated learning.

  24. Intrusion Detection Systems: A State-of-the-Art Taxonomy and Survey

    Intrusion Detection Systems (IDSs) have become essential to the sound operations of networks. These systems have the potential to identify and report deviations from normal behaviors, which is crucial for the sustainability and resilience of networks. A large amount of IDSs have been proposed in the literature, but only few of them found success in real-world environments. This study ...

  25. Intrusion detection based on Machine Learning techniques in computer

    Signature-based intrusion detection systems look for patterns that match known attacks. On the other hand, anomaly-based intrusion detection systems develop a model for distinguishing legitimate users' behavior from that of malicious users' and hence are capable of detecting unknown attacks.

  26. Research and Application of Firewall Log and Intrusion Detection Log

    The visualization system for firewall logs and intrusion detection logs developed in this paper introduces an innovative feature selection algorithm based on information gained through the analysis of network security data.

  27. Artificial Immune Systems for Intrusion Detection Using C#

    An artificial immune system (AIS) for intrusion detection is a software system that loosely models some parts of the behavior of the human immune system to protect computer networks from viruses and similar cyber-attacks. This article presents a demo program that illustrates the main ideas of artificial immune systems.

  28. Intrusion Detection System Based on ViTCycleGAN and Rules

    An intrusion detection system is designed to protect computer systems and network resources from malicious attacks, unauthorized access, or other security threats. It can help organizations detect and respond to potential vulnerabilities, attacks, or abnormal activity in a timely manner, thereby ensuring the security and reliability of ...

  29. Optimized Bayesian regularization-back propagation neural network using

    This research presents Data-Driven Intrusion Detection System in Internet of Things utilizing Optimized Bayesian Regularization-Back Propagation Neural Network (DIDS-BRBPNN-BBWOA-IoT) to overcome these issues. The input data is taken from TON_IoT Dataset.

  30. PDF A critical review of intrusion detection systems in the internet of

    The research in (Xiao et al., 2018) over-viewed a discussion of the ML technique's relevance in the context of IoT intrusion detection systems. Further-more, they recognised limited bandwidth, computation power and lack of sufficient memory as bottlenecks in any implementation of intrusion detection system based on the machine learning for ...