Skip to main content

Research Repository

Advanced Search

Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges

Maseer, Ziadoon K.; Kadhim, Qusay Kanaan; Al‐Bander, Baidaa; Yusof, Robiah; Saif, Abdu

Authors

Ziadoon K. Maseer

Qusay Kanaan Kadhim

Robiah Yusof

Abdu Saif



Abstract

Intrusion detection systems built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. The authors used a qualitative method for analysing and evaluating the performance of network intrusion detection system (NIDS) in a systematic way. However, their approach has limitations as it only identifies gaps by analysing and summarising data comparisons without considering quantitative measurements of NIDS's performance. The authors provide a detailed discussion of various deep learning (DL) methods and explain data intrusion networks based on an infrastructure of networks and attack types. The authors’ main contribution is a systematic review that utilises meta‐analysis to provide an in‐depth analysis of DL and traditional machine learning (ML) in notable recent works. The authors assess validation methodologies and clarify recent trends related to dataset intrusion, detected attacks, and classification tasks to improve traditional ML and DL in NIDS‐based publications. Finally, challenges and future developments are discussed to pose new risks and complexities for network security.

Citation

Maseer, Z. K., Kadhim, Q. K., Al‐Bander, B., Yusof, R., & Saif, A. (in press). Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges. IET Networks, https://doi.org/10.1049/ntw2.12128

Journal Article Type Review
Acceptance Date Feb 27, 2024
Online Publication Date Jun 18, 2024
Deposit Date Jul 1, 2024
Journal IET Networks
Electronic ISSN 2047-4962
Publisher Institution of Engineering and Technology (IET)
Peer Reviewed Peer Reviewed
DOI https://doi.org/10.1049/ntw2.12128
Public URL https://keele-repository.worktribe.com/output/859505
Publisher URL https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/ntw2.12128