{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,18]],"date-time":"2026-05-18T10:50:14Z","timestamp":1779101414869,"version":"3.51.4"},"reference-count":99,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3392338","type":"journal-article","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T17:41:12Z","timestamp":1713807672000},"page":"59289-59317","source":"Crossref","is-referenced-by-count":23,"title":["From Bytes to Insights: A Systematic Literature Review on Unraveling IDS Datasets for Enhanced Cybersecurity Understanding"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2226-0001","authenticated-orcid":false,"given":"Akbar","family":"Khanan","sequence":"first","affiliation":[{"name":"College of Business Administration, A&#x2019;Sharqiyah University, Ibra, Oman"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9337-7688","authenticated-orcid":false,"given":"Yasir","family":"Abdelgadir Mohamed","sequence":"additional","affiliation":[{"name":"College of Business Administration, A&#x2019;Sharqiyah University, Ibra, Oman"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5879-5385","authenticated-orcid":false,"given":"Abdul Hakim H. M.","family":"Mohamed","sequence":"additional","affiliation":[{"name":"College of Business Administration, A&#x2019;Sharqiyah University, Ibra, Oman"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohamed","family":"Bashir","sequence":"additional","affiliation":[{"name":"College of Business Administration, A&#x2019;Sharqiyah University, Ibra, Oman"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.08.126"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3442520.3442521"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/app13042276"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5120\/3399-4730"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.490"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3000179"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/cns.2015.7346912"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICISSEC.2016.7885840"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00815-1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.100827"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-82786-1_17"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5710028"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102675"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/s23052415"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.9734\/ajrcos\/2021\/v7i430185"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107840"},{"key":"ref22","first-page":"1","article-title":"Network intrusion detection: Half a kingdom for a good dataset","volume-title":"Proc. NATO STO SAS-139 Workshop","author":"Malowidzki"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/app13127328"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3204690"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/6048087"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.54254\/2755-2721\/27\/20230148"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3237798"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12061333"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.03.026"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103123"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/s23041846"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.330"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/app13084921"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2319\/1\/012029"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/app11177868"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/jcp2040045"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100773"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3539605"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.5937\/vojtehg66-16670"},{"key":"ref40","volume-title":"KDD Cup 1999 Data","year":"1999"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04557-3"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.12720\/jait.14.3.472-478"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2018.1518061"},{"key":"ref44","article-title":"An investigation of deep learning for network intrusion detection systems","volume":"215","author":"Adjepon-Yamoah","year":"2022","journal-title":"Comput. Netw."},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.04.004"},{"issue":"6","key":"ref46","first-page":"1790","article-title":"Feature reduction using principal component analysis for effective anomaly-based intrusion detection on NSL-KDD","volume":"2","author":"Lakhina","year":"2010","journal-title":"Int. J. Eng. Sci. Technol."},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2022.2055399"},{"key":"ref48","volume-title":"KDD Cup 1999 Data","year":"1999"},{"issue":"5","key":"ref49","first-page":"2411","article-title":"Enhancing intrusion detection system performance against low frequent attacks using FC-ANN algorithm","volume":"18","author":"Salih","year":"2023","journal-title":"J. Eng. Sci. Technol."},{"key":"ref50","first-page":"1","article-title":"A robust comparison of the KDDCup99 and NSL-KDD intrusion detection datasets by utilizing principle component analysis and evaluating the performance of various machine learning algorithms","volume":"1","author":"Ahmadi","year":"2019","journal-title":"J. Scientists\u2019 Res."},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.3390\/s21217070"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i3.24.22797"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2022.108310"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.3390\/s22239326"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25109-3_9"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3605031"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/milcis.2015.7348942"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00379-6"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.041"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2836950"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/wcnc.2013.6555301"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.3390\/jsan12040051"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.3390\/app13095427"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3165809"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/sose52839.2021.00007"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-023-04666-x"},{"key":"ref67","article-title":"Mirai-based multi-class dataset","author":"Gebrye","year":"2023","journal-title":"IEEE Dataport"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12143103"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.3390\/s22155690"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2017.00035"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3390\/app112110244"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.3390\/sym14112304"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s44248-023-00003-x"},{"key":"ref74","author":"Hyun","year":"2011","journal-title":"The CAIDA IPv4 Routed \/24 Topology Dataset"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.170"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.11.004"},{"key":"ref77","volume-title":"U.S. National CyberWatch Mid-Atlantic Collegiate CyberDefense Competition (MACCDC)","year":"2012"},{"key":"ref78","article-title":"Deep learning techniques for intrusion detection systems: A comprehensive survey","volume":"188","author":"Alrawashdeh","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3457904"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.25008\/ijadis.v1i1.14"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.141"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.17705\/1cais.05209"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-023-00988-8"},{"issue":"12","key":"ref84","first-page":"1848","article-title":"A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection","volume":"2","author":"Revathi","year":"2013","journal-title":"Int. J. Eng. Res. Technol. (IJERT)"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2023.100306"},{"key":"ref86","volume-title":"IDS 2017 Dataset","year":"2017"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/PST58708.2023.10320202"},{"key":"ref90","volume-title":"Android Adware Dataset","year":"2023"},{"key":"ref91","article-title":"Dataset bias in Android malware detection","author":"Lin","year":"2022","journal-title":"arXiv:2205.15532"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9101722"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/s40745-021-00362-9"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585560"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/iccceee.2018.8515827"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/itsim.2008.4631673"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/iccceee.2018.8515882"},{"key":"ref99","first-page":"495","article-title":"I2MANET security logical specification framework","volume":"9","author":"Mohamed","year":"2012","journal-title":"The Int. Arab J. Inf. Technol."}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10506515.pdf?arnumber=10506515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T18:57:41Z","timestamp":1714762661000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10506515\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":99,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3392338","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}