{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T20:48:56Z","timestamp":1775422136951,"version":"3.50.1"},"reference-count":113,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T00:00:00Z","timestamp":1717977600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Comput. Sci."],"abstract":"<jats:p>The advancement of communication and internet technology has brought risks to network security. Thus, Intrusion Detection Systems (IDS) was developed to combat malicious network attacks. However, IDSs still struggle with accuracy, false alarms, and detecting new intrusions. Therefore, organizations are using Machine Learning (ML) and Deep Learning (DL) algorithms in IDS for more accurate attack detection. This paper provides an overview of IDS, including its classes and methods, the detected attacks as well as the dataset, metrics, and performance indicators used. A thorough examination of recent publications on IDS-based solutions is conducted, evaluating their strengths and weaknesses, as well as a discussion of their potential implications, research challenges, and new trends. We believe that this comprehensive review paper covers the most recent advances and developments in ML and DL-based IDS, and also facilitates future research into the potential of emerging Artificial Intelligence (AI) to address the growing complexity of cybersecurity challenges.<\/jats:p>","DOI":"10.3389\/fcomp.2024.1387354","type":"journal-article","created":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T20:12:02Z","timestamp":1718136722000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Unveiling machine learning strategies and considerations in intrusion detection systems: a comprehensive survey"],"prefix":"10.3389","volume":"6","author":[{"given":"Ali Hussein","family":"Ali","sequence":"first","affiliation":[]},{"given":"Maha","family":"Charfeddine","sequence":"additional","affiliation":[]},{"given":"Boudour","family":"Ammar","sequence":"additional","affiliation":[]},{"given":"Bassem Ben","family":"Hamed","sequence":"additional","affiliation":[]},{"given":"Faisal","family":"Albalwy","sequence":"additional","affiliation":[]},{"given":"Abdulrahman","family":"Alqarafi","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Hussain","sequence":"additional","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2024,6,10]]},"reference":[{"key":"B1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ICC40277.2020.9149117","article-title":"\u201cInvestigating resistance of deep learning-based ids against adversaries using min-max optimization,\u201d","volume-title":"ICC 2020\u20132020 IEEE International Conference On Communications (ICC)","author":"Abou Khamis","year":"2020"},{"key":"B2","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.comcom.2022.09.012","article-title":"Federated learning for intrusion detection system: concepts, challenges and future directions","volume":"195","author":"Agrawal","year":"2022","journal-title":"Comput. Commun"},{"key":"B3","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1080\/23742917.2018.1518061","article-title":"KDD 1999 generation faults: a review and analysis","volume":"2","author":"Al Tobi","year":"2018","journal-title":"J. Cyber Secur. Technol"},{"key":"B4","doi-asserted-by":"publisher","first-page":"41","DOI":"10.3390\/computers11030041","article-title":"Deep q-learning based reinforcement learning approach for network intrusion detection","volume":"11","author":"Alavizadeh","year":"2022","journal-title":"Computers"},{"key":"B5","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1109\/ICIoT48696.2020.9089524","article-title":"\u201cUsing deep learning techniques for network intrusion detection,\u201d","volume-title":"2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)","author":"Al-Emadi","year":"2020"},{"key":"B6","doi-asserted-by":"publisher","first-page":"36657","DOI":"10.32604\/csse.2023.036657","article-title":"Intelligent intrusion detection for industrial internet of things using clustering techniques","volume":"46","author":"Alenezi","year":"2023","journal-title":"Comput. Syst. Sci. Eng"},{"key":"B7","doi-asserted-by":"publisher","first-page":"115782","DOI":"10.1016\/j.eswa.2021.115782","article-title":"Adversarial machine learning in network intrusion detection systems","volume":"186","author":"Alhajjar","year":"2021","journal-title":"Exp. Syst. Applic"},{"key":"B8","article-title":"\u201cEnhanced intrusion detection based hybrid meta-heuristic feature selection,\u201d","author":"Ali Hussein","year":"","journal-title":"16th International Conference on Computational Collective Intelligence"},{"key":"B9","article-title":"\u201cIntrusion detection schemes based on synthetic minority oversampling technique and machine learning models,\u201d","volume-title":"Conference 27th IEEE International Symposium on Real-Time Distributed Computing","author":"Ali Hussein","year":""},{"key":"B10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-021-09591-y","article-title":"An intelligent tree-based intrusion detection model for cyber security","volume":"29","author":"Al-Omari","year":"2021","journal-title":"J. Netw. Syst. Manag"},{"key":"B11","doi-asserted-by":"publisher","first-page":"62","DOI":"10.3390\/fi15020062","article-title":"Adversarial machine learning attacks against intrusion detection systems: a survey on strategies and defense","volume":"15","author":"Alotaibi","year":"2023","journal-title":"Fut. Internet"},{"key":"B12","doi-asserted-by":"publisher","first-page":"52843","DOI":"10.1109\/ACCESS.2018.2869577","article-title":"Deep learning approach combining sparse autoencoder with SVM for network intrusion detection","volume":"6","author":"Al-Qatf","year":"2018","journal-title":"IEEE Access"},{"key":"B13","doi-asserted-by":"publisher","first-page":"6113","DOI":"10.1007\/s12652-021-02963-x","article-title":"Machine learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks","volume":"14","author":"Alsarhan","year":"2021","journal-title":"J. Ambient Intell. Hum. Comput"},{"key":"B14","doi-asserted-by":"publisher","first-page":"111","DOI":"10.3390\/fi13050111","article-title":"Designing a network intrusion detection system based on machine learning for software defined networks","volume":"13","author":"Alzahrani","year":"2021","journal-title":"Fut. Internet"},{"key":"B15","doi-asserted-by":"publisher","first-page":"53346","DOI":"10.1109\/ACCESS.2020.2980937","article-title":"Multi-channel deep feature learning for intrusion detection","volume":"8","author":"Andresini","year":"2020","journal-title":"IEEE Access"},{"key":"B16","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1109\/ICAIIC48513.2020.9064976","article-title":"\u201c1D CNN based network intrusion detection with normalization on imbalanced data,\u201d","volume-title":"2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","author":"Azizjon","year":"2020"},{"key":"B17","doi-asserted-by":"publisher","first-page":"100936","DOI":"10.1016\/j.iot.2023.100936","article-title":"Enhancing iot network security through deep learning-powered intrusion detection system","volume":"24","author":"Bakhsh","year":"2023","journal-title":"Internet Things"},{"key":"B18","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/IoTaIS50849.2021.9359689","article-title":"\u201cNetwork intrusion detection system using neural network and condensed nearest neighbors with selection of nsl-kdd influencing features,\u201d","volume-title":"2020 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS)","author":"Belgrana","year":"2021"},{"key":"B19","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-030-16962-6_3","article-title":"\u201cIntrusion detection in communication networks using different classifiers,\u201d","volume-title":"Techno-Societal 2018: Proceedings of the 2nd International Conference on Advanced Technologies for Societal Applications","author":"Bhosale","year":"2020"},{"key":"B20","doi-asserted-by":"publisher","first-page":"7094","DOI":"10.1007\/s10489-021-02205-9","article-title":"Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM","volume":"51","author":"Binbusayyis","year":"2021","journal-title":"Appl. Intell"},{"key":"B21","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1109\/ICICI.2017.8365277","article-title":"\u201cA survey on intrusion detection system (ids) and internal intrusion detection and protection system (IIDPS),\u201d","volume-title":"2017 International Conference on Inventive Computing and Informatics (ICICI)","author":"Borkar","year":"2017"},{"key":"B22","doi-asserted-by":"publisher","first-page":"103210","DOI":"10.1016\/j.cose.2023.103210","article-title":"CPS-GUARD: Intrusion detection for cyber-physical systems and IOT devices using outlier-aware deep autoencoders","volume":"129","author":"Catillo","year":"2023","journal-title":"Comput. Secur"},{"key":"B23","doi-asserted-by":"crossref","first-page":"740","DOI":"10.1109\/AICAI.2019.8701373","article-title":"\u201cFilter-based attribute selection approach for intrusion detection using k-means clustering and sequential minimal optimization techniq,\u201d","volume-title":"2019 Amity International Conference on Artificial Intelligence (AICAI)","author":"Chandra","year":"2019"},{"key":"B24","doi-asserted-by":"publisher","first-page":"30263","DOI":"10.1109\/ACCESS.2024.3367792","article-title":"Chatgpt's security risks and benefits: offensive and defensive use-cases, mitigation measures, and future implications","volume":"12","author":"Charfeddine","year":"2024","journal-title":"IEEE Access"},{"key":"B25","doi-asserted-by":"publisher","first-page":"12654","DOI":"10.1109\/ACCESS.2022.3145950","article-title":"Audio watermarking for security and non-security applications","volume":"10","author":"Charfeddine","year":"2022","journal-title":"IEEE Access"},{"key":"B26","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1016\/j.neucom.2020.07.138","article-title":"Intrusion detection approach based on optimised artificial neural network","volume":"452","author":"Chora\u015b","year":"2021","journal-title":"Neurocomputing"},{"key":"B27","doi-asserted-by":"publisher","first-page":"4821","DOI":"10.1109\/TNSM.2021.3138457","article-title":"Network intrusion detection and comparative analysis using ensemble machine learning and feature selection","volume":"19","author":"Das","year":"2021","journal-title":"IEEE Trans. Netw. Serv. Manag"},{"key":"B28","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.ins.2016.01.101","article-title":"A survey on soft subspace clustering","volume":"348","author":"Deng","year":"2016","journal-title":"Inf. Sci"},{"key":"B29","doi-asserted-by":"publisher","first-page":"7507","DOI":"10.3390\/app13137507","article-title":"Overview on intrusion detection systems design exploiting machine learning for networking cybersecurity","volume":"13","author":"Dini","year":"2023","journal-title":"Appl. Sci"},{"key":"B30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6639714","article-title":"The anomaly-and signature-based ids for network security using hybrid inference systems","volume":"2021","author":"Einy","year":"2021","journal-title":"Mathem. Problems Eng"},{"key":"B31","unstructured":"EstablishmentC. S. Communications Security Establishment Annual Report 2022\u201320232023"},{"key":"B32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12559-022-10103-6","article-title":"Towards automated optimization of residual convolutional neural networks for electrocardiogram classification","volume":"2023","author":"Fki","year":"2023","journal-title":"Cogn. Comput"},{"key":"B33","first-page":"3","article-title":"A critical review on adversarial attacks on intrusion detection systems","volume":"5","author":"Frank","year":"2019","journal-title":"Transl. Eng"},{"key":"B34","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1016\/j.procs.2021.03.072","article-title":"Crafting adversarial samples for anomaly detectors in industrial control systems","volume":"184","author":"G\u00f3mez","year":"2021","journal-title":"Proc. Comput. Sci"},{"key":"B35","doi-asserted-by":"publisher","first-page":"102158","DOI":"10.1016\/j.cose.2020.102158","article-title":"An effective intrusion detection approach using svm with na\u00efve bayes feature embedding","volume":"103","author":"Gu","year":"2021","journal-title":"Comput. Secur"},{"key":"B36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/1230593","article-title":"A reliable network intrusion detection approach using decision tree with enhanced data quality","volume":"2021","author":"Guezzaz","year":"2021","journal-title":"Secur. Commun. Netw"},{"key":"B37","doi-asserted-by":"publisher","first-page":"30","DOI":"10.9734\/ajrcos\/2021\/v9i230218","article-title":"Attack and anomaly detection in iot networks using machine learning techniques: a review","volume":"9","author":"Haji","year":"2021","journal-title":"Asian J Res. Comput. Sci"},{"key":"B38","doi-asserted-by":"publisher","first-page":"105359","DOI":"10.1016\/j.bspc.2023.105359","article-title":"Temporal-spatial transformer based motor imagery classification for BCI using independent component analysis","volume":"87","author":"Hameed","year":"2024","journal-title":"Biomed. Signal Proc. Control"},{"key":"B39","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s12559-023-10179-8","article-title":"Interpreting black-box models: a review on explainable artificial intelligence","volume":"16","author":"Hassija","year":"2024","journal-title":"Cogn. Comput"},{"key":"B40","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1109\/COMST.2022.3233793","article-title":"Adversarial machine learning for network intrusion detection systems: a comprehensive survey","volume":"25","author":"He","year":"2023","journal-title":"IEEE Commun. Surv. Tutor"},{"key":"B41","doi-asserted-by":"publisher","first-page":"104650","DOI":"10.1109\/ACCESS.2020.3000179","article-title":"A taxonomy of network threats and the effect of current datasets on intrusion detection systems","volume":"8","author":"Hindy","year":"2020","journal-title":"IEEE Access"},{"key":"B42","doi-asserted-by":"publisher","first-page":"37131","DOI":"10.1109\/ACCESS.2023.3266979","article-title":"A novel two-stage deep learning model for network intrusion detection: LSTM-AE","volume":"11","author":"Hnamte","year":"2023","journal-title":"IEEE Access"},{"key":"B43","author":"Humphrey","year":"2021","journal-title":"Data privacy vs. innovation: A quantitative analysis of artificial intelligence in healthcare and its impact on HIPAA regarding the privacy and security of protected health information"},{"key":"B44","doi-asserted-by":"publisher","first-page":"3976","DOI":"10.35940\/ijrte.B1540.0982S1119","article-title":"Intrusion detection systems","volume":"8","author":"Jatti","year":"2019","journal-title":"Int. J. Recent Technol. Eng"},{"key":"B45","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1007\/s12559-023-10153-4","article-title":"Artificial intelligence for cognitive health assessment: state-of-the-art, open challenges and future directions","volume":"15","author":"Javed","year":"2023","journal-title":"Cogn. Comput"},{"key":"B46","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1049\/iet-ifs.2018.5258","article-title":"Network intrusion detection algorithm based on deep neural network","volume":"13","author":"Jia","year":"2019","journal-title":"IET Inf. Secur"},{"key":"B47","doi-asserted-by":"publisher","first-page":"32464","DOI":"10.1109\/ACCESS.2020.2973730","article-title":"Network intrusion detection combined hybrid sampling with deep hierarchical network","volume":"8","author":"Jiang","year":"2020","journal-title":"IEEE Access"},{"key":"B48","doi-asserted-by":"publisher","first-page":"48","DOI":"10.55056\/jec.648","article-title":"A long short-term memory-based approach for detecting cyber attacks in IOT using cic-iot2023 dataset","volume":"3","author":"Jony","year":"2024","journal-title":"J. Edge Comput"},{"key":"B49","doi-asserted-by":"publisher","first-page":"32150","DOI":"10.1109\/ACCESS.2020.2973219","article-title":"Increasing the performance of machine learning-based idss on an imbalanced and up-to-date dataset","volume":"8","author":"Karatas","year":"2020","journal-title":"IEEE Access"},{"key":"B50","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.comcom.2022.12.010","article-title":"A deep learning technique for intrusion detection system using a recurrent neural networks based framework","volume":"199","author":"Kasongo","year":"2023","journal-title":"Comput. Commun"},{"key":"B51","doi-asserted-by":"publisher","first-page":"242","DOI":"10.36548\/jsws.2021.4.004","article-title":"Design of a bottleneck layered dnn algorithm for intrusion detection system","volume":"3","author":"Kavitha","year":"2022","journal-title":"Methods"},{"key":"B52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijwmt.2023.04.01","article-title":"Adversarial deep learning in anomaly based intrusion detection systems for IOT environments","volume":"13","author":"Khalid Albulayhi","year":"2023","journal-title":"Int. J. Wirel. Microw. Technol"},{"key":"B53","doi-asserted-by":"publisher","first-page":"1771","DOI":"10.3390\/electronics9111771","article-title":"Toward developing efficient conv-ae-based intrusion detection system using heterogeneous dataset","volume":"9","author":"Khan","year":"2020","journal-title":"Electronics"},{"key":"B54","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/CCC.2019.000-6","article-title":"\u201cAn improved convolutional neural network model for intrusion detection in networks,\u201d","volume-title":"2019 Cybersecurity and Cyberforensics Conference (CCC)","author":"Khan","year":"2019"},{"key":"B55","doi-asserted-by":"publisher","first-page":"103760","DOI":"10.1016\/j.jnca.2023.103760","article-title":"Deep transfer learning for intrusion detection in industrial control networks: a comprehensive review","volume":"220","author":"Kheddar","year":"2023","journal-title":"J. Netw. Comput. Applic"},{"key":"B56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3476066","article-title":"A human-centered systematic literature review of cyberbullying detection algorithms","volume":"5","author":"Kim","year":"2021","journal-title":"Proc. ACM Hum. Comput. Inter"},{"key":"B57","doi-asserted-by":"publisher","first-page":"4819","DOI":"10.1109\/SILCON59133.2023.10404204","article-title":"Evaluation of machine learning algorithms for intrusion detection utilizing UNSW-NB15 dataset","volume":"13","author":"Kumar","year":"2022","journal-title":"J. Pharm. Negat. Results"},{"key":"B58","first-page":"127","article-title":"\u201cStudy of the attributes using four class labels on KDD99 and NSL-KDD datasets with machine learning techniques,\u201d","volume-title":"2018 8th International Conference on Communication Systems and Network Technologies (CSNT)","author":"Kunhare","year":"2018"},{"key":"B59","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.11591\/eei.v10i5.2833","article-title":"Naive bayes modification for intrusion detection system classification with zero probability","volume":"10","author":"Kurniawan","year":"2021","journal-title":"Bull. Electr. Eng. Inf"},{"key":"B60","doi-asserted-by":"publisher","first-page":"101574","DOI":"10.1109\/ACCESS.2021.3097247","article-title":"Deep learning-based intrusion detection systems: a systematic review","volume":"9","author":"Lansky","year":"2021","journal-title":"IEEE Access"},{"key":"B61","doi-asserted-by":"publisher","first-page":"103784","DOI":"10.1016\/j.jnca.2023.103784","article-title":"DTL-IDS: an optimized intrusion detection framework using deep transfer learning and genetic algorithm","volume":"221","author":"Latif","year":"2024","journal-title":"J. Netw. Comput. Applic"},{"key":"B62","doi-asserted-by":"publisher","first-page":"6396","DOI":"10.1109\/JIOT.2019.2897063","article-title":"System statistics learning-based IOT security: feasibility and suitability","volume":"6","author":"Li","year":"2019","journal-title":"IEEE Internet Things J"},{"key":"B63","doi-asserted-by":"publisher","first-page":"75729","DOI":"10.1109\/ACCESS.2021.3082147","article-title":"A hybrid intrusion detection system based on scalable k-means+ random forest and deep learning","volume":"9","author":"Liu","year":"2021","journal-title":"IEEE Access"},{"key":"B64","doi-asserted-by":"publisher","DOI":"10.1109\/I2CT57861.2023.10126301","article-title":"\u201cYARS-IDS: a novel ids for multi-class classification,\u201d","author":"Madwanna","year":"2023","journal-title":"2023 IEEE 8th International Conference for Convergence in Technology (I2CT)"},{"key":"B65","doi-asserted-by":"publisher","first-page":"35403","DOI":"10.1109\/ACCESS.2020.2974752","article-title":"Adversarial machine learning applied to intrusion and malware scenarios: a systematic review","volume":"8","author":"Martins","year":"2020","journal-title":"IEEE Access"},{"key":"B66","doi-asserted-by":"publisher","first-page":"22351","DOI":"10.1109\/ACCESS.2021.3056614","article-title":"Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset","volume":"9","author":"Maseer","year":"2021","journal-title":"IEEE Access"},{"key":"B67","doi-asserted-by":"publisher","first-page":"9663052","DOI":"10.1155\/2022\/9663052","article-title":"A systematic review on hybrid intrusion detection system","volume":"2022","author":"Maseno","year":"2022","journal-title":"Secur. Commun. Netw"},{"key":"B68","doi-asserted-by":"publisher","first-page":"69822","DOI":"10.1109\/ACCESS.2022.3187116","article-title":"Detecting zero-day intrusion attacks using semi-supervised machine learning approaches","volume":"10","author":"Mbona","year":"2022","journal-title":"IEEE Access"},{"key":"B69","doi-asserted-by":"publisher","first-page":"e13263","DOI":"10.1111\/exsy.13263","article-title":"A novel intelligent approach for man-in-the-middle attacks detection over internet of things environments based on message queuing telemetry transport","volume":"41","author":"Michelena","year":"2024","journal-title":"Expert Syst"},{"key":"B70","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/JPROC.2020.2970615","article-title":"Adversarial learning targeting deep neural network classification: a comprehensive review of defenses against attacks","volume":"108","author":"Miller","year":"2020","journal-title":"Proc. IEEE"},{"key":"B71","doi-asserted-by":"publisher","first-page":"e3997","DOI":"10.1002\/ett.3997","article-title":"Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using levenberg-marquardt neural network and gated recurrent unit for intrusion detection system","volume":"32","author":"Mittal","year":"2021","journal-title":"Trans. Emerg. Telecommun. Technol"},{"key":"B72","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.3390\/make5030053","article-title":"Artificial intelligence ethics and challenges in healthcare applications: a comprehensive review in the context of the european gdpr mandate","volume":"5","author":"Mohammad Amini","year":"2023","journal-title":"Mach. Learn. Knowl. Extr"},{"key":"B73","doi-asserted-by":"publisher","first-page":"102983","DOI":"10.1016\/j.jnca.2021.102983","article-title":"A comprehensive survey and taxonomy of the svm-based intrusion detection systems","volume":"178","author":"Mohammadi","year":"2021","journal-title":"J. Netw. Comput. Applic"},{"key":"B74","doi-asserted-by":"publisher","first-page":"48231","DOI":"10.1109\/ACCESS.2018.2863036","article-title":"Enhanced network anomaly detection based on deep neural networks","volume":"6","author":"Naseer","year":"2018","journal-title":"IEEE access"},{"key":"B75","doi-asserted-by":"publisher","first-page":"3779","DOI":"10.1109\/TNNLS.2021.3121870","article-title":"Deep reinforcement learning for cyber security","volume":"34","author":"Nguyen","year":"2023","journal-title":"IEEE Trans. Neural Netw. Learn. Syst"},{"key":"B76","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/j.procs.2021.10.052","article-title":"An enhanced intrusion detection system using particle swarm optimization feature extraction technique","volume":"193","author":"Ogundokun","year":"2021","journal-title":"Proc. Comput. Sci"},{"key":"B77","doi-asserted-by":"publisher","first-page":"10963","DOI":"10.3390\/su131910963","article-title":"Anomaly detection with machine learning algorithms and big data in electricity consumption","volume":"13","author":"Oprea","year":"2021","journal-title":"Sustainability"},{"key":"B78","doi-asserted-by":"publisher","first-page":"37","DOI":"10.11610\/isij.5016","article-title":"Host-based intrusion detection using signature-based and ai-driven anomaly detection methods","volume":"50","author":"Panagiotou","year":"2021","journal-title":"Inf. Secur"},{"key":"B79","doi-asserted-by":"publisher","first-page":"4551","DOI":"10.7494\/csci.2023.24.1.4551","article-title":"Explainable deep neural network based analysis on intrusion detection systems","volume":"24","author":"Pande","year":"2023","journal-title":"Comput. Sci"},{"key":"B80","doi-asserted-by":"publisher","first-page":"121444","DOI":"10.1109\/ACCESS.2022.3222715","article-title":"Analysis of continual learning models for intrusion detection system","volume":"10","author":"Prasath","year":"2022","journal-title":"IEEE Access"},{"key":"B81","doi-asserted-by":"publisher","first-page":"31381","DOI":"10.1007\/s11042-021-10567-y","article-title":"Effective combining of feature selection techniques for machine learning-enabled iot intrusion detection","volume":"80","author":"Rahman","year":"2021","journal-title":"Multim. Tools Applic"},{"key":"B82","doi-asserted-by":"publisher","first-page":"17265","DOI":"10.1007\/s00500-020-05017-0","article-title":"A deep learning approach for effective intrusion detection in wireless networks using cnn","volume":"24","author":"Riyaz","year":"2020","journal-title":"Soft Comput"},{"key":"B83","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.comcom.2020.05.048","article-title":"An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IOMT architecture","volume":"160","author":"RM","year":"2020","journal-title":"Comput. Commun"},{"key":"B84","doi-asserted-by":"publisher","first-page":"107810","DOI":"10.1016\/j.compeleceng.2022.107810","article-title":"Anomaly-based intrusion detection system for IOT networks through deep learning model","volume":"99","author":"Saba","year":"2022","journal-title":"Comput. Electr. Eng"},{"key":"B85","doi-asserted-by":"publisher","first-page":"997159","DOI":"10.3389\/fcomp.2023.997159","article-title":"A novel hybrid autoencoder and modified particle swarm optimization feature selection for intrusion detection in the internet of things network","volume":"5","author":"Saheed","year":"2023","journal-title":"Front. Comput. Sci"},{"key":"B86","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1109\/ICCNC.2019.8685636","article-title":"\u201cClustering enabled classification using ensemble feature selection for intrusion detection,\u201d","volume-title":"2019 International Conference on Computing, Networking and Communications (ICNC)","author":"Salo","year":"2019"},{"key":"B113","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1007\/s12559-023-10139-2","article-title":"Enhanced quantum-secure ensemble intrusion detection techniques for cloud based on deep learning","volume":"15","author":"Salvakkam","year":"2023","journal-title":"Cogn. Comput."},{"key":"B87","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1016\/j.procs.2020.04.133","article-title":"Performance analysis of machine learning algorithms in intrusion detection system: a review","volume":"171","author":"Saranya","year":"2020","journal-title":"Proc. Comput. Sci"},{"key":"B88","doi-asserted-by":"publisher","first-page":"46386","DOI":"10.1109\/ACCESS.2021.3066620","article-title":"Real-time network intrusion prevention system based on hybrid machine learning","volume":"9","author":"Seo","year":"2021","journal-title":"IEEE Access"},{"key":"B89","doi-asserted-by":"publisher","first-page":"110227","DOI":"10.1016\/j.asoc.2023.110227","article-title":"Survey of machine learning based intrusion detection methods for internet of medical things","volume":"140","author":"Si-Ahmed","year":"2023","journal-title":"Appl. Soft Comput"},{"key":"B90","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1109\/ICAIS50930.2021.9395918","article-title":"\u201cA hybrid machine learning and data mining based approach to network intrusion detection,\u201d","volume-title":"2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS)","author":"Singhal","year":"2021"},{"key":"B91","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s12083-017-0630-0","article-title":"Survey on SDN based network intrusion detection system using machine learning approaches","volume":"12","author":"Sultana","year":"2019","journal-title":"Peer-to-Peer Network. Applic"},{"key":"B92","doi-asserted-by":"publisher","first-page":"e4014","DOI":"10.1002\/ett.4014","article-title":"An integrated intrusion detection system using correlation-based attribute selection and artificial neural network","volume":"32","author":"Sumaiya Thaseen","year":"2021","journal-title":"Trans. Emerg. Telecommun. Technol"},{"key":"B93","doi-asserted-by":"publisher","first-page":"1913","DOI":"10.1007\/s12652-020-02271-w","article-title":"Developing a multi-level intrusion detection system using hybrid-DBN","volume":"12","author":"S\u00fczen","year":"2021","journal-title":"J. Ambient Intell. Human. Comput"},{"key":"B94","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475591","article-title":"\u201cDAWN: dynamic adversarial watermarking of neural networks,\u201d","author":"Szyller","year":"2021","journal-title":"Proceedings of the 29th ACM International Conference on Multimedia"},{"key":"B95","doi-asserted-by":"publisher","first-page":"103405","DOI":"10.1016\/j.jisa.2022.103405","article-title":"A dependable hybrid machine learning model for network intrusion detection","volume":"72","author":"Talukder","year":"2023","journal-title":"J. Inf. Secur. Applic"},{"key":"B96","doi-asserted-by":"publisher","first-page":"5529","DOI":"10.3390\/s19245529","article-title":"Intrusion detection of UAVS based on the deep belief network optimized by PSO","volume":"19","author":"Tan","year":"2019","journal-title":"Sensors"},{"key":"B97","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/978-3-030-13057-2_8","article-title":"\u201cIntrusion detection in sdn-based networks: deep recurrent neural network approach,\u201d","volume-title":"Deep Learning Applications for Cyber Security","author":"Tang","year":"2019"},{"key":"B98","doi-asserted-by":"publisher","DOI":"10.1109\/SMC42975.2020.9283220","article-title":"\u201cA technique for generating a botnet dataset for anomalous activity detection in iot networks,\u201d","author":"Ullah","year":"2020","journal-title":"2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"},{"key":"B99","doi-asserted-by":"publisher","first-page":"e12556","DOI":"10.1111\/exsy.12556","article-title":"A machine learning approach for imputation and anomaly detection in iot environment","volume":"37","author":"Vangipuram","year":"2020","journal-title":"Expert Syst"},{"key":"B100","doi-asserted-by":"publisher","first-page":"2171","DOI":"10.3390\/s23042171","article-title":"Network anomaly intrusion detection based on deep learning approach","volume":"23","author":"Wang","year":"2023","journal-title":"Sensors"},{"key":"B101","doi-asserted-by":"publisher","DOI":"10.1109\/EDOCW52865.2021.00040","article-title":"\u201cAnomaly-based intrusion detection using tree augmented naive bayes,\u201d","author":"Wester","year":"2021","journal-title":"2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW)"},{"key":"B102","doi-asserted-by":"publisher","first-page":"138432","DOI":"10.1109\/ACCESS.2021.3118573","article-title":"A double-layered hybrid approach for network intrusion detection system using combined naive bayes and svm","volume":"9","author":"Wisanwanichthan","year":"2021","journal-title":"IEEE Access"},{"key":"B103","doi-asserted-by":"publisher","first-page":"102688","DOI":"10.1016\/j.jnca.2020.102688","article-title":"A network intrusion detection method based on semantic re-encoding and deep learning","volume":"164","author":"Wu","year":"2020","journal-title":"J. Netw. Comput. Applic"},{"key":"B104","doi-asserted-by":"publisher","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","article-title":"Machine learning and deep learning methods for cybersecurity","volume":"6","author":"Xin","year":"2018","journal-title":"IEEE Access"},{"key":"B105","doi-asserted-by":"publisher","first-page":"48697","DOI":"10.1109\/ACCESS.2018.2867564","article-title":"An intrusion detection system using a deep neural network with gated recurrent units","volume":"6","author":"Xu","year":"2018","journal-title":"IEEE Access"},{"key":"B106","doi-asserted-by":"publisher","first-page":"42169","DOI":"10.1109\/ACCESS.2020.2977007","article-title":"Network intrusion detection based on supervised adversarial variational auto-encoder with regularization","volume":"8","author":"Yang","year":"2020","journal-title":"IEEE Access"},{"key":"B107","doi-asserted-by":"publisher","first-page":"103580","DOI":"10.1016\/j.jnca.2022.103580","article-title":"Review on the application of deep learning in network attack detection","volume":"212","author":"Yi","year":"2023","journal-title":"J. Netw. Comput. Applic"},{"key":"B108","doi-asserted-by":"publisher","first-page":"126","DOI":"10.3390\/bdcc6040126","article-title":"Explaining intrusion detection-based convolutional neural networks using shapley additive explanations (shap)","volume":"6","author":"Younisse","year":"2022","journal-title":"Big Data Cogn. Comput"},{"key":"B109","doi-asserted-by":"publisher","first-page":"49730","DOI":"10.1109\/ACCESS.2020.2980136","article-title":"An intrusion detection method using few-shot learning","volume":"8","author":"Yu","year":"2020","journal-title":"IEEE Access"},{"key":"B110","doi-asserted-by":"publisher","first-page":"91992","DOI":"10.1109\/ACCESS.2019.2927465","article-title":"A multiple-layer representation learning model for network-based attack detection","volume":"7","author":"Zhang","year":"2019","journal-title":"IEEE Access"},{"key":"B111","doi-asserted-by":"publisher","first-page":"109113","DOI":"10.1016\/j.compeleceng.2024.109113","article-title":"An integrated intrusion detection framework based on subspace clustering and ensemble learning","volume":"115","author":"Zhu","year":"2024","journal-title":"Comput. Electr. Eng"},{"key":"B112","doi-asserted-by":"publisher","first-page":"21404","DOI":"10.1109\/ACCESS.2023.3251354","article-title":"HC-DTTSVM: a network intrusion detection method based on decision tree twin support vector machine and hierarchical clustering","volume":"11","author":"Zou","year":"2023","journal-title":"IEEE Access"}],"container-title":["Frontiers in Computer Science"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2024.1387354\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T16:46:08Z","timestamp":1732207568000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2024.1387354\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,10]]},"references-count":113,"alternative-id":["10.3389\/fcomp.2024.1387354"],"URL":"https:\/\/doi.org\/10.3389\/fcomp.2024.1387354","relation":{},"ISSN":["2624-9898"],"issn-type":[{"value":"2624-9898","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,10]]},"article-number":"1387354"}}