Comprehensive Review of Intrusion Detection Techniques: ML and DL in Different Networks

With the increasing number of new attacks, virtualized and distributed networks require greater attention and investment in cybersecurity. Organizations must rely on effective Intrusion Detection Systems (IDS) to detect both known and novel attacks. Therefore, Machine Learning (ML) and Deep Learning...

Full description

Saved in:
Bibliographic Details
Main Authors: Imane Rakine, Aziz Oukaira, Kamal El Guemmat, Issam Atouf, Sara Ouahabi, Mohamed Talea, Tarik Bouragba
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/11036755/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:With the increasing number of new attacks, virtualized and distributed networks require greater attention and investment in cybersecurity. Organizations must rely on effective Intrusion Detection Systems (IDS) to detect both known and novel attacks. Therefore, Machine Learning (ML) and Deep Learning (DL) techniques have been widely used for intrusion detection. Several studies have reviewed ML and DL-based detection models, but they often overlook the specific networks targeted by these models. It is crucial to understand not only which methods are effective but also the contexts in which they are effective. This study aims to fill this gap by reviewing and classifying recent contributions based on their target networks. It focuses on three key network types: Cloud Computing (CC), Internet of Things (IoT), and Software-Defined Networks (SDN). Our study emphasizes the importance of thoroughly understanding the strengths and vulnerabilities of a given network, which is an important step towards developing effective ML- and DL-based intrusion detection approaches. We first provide an overview of related works and our research steps, followed by a presentation of ML and DL techniques, and commonly used datasets in this field. Next, a detailed presentation of the current research on IDS based on ML and DL techniques by network categories is provided. The strengths and limitations of ML and DL algorithms, which are frequently used for intrusion detection, are highlighted. Finally, the challenges are discussed and future research directions are proposed.
ISSN:2169-3536