Comprehensive Review of Intrusion Detection Techniques: ML and DL in Different Networks
With the increasing number of new attacks, virtualized and distributed networks require greater attention and investment in cybersecurity. Organizations must rely on effective Intrusion Detection Systems (IDS) to detect both known and novel attacks. Therefore, Machine Learning (ML) and Deep Learning...
Saved in:
| Main Authors: | , , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/11036755/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | With the increasing number of new attacks, virtualized and distributed networks require greater attention and investment in cybersecurity. Organizations must rely on effective Intrusion Detection Systems (IDS) to detect both known and novel attacks. Therefore, Machine Learning (ML) and Deep Learning (DL) techniques have been widely used for intrusion detection. Several studies have reviewed ML and DL-based detection models, but they often overlook the specific networks targeted by these models. It is crucial to understand not only which methods are effective but also the contexts in which they are effective. This study aims to fill this gap by reviewing and classifying recent contributions based on their target networks. It focuses on three key network types: Cloud Computing (CC), Internet of Things (IoT), and Software-Defined Networks (SDN). Our study emphasizes the importance of thoroughly understanding the strengths and vulnerabilities of a given network, which is an important step towards developing effective ML- and DL-based intrusion detection approaches. We first provide an overview of related works and our research steps, followed by a presentation of ML and DL techniques, and commonly used datasets in this field. Next, a detailed presentation of the current research on IDS based on ML and DL techniques by network categories is provided. The strengths and limitations of ML and DL algorithms, which are frequently used for intrusion detection, are highlighted. Finally, the challenges are discussed and future research directions are proposed. |
|---|---|
| ISSN: | 2169-3536 |