2021
DOI: 10.1109/access.2021.3129336
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Systematic Literature Review on Intrusion Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 64 publications
(33 citation statements)
references
References 107 publications
0
32
0
1
Order By: Relevance
“…This is especially true of network-related cyber-attacks security systems, such as IDS and IPS, where the IDS analyzes the signatures of the network traffic and compares them to logged cyber-attacks then the IPS analyzes packets and prevents them based on previously detected attacks that are stored in its database. 11 Therefore, it is essential to forecast new types of cyber-attacks within institutions depending on the environment and in a way that may help detect the patterns of zero-day attacks before they occur. As such, a network cyber-attack forecasting system is essential to increase the level of security at banks and financial institutions.…”
Section: Purposementioning
confidence: 99%
See 1 more Smart Citation
“…This is especially true of network-related cyber-attacks security systems, such as IDS and IPS, where the IDS analyzes the signatures of the network traffic and compares them to logged cyber-attacks then the IPS analyzes packets and prevents them based on previously detected attacks that are stored in its database. 11 Therefore, it is essential to forecast new types of cyber-attacks within institutions depending on the environment and in a way that may help detect the patterns of zero-day attacks before they occur. As such, a network cyber-attack forecasting system is essential to increase the level of security at banks and financial institutions.…”
Section: Purposementioning
confidence: 99%
“…A false negative arises when an IDS/IPS classifies an activity as normal when it is actually a cyber-attack. 11 This is often discovered by manually monitoring all hits behaviors and detections on a daily basis. The first draft of the dataset was generated using 3 years of scanned and monitored system data.…”
Section: Analysis and Generation Of The Network Datasetmentioning
confidence: 99%
“…In [5], the authors offered a review on IDS technology especially on classification models. Part of the work was to compare on benchmarked Network IDS dataset, for instance,NSL-KDD, ADFA-LD/WD, AWID, UNSW-NB15, CIC-IDS 2017, CIC-DDoS2019 and BoT-IOT.…”
Section: Related Workmentioning
confidence: 99%
“…The data were summarized in a simple tabular form. ADFA, AWID, UNSW-NB15 and CICIDS contained deficiencies and CIC-DDoS2019 and BOT-IoT dataset encompassed latest intrusion traits [5].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation