2023
DOI: 10.1007/s11831-023-09943-8
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Challenges and Future Research Directions for Machine Learning-Based Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2025
2025

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 106 publications
0
2
0
Order By: Relevance
“…After passing through the ReLU activation function again, the data are sent to the max-pooling layer. This step further abstracts features and reduces dimensionality, helping to strengthen the feature extraction of the model and generalization capabilities, as shown in Equation (8).…”
Section: The Dvacnn-based Intrusion Detection Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…After passing through the ReLU activation function again, the data are sent to the max-pooling layer. This step further abstracts features and reduces dimensionality, helping to strengthen the feature extraction of the model and generalization capabilities, as shown in Equation (8).…”
Section: The Dvacnn-based Intrusion Detection Modelmentioning
confidence: 99%
“…To address this challenge, some approaches propose aggregating local datasets from devices for deep learning training. However, this practice may raise privacy concerns because sensitive information from devices could potentially be exposed to unauthorized personnel during data transmission [ 8 ]. Therefore, in researching network intrusion detection systems, it is essential to balance data security and model effectiveness to ensure that systems protect IIoT security while respecting user privacy rights.…”
Section: Introductionmentioning
confidence: 99%