4.5 Review

A systematic literature review of methods and datasets for anomaly-based network intrusion detection

期刊

COMPUTERS & SECURITY
卷 116, 期 -, 页码 -

出版社

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2022.102675

关键词

Intrusion detection; Systematic literature review; Machine learning; Datasets

资金

  1. National Natural Sci-ence Foundation of China [61902010]
  2. Major Research Plan of National Natural Science Foundation of China [92167102]
  3. Project of Beijing Municipal Education Commission [KM202110005025]

向作者/读者索取更多资源

With the rapid evolution of network techniques, network attacks are becoming more sophisticated and threatening. Network intrusion detection is widely recognized as an effective method to address network threats. Anomaly-based network intrusion detection is an important research direction, but there is a lack of systematic literature reviews on recent techniques and datasets. In this study, we conducted a systematic literature review of 119 top-cited papers on anomaly-based intrusion detection, investigating the technical landscape of the field from various perspectives, and identifying unsolved research challenges and future research directions.
As network techniques rapidly evolve, attacks are becoming increasingly sophisticated and threatening. Network intrusion detection has been widely accepted as an effective method to deal with network threats. Many approaches have been proposed, exploring different techniques and targeting different types of traffic. Anomaly-based network intrusion detection is an important research and development di-rection of intrusion detection. Despite the extensive investigation of anomaly-based network intrusion de-tection techniques, there lacks a systematic literature review of recent techniques and datasets. We follow the methodology of systematic literature review to survey and study 119 top-cited papers on anomaly-based intrusion detection. Our study rigorously and comprehensively investigates the technical landscape of the field in order to facilitate subsequent research within this field. Specifically, our investigation is conducted from the following perspectives: application domains, data preprocessing and attack-detection techniques, evaluation metrics, coauthor relationships, and datasets. Based on the research results, we identify unsolved research challenges and unstudied research topics from each perspective, respectively. Finally, we present several promising high-impact future research directions. (c) 2022 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据