A Systematic Review on Intrusion Detection System


  • Vineeta Shrivastava


In the ever-evolving landscape of cyber threats, ensuring the security of internet-connected systems is of paramount importance. This study delves into the realm of cyber security, focusing on Intrusion Detection Systems (IDS) and their categorizations, mainly abuse (signature-based) and anomaly (behavior-based) detection. The article highlights the strengths and weaknesses of both methods and underscores the increasing need for machine learning strategies in cyber intrusion detection. Machine learning techniques offer promise in enhancing detection rates and minimizing false positives. Three main categories of anomaly-based IDS are examined: supervised, unsupervised, and semi-supervised. The study further explores and evaluates the performance of Support Vector Machine (SVM), Random Forest (RF), and Extreme Learning Machine (ELM) on the commonly used KDD dataset. A comprehensive review of recent contributions in the field is also presented, detailing the techniques used, datasets, accuracy rates, and associated limitations.


Download data is not yet available.

Author Biography

Vineeta Shrivastava

Ph.D. Scholar

LNCT University

Bhopal, M.P., India



T. Wisanwanichthan and M. Thammawichai, “A Double-Layered Hybrid Approach for Network Intrusion Detection System Using Combined Naive Bayes and SVM,” IEEE Access, vol. 9, pp. 138432–138450, 2021, doi: 10.1109/ACCESS.2021.3118573.

G. Pu, L. Wang, J. Shen, and F. Dong, “A hybrid unsupervised clustering-based anomaly detection method,” Tsinghua Sci. Technol., vol. 26, no. 2, pp. 146–153, 2021, doi: 10.26599/TST.2019.9010051.

A. Guezzaz, Y. Asimi, M. Azrour, and A. Asimi, “Mathematical validation of proposed machine learning classifier for heterogeneous traffic and anomaly detection,” Big Data Min. Anal., vol. 4, no. 1, pp. 18–24, 2021, doi: 10.26599/BDMA.2020.9020019.

S. M. Kasongo and Y. Sun, “A deep learning method with filter based feature engineering for wireless intrusion detection system,” IEEE Access, vol. 7, pp. 38597–38607, 2019, doi: 10.1109/ACCESS.2019.2905633.

Z. Chkirbene, A. Erbad, R. Hamila, A. Mohamed, M. Guizani, and M. Hamdi, “TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection,” IEEE Access, vol. 8, pp. 95864–95877, 2020, doi: 10.1109/ACCESS.2020.2994931.

G. Loukas, T. Vuong, R. Heartfield, G. Sakellari, Y. Yoon, and D. Gan, “Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning,” IEEE Access, vol. 6, pp. 3491–3508, 2017, doi: 10.1109/ACCESS.2017.2782159.

L. Liu, P. Wang, J. Lin, and L. Liu, “Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning,” IEEE Access, vol. 9, pp. 7550–7563, 2021, doi: 10.1109/ACCESS.2020.3048198.

M. A. Siddiqi and W. Pak, “An Agile Approach to Identify Single and Hybrid Normalization for Enhancing Machine Learning-Based Network Intrusion Detection,” IEEE Access, vol. 9, pp. 137494–137513, 2021, doi: 10.1109/ACCESS.2021.3118361.

Y. Uhm and W. Pak, “Service-Aware Two-Level Partitioning for Machine Learning-Based Network Intrusion Detection with High Performance and High Scalability,” IEEE Access, vol. 9, pp. 6608–6622, 2021, doi: 10.1109/ACCESS.2020.3048900.

Z. K. Maseer, R. Yusof, N. Bahaman, S. A. Mostafa, and C. F. M. Foozy, “Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset,” IEEE Access, vol. 9, pp. 22351–22370, 2021, doi: 10.1109/ACCESS.2021.3056614.

M. Al-Qatf, Y. Lasheng, M. Al-Habib, and K. Al-Sabahi, “Deep Learning Approach Combining Sparse Autoencoder with SVM for Network Intrusion Detection,” IEEE Access, vol. 6, pp. 52843–52856, 2018, doi: 10.1109/ACCESS.2018.2869577.

D. Park, S. Kim, H. Kwon, D. Shin, and D. Shin, “Host-Based Intrusion Detection Model Using Siamese Network,” IEEE Access, vol. 9, pp. 76614–76623, 2021, doi: 10.1109/ACCESS.2021.3082160.

L. Nie et al., “Intrusion Detection for Secure Social Internet of Things Based on Collaborative Edge Computing: A Generative Adversarial Network-Based Approach,” IEEE Trans. Comput. Soc. Syst., vol. 9, no. 1, pp. 134–145, 2022, doi: 10.1109/TCSS.2021.3063538.

A. A. Elsaeidy, N. Jagannath, A. G. Sanchis, A. Jamalipour, and K. S. Munasinghe, “Replay Attack Detection in Smart Cities Using Deep Learning,” IEEE Access, vol. 8, pp. 137825–137837, 2020, doi: 10.1109/ACCESS.2020.3012411.

C. Xu, J. Shen, X. Du, and F. Zhang, “An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units,” IEEE Access, vol. 6, pp. 48697–48707, 2018, doi: 10.1109/ACCESS.2018.2867564.

S. Seth, K. K. Chahal, and G. Singh, “A Novel Ensemble Framework for an Intelligent Intrusion Detection System,” IEEE Access, vol. 9, pp. 138451–138467, 2021, doi: 10.1109/ACCESS.2021.3116219.

Z. Tian, C. Luo, J. Qiu, X. Du, and M. Guizani, “A Distributed Deep Learning System for Web Attack Detection on Edge Devices,” IEEE Trans. Ind. Informatics, vol. 16, no. 3, pp. 1963–1971, 2020, doi: 10.1109/TII.2019.2938778.

S. Manimurugan, S. Al-Mutairi, M. M. Aborokbah, N. Chilamkurti, S. Ganesan, and R. Patan, “Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network,” IEEE Access, vol. 8, pp. 77396–77404, 2020, doi: 10.1109/ACCESS.2020.2986013.

X. Gao, C. Shan, C. Hu, Z. Niu, and Z. Liu, “An Adaptive Ensemble Machine Learning Model for Intrusion Detection,” IEEE Access, vol. 7, pp. 82512–82521, 2019, doi: 10.1109/ACCESS.2019.2923640.

L. Le Jeune, T. Goedemé, and N. Mentens, “Machine Learning for Misuse-Based Network Intrusion Detection: Overview, Unified Evaluation and Feature Choice Comparison Framework,” IEEE Access, vol. 9, pp. 63995–64015, 2021, doi: 10.1109/ACCESS.2021.3075066.

H. Benaddi, K. Ibrahimi, A. Benslimane, M. Jouhari, and J. Qadir, “Robust Enhancement of Intrusion Detection Systems using Deep Reinforcement Learning and Stochastic Game,” IEEE Trans. Veh. Technol., pp. 1–14, 2022, doi: 10.1109/TVT.2022.3186834.

G. Kaur, A. Habibi Lashkari, and A. Rahali, “Intrusion Traffic Detection and Characterization using Deep Image Learning,” in 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2020, pp. 55–62. doi: 10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00025.

{23} M. Abdel-Basset, V. Chang, H. Hawash, R. K. Chakrabortty, and M. Ryan, “Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment,” IEEE Trans. Ind. Informatics, vol. 17, no. 11, pp. 7704–7715, 2021, doi: 10.1109/TII.2020.3025755.




How to Cite

Shrivastava, V. (2023). A Systematic Review on Intrusion Detection System . SMART MOVES JOURNAL IJOSCIENCE, 9(3), 01=06. Retrieved from http://ijoscience.com/index.php/ojsscience/article/view/509