A Systematic Review on Intrusion Detection System
Abstract
In the ever-evolving landscape of cyber threats, ensuring the security of internet-connected systems is of paramount importance. This study delves into the realm of cyber security, focusing on Intrusion Detection Systems (IDS) and their categorizations, mainly abuse (signature-based) and anomaly (behavior-based) detection. The article highlights the strengths and weaknesses of both methods and underscores the increasing need for machine learning strategies in cyber intrusion detection. Machine learning techniques offer promise in enhancing detection rates and minimizing false positives. Three main categories of anomaly-based IDS are examined: supervised, unsupervised, and semi-supervised. The study further explores and evaluates the performance of Support Vector Machine (SVM), Random Forest (RF), and Extreme Learning Machine (ELM) on the commonly used KDD dataset. A comprehensive review of recent contributions in the field is also presented, detailing the techniques used, datasets, accuracy rates, and associated limitations.
Downloads
References
References
T. Wisanwanichthan and M. Thammawichai, “A Double-Layered Hybrid Approach for Network Intrusion Detection System Using Combined Naive Bayes and SVM,” IEEE Access, vol. 9, pp. 138432–138450, 2021, doi: 10.1109/ACCESS.2021.3118573.
G. Pu, L. Wang, J. Shen, and F. Dong, “A hybrid unsupervised clustering-based anomaly detection method,” Tsinghua Sci. Technol., vol. 26, no. 2, pp. 146–153, 2021, doi: 10.26599/TST.2019.9010051.
A. Guezzaz, Y. Asimi, M. Azrour, and A. Asimi, “Mathematical validation of proposed machine learning classifier for heterogeneous traffic and anomaly detection,” Big Data Min. Anal., vol. 4, no. 1, pp. 18–24, 2021, doi: 10.26599/BDMA.2020.9020019.
S. M. Kasongo and Y. Sun, “A deep learning method with filter based feature engineering for wireless intrusion detection system,” IEEE Access, vol. 7, pp. 38597–38607, 2019, doi: 10.1109/ACCESS.2019.2905633.
Z. Chkirbene, A. Erbad, R. Hamila, A. Mohamed, M. Guizani, and M. Hamdi, “TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection,” IEEE Access, vol. 8, pp. 95864–95877, 2020, doi: 10.1109/ACCESS.2020.2994931.
G. Loukas, T. Vuong, R. Heartfield, G. Sakellari, Y. Yoon, and D. Gan, “Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning,” IEEE Access, vol. 6, pp. 3491–3508, 2017, doi: 10.1109/ACCESS.2017.2782159.
L. Liu, P. Wang, J. Lin, and L. Liu, “Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning,” IEEE Access, vol. 9, pp. 7550–7563, 2021, doi: 10.1109/ACCESS.2020.3048198.
M. A. Siddiqi and W. Pak, “An Agile Approach to Identify Single and Hybrid Normalization for Enhancing Machine Learning-Based Network Intrusion Detection,” IEEE Access, vol. 9, pp. 137494–137513, 2021, doi: 10.1109/ACCESS.2021.3118361.
Y. Uhm and W. Pak, “Service-Aware Two-Level Partitioning for Machine Learning-Based Network Intrusion Detection with High Performance and High Scalability,” IEEE Access, vol. 9, pp. 6608–6622, 2021, doi: 10.1109/ACCESS.2020.3048900.
Z. K. Maseer, R. Yusof, N. Bahaman, S. A. Mostafa, and C. F. M. Foozy, “Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset,” IEEE Access, vol. 9, pp. 22351–22370, 2021, doi: 10.1109/ACCESS.2021.3056614.
M. Al-Qatf, Y. Lasheng, M. Al-Habib, and K. Al-Sabahi, “Deep Learning Approach Combining Sparse Autoencoder with SVM for Network Intrusion Detection,” IEEE Access, vol. 6, pp. 52843–52856, 2018, doi: 10.1109/ACCESS.2018.2869577.
D. Park, S. Kim, H. Kwon, D. Shin, and D. Shin, “Host-Based Intrusion Detection Model Using Siamese Network,” IEEE Access, vol. 9, pp. 76614–76623, 2021, doi: 10.1109/ACCESS.2021.3082160.
L. Nie et al., “Intrusion Detection for Secure Social Internet of Things Based on Collaborative Edge Computing: A Generative Adversarial Network-Based Approach,” IEEE Trans. Comput. Soc. Syst., vol. 9, no. 1, pp. 134–145, 2022, doi: 10.1109/TCSS.2021.3063538.
A. A. Elsaeidy, N. Jagannath, A. G. Sanchis, A. Jamalipour, and K. S. Munasinghe, “Replay Attack Detection in Smart Cities Using Deep Learning,” IEEE Access, vol. 8, pp. 137825–137837, 2020, doi: 10.1109/ACCESS.2020.3012411.
C. Xu, J. Shen, X. Du, and F. Zhang, “An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units,” IEEE Access, vol. 6, pp. 48697–48707, 2018, doi: 10.1109/ACCESS.2018.2867564.
S. Seth, K. K. Chahal, and G. Singh, “A Novel Ensemble Framework for an Intelligent Intrusion Detection System,” IEEE Access, vol. 9, pp. 138451–138467, 2021, doi: 10.1109/ACCESS.2021.3116219.
Z. Tian, C. Luo, J. Qiu, X. Du, and M. Guizani, “A Distributed Deep Learning System for Web Attack Detection on Edge Devices,” IEEE Trans. Ind. Informatics, vol. 16, no. 3, pp. 1963–1971, 2020, doi: 10.1109/TII.2019.2938778.
S. Manimurugan, S. Al-Mutairi, M. M. Aborokbah, N. Chilamkurti, S. Ganesan, and R. Patan, “Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network,” IEEE Access, vol. 8, pp. 77396–77404, 2020, doi: 10.1109/ACCESS.2020.2986013.
X. Gao, C. Shan, C. Hu, Z. Niu, and Z. Liu, “An Adaptive Ensemble Machine Learning Model for Intrusion Detection,” IEEE Access, vol. 7, pp. 82512–82521, 2019, doi: 10.1109/ACCESS.2019.2923640.
L. Le Jeune, T. Goedemé, and N. Mentens, “Machine Learning for Misuse-Based Network Intrusion Detection: Overview, Unified Evaluation and Feature Choice Comparison Framework,” IEEE Access, vol. 9, pp. 63995–64015, 2021, doi: 10.1109/ACCESS.2021.3075066.
H. Benaddi, K. Ibrahimi, A. Benslimane, M. Jouhari, and J. Qadir, “Robust Enhancement of Intrusion Detection Systems using Deep Reinforcement Learning and Stochastic Game,” IEEE Trans. Veh. Technol., pp. 1–14, 2022, doi: 10.1109/TVT.2022.3186834.
G. Kaur, A. Habibi Lashkari, and A. Rahali, “Intrusion Traffic Detection and Characterization using Deep Image Learning,” in 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2020, pp. 55–62. doi: 10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00025.
{23} M. Abdel-Basset, V. Chang, H. Hawash, R. K. Chakrabortty, and M. Ryan, “Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment,” IEEE Trans. Ind. Informatics, vol. 17, no. 11, pp. 7704–7715, 2021, doi: 10.1109/TII.2020.3025755.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Vineeta Shrivastava

This work is licensed under a Creative Commons Attribution 4.0 International License.
IJOSCIENCE follows an Open Journal Access policy. Authors retain the copyright of the original work and grant the rights of publication to the publisher with the work simultaneously licensed under a Creative Commons CC BY License that allows others to distribute, remix, adapt, and build upon your work, even commercially, as long as they credit you for the original creation. Authors are permitted to post their work in institutional repositories, social media or other platforms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.