Research Trends in Network-Based Intrusion Detection Systems: A Review

Network threats and hazards are evolving at a high-speed rate in recent years. Many mechanisms (such as firewalls, anti-virus, anti-malware, and spam filters) are being used as security tools to protect networks. An intrusion detection system (IDS) is also an effective and powerful network security...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Satish Kumar, Sunanda Gupta, Sakshi Arora
Formato: article
Lenguaje:EN
Publicado: IEEE 2021
Materias:
Acceso en línea:https://doaj.org/article/24eb410d6afb4162ad40d7d97c8c2747
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:24eb410d6afb4162ad40d7d97c8c2747
record_format dspace
spelling oai:doaj.org-article:24eb410d6afb4162ad40d7d97c8c27472021-12-03T00:00:44ZResearch Trends in Network-Based Intrusion Detection Systems: A Review2169-353610.1109/ACCESS.2021.3129775https://doaj.org/article/24eb410d6afb4162ad40d7d97c8c27472021-01-01T00:00:00Zhttps://ieeexplore.ieee.org/document/9623451/https://doaj.org/toc/2169-3536Network threats and hazards are evolving at a high-speed rate in recent years. Many mechanisms (such as firewalls, anti-virus, anti-malware, and spam filters) are being used as security tools to protect networks. An intrusion detection system (IDS) is also an effective and powerful network security system to detect unauthorized and abnormal network traffic flow. This article presents a review of the research trends in network-based intrusion detection systems (NIDS), their approaches, and the most common datasets used to evaluate IDS Models. The analysis presented in this paper is based on the number of citations acquired by an article published, the total count of articles published related to intrusion detection in a year, and most cited research articles related to the intrusion detection system in journals and conferences separately. Based on the published articles in the intrusion detection field for the last 15 years, this article also discusses the state-of-the-arts of NIDS, commonly used NIDS, citation-based analysis of benchmark datasets, and NIDS techniques used for intrusion detection. A citation and publication-based comparative analysis to quantify the popularity of various approaches are also presented in this paper. The study in this article may be helpful to the novices and researchers interested in evaluating research trends in NIDS and their related applications.Satish KumarSunanda GuptaSakshi AroraIEEEarticleCitationmachine learningbio-inspiredintrusion detection systemNIDSdatasetsElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENIEEE Access, Vol 9, Pp 157761-157779 (2021)
institution DOAJ
collection DOAJ
language EN
topic Citation
machine learning
bio-inspired
intrusion detection system
NIDS
datasets
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
spellingShingle Citation
machine learning
bio-inspired
intrusion detection system
NIDS
datasets
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
Satish Kumar
Sunanda Gupta
Sakshi Arora
Research Trends in Network-Based Intrusion Detection Systems: A Review
description Network threats and hazards are evolving at a high-speed rate in recent years. Many mechanisms (such as firewalls, anti-virus, anti-malware, and spam filters) are being used as security tools to protect networks. An intrusion detection system (IDS) is also an effective and powerful network security system to detect unauthorized and abnormal network traffic flow. This article presents a review of the research trends in network-based intrusion detection systems (NIDS), their approaches, and the most common datasets used to evaluate IDS Models. The analysis presented in this paper is based on the number of citations acquired by an article published, the total count of articles published related to intrusion detection in a year, and most cited research articles related to the intrusion detection system in journals and conferences separately. Based on the published articles in the intrusion detection field for the last 15 years, this article also discusses the state-of-the-arts of NIDS, commonly used NIDS, citation-based analysis of benchmark datasets, and NIDS techniques used for intrusion detection. A citation and publication-based comparative analysis to quantify the popularity of various approaches are also presented in this paper. The study in this article may be helpful to the novices and researchers interested in evaluating research trends in NIDS and their related applications.
format article
author Satish Kumar
Sunanda Gupta
Sakshi Arora
author_facet Satish Kumar
Sunanda Gupta
Sakshi Arora
author_sort Satish Kumar
title Research Trends in Network-Based Intrusion Detection Systems: A Review
title_short Research Trends in Network-Based Intrusion Detection Systems: A Review
title_full Research Trends in Network-Based Intrusion Detection Systems: A Review
title_fullStr Research Trends in Network-Based Intrusion Detection Systems: A Review
title_full_unstemmed Research Trends in Network-Based Intrusion Detection Systems: A Review
title_sort research trends in network-based intrusion detection systems: a review
publisher IEEE
publishDate 2021
url https://doaj.org/article/24eb410d6afb4162ad40d7d97c8c2747
work_keys_str_mv AT satishkumar researchtrendsinnetworkbasedintrusiondetectionsystemsareview
AT sunandagupta researchtrendsinnetworkbasedintrusiondetectionsystemsareview
AT sakshiarora researchtrendsinnetworkbasedintrusiondetectionsystemsareview
_version_ 1718373978142146560