A Comprehensive Review: Performance Analysis of Machine and Deep Learning Techniques for Intrusion Detection Using Synthetic Data

A Comprehensive Review: Performance Analysis of Machine and Deep Learning Techniques for Intrusion Detection Using Synthetic Data

  IJETT-book-cover           
  
© 2025 by IJETT Journal
Volume-73 Issue-4
Year of Publication : 2025
Author : Neha, Abhishek Kajal
DOI : 10.14445/22315381/IJETT-V73I4P128

How to Cite?
Neha, Abhishek Kajal, "A Comprehensive Review: Performance Analysis of Machine and Deep Learning Techniques for Intrusion Detection Using Synthetic Data," International Journal of Engineering Trends and Technology, vol. 73, no. 4, pp.341-367, 2025. Crossref, https://doi.org/10.14445/22315381/IJETT-V73I4P128

Abstract
In current times, the security of information for critical infrastructures has become extremely crucial. The most common threat faced by CIIs is in the form of frequent network intrusions. This article provides a comprehensive analysis of various intrusion detection techniques and cybersecurity measures for critical infrastructures. The main aim is to present a comparative analysis of network performance in the presence of DDoS, DoS, malware, APT and Ransomware attacks while also analyzing solutions to mitigate these challenges in different sectors of critical infrastructures like healthcare, government, defense, energy, and other online platforms. The study evaluates the effectiveness of emerging ML and DL approaches such as DT, RF, SVM, CNN, LSTM, GRU, RNN, etc. The most widely used datasets, such as KDD-Cup99, NSL-KDD, CICIDS2017-18-19, BOT-IoT, and TON-IoT, were also analyzed for evaluating the efficiency proposed by researchers for safeguarding CIIs. The dataset analysis investigates the performance dependence against the features used in feature engineering, followed by feature selection and feature extraction techniques. This review study also provides an overview of NIDS, Anomaly, behavior-based detection and IPS. This article analyzes the recent papers and highlights the significance of thorough testing on large datasets and the need for real-time situation comparisons to understand the effectiveness of these methods in protecting IDS for CIIs. Most of the information in the article is extracted from reputed database depositories and research articles retrieved from 2005 to 2024. In the end, the various challenges and recommendations will be outlined to be helpful in future research directions. Moreover, these ML and DL techniques were implemented on a synthetic dataset against three cyber-attack types: DDoS, SQL Injection and ransomware. We observed that the accuracy of DL-based techniques improved with the increase in the number of data samples, getting 98.8 accuracy for CNN against a sample of 10 lakh instances, including 20 attributes.

Keywords
Machine Learning, Deep Learning, Critical Information Infrastructures, Publicly available datasets, Syntactic dataset, IDS.

References
[1] Fauziyah Fauziyah, Zhaosun Wang, and Gabriel Joy, “Knowledge Management Strategy for Handling Cyber-Attacks in E- Commerce with Computer Security Incident Response Team CSIRT,” Jounal of Information Security, vol. 13, no. 4, pp. 294-311, 2022.
[Google Scholar] [Publisher Link]
[2] Mario Aragonés Lozano, Israel Pérez Llopis, and Manuel Esteve Domingo, “Threat Hunting System for Protecting Critical Infrastructures Using a Machine Learning Approach,” Mathematics, vol. 11, no. 16, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Zubair Baig, “Multi-Agent Systems for Protecting Critical Infrastructures: A Survey,” Journal of Network and Computer Applications, vol. 35, no. 3, pp. 1151-1161, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Suhail Qadir, and Uzair Bashir, “Measuring the Impact of DoS Attack on Availability: Empirical Study Based on Accessibility,” Journal of Information Security, vol. 13, no. 2, pp. 66-75, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[5] William Grant Hatcher, and Wei Yu, “A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends,” IEEE Access, vol. 6, pp. 24411-24432, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Weihong Ren et al., “Technical Framework Research on Critical Information Infrastructure Cybersecurity Classified Protection,” Proceedings of the 4th International Conference on Machinery, Materials and Information Technology Applications, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Hugo Riggs et al., “Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure,” Sensors, vol. 23, no. 8, pp. 1-26, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Mitchell Kirshner, “Model-Based Systems Engineering Cybersecurity for Space Systems,” Aerospace, vol. 10, no. 2, pp. 1-17, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Sheraz Naseer et al., “Enhanced Net Work Anomaly Detection Based on Deep Neural Networks,” IEEE Access, vol. 6, pp. 48231-48246, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Rosslin John Robles et al., “Common Threats and Vulnerabilities of Critical Infrastructures,” International Journal of Control and Automation, vol. 1, no. 1, pp. 17-22, 2008.
[Google Scholar] [Publisher Link]
[11] Rui Filipe Silva, Raul Barbosa, and Jorge Bernardino, “Intrusion Detection Systems for Mitigating SQL Injection Attacks: Review and State-Of- Practice,” International Journal of Information Security and Privacy, vol. 14, no. 2, pp. 1-21, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Tianqing Zhu et al., “More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence,” IEEE Transactions on Knowledge and Data Engineering, vol. 34, no. 6, pp. 2824-2843, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Javier Lopez, Roberto Setola, and Stephen D. Wolthusen, Overview of Critical Information Infrastructure Protection, Critical Infrastructure Protection: Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense, Springer, Berlin, Heidelberg, pp. 1-14, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Eugene Nickolov, “Critical Information Infrastructure Protection: Analysis, Evaluation and Expectations,” Information and Security, vol. 17, pp. 105-116, 2006.
[Google Scholar]
[15] Leandros Maglaras, Helge Janicke, and Mohamed Amine Ferrag, “Cybersecurity of Critical Infrastructures: Challenges and Solutions,” Sensors, vol. 22, no. 14, pp. 1-4, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Hussein Ali, Omar M. Elzeki, and Samir Elmougy, “Smart Attacks Learning Machine Advisor System for Protecting Smart Cities from Smart Threats,” Applied Sciences, vol. 12, no. 13, pp. 1-24, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Manuel Domínguez et al., “Design of Platforms for Experimentation in Industrial Cybersecurity,” Applied Sciences, vol. 12, no. 13, pp. 1-16, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Leandros Maglaras et al., “Threats, Countermeasures and Attribution of Cyber-Attacks on Critical Infrastructures,” EAI Endorsed Transactions on Security and Safety, vol. 5, no. 16, pp. 1-9, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Mazen Gazzan, and Frederick T. Sheldon, “Opportunities for Early Detection and Prediction of Ransomware Attacks Against Industrial Control Systems,” Future Internet, vol. 15, no. 4, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Bambang Susilo, and Riri Fitri Sari, “Intrusion Detection in IOT Networks Using Deep Learning Algorithm,” Information, vol. 11, no. 5, pp. 1-11, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Yang Xin et al., “Machine Learning and Deep Learning Methods for Cybersecurity,” IEEE Access, vol. 6, pp. 35365-35381, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Yadigar N. Imamverdiyev, and Fargana J. Abdullayeva, “Deep Learning in Cybersecurity: Challenges and Approaches,” International Journal of Cyber Warfare and Terrorism, vol. 10, no. 2, pp. 82-105, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Fotios Gioulekas et al., “A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures,” Healthcare, vol. 10, no. 2, pp. 1-19, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Kitty Kioskli et al., “The Importance of Conceptualizing the Human-Centric Approach in Maintaining and Promoting Cybersecurity-Hygiene in Healthcare 4.0,” Applied Sciences, vol. 13, no. 6, pp. 1-16, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Namhla Mtukushe et al., “Review of Cyberattack Implementation, Detection, and Mitigation Methods in Cyber-Physical Systems,” Energies, vol. 16, no. 13, pp. 1-25, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Daria Gaskova, and Elena Galperova, “Decision Support in the Analysis of Cyber Situational Awareness of Energy Facilities,” Engineering Proceedings, vol. 33, no. 1, pp. 1-9, 2023.
[CrossRef] [Google Scholar ] [Publisher Link]
[27] Nikolaos Nikolaou et al., “Vulnerability Identification and Assessment for Critical Infrastructures in the Energy Sector,” Electronics, vol. 12, no. 14, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Ricardo Severino et al., “Performance Assessment and Mitigation of Timing Covert Channels Over the IEEE 802.15.4,” Journal of Sensor and Actuator Networks, vol. 12, no. 4, pp. 1-25, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Andrea Pinto et al., “Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure,” Sensors, vol. 23, no. 5, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Mengmeng Ge et al., “Towards a Deep Learning-Driven Intrusion Detection Approach for Internet of Things,” Computer Networks, vol. 186, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Rotem Bar, and Chen Hajaj, “Simcse for Encrypted Traffic Detection and Zero-Day Attack Detection,” IEEE Access, vol. 10, pp. 56952-56960, 2022.
[CrossRef] [Google Scholar ] [Publisher Link]
[32] Asmaa Halbouni et al., “Machine Learning and Deep Learning Approaches for Cybersecurity: A Review,” IEEE Access, vol. 10, pp. 19572-19585, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Elochukwu Ukwandu et al., “Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends,” Information, vol. 13, no. 3, pp. 1-22, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Daniel Fährmann et al., “Lightweight Long Short-Term Memory Variational Auto-Encoder for Multivariate Time Series Anomaly Detection in Industrial Control Systems,” Sensors, vol. 22, no. 8, pp. 1-23, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[35] M.R. Gauthama Raman, Chuadhry Mujeeb Ahmed, and Aditya Mathur, “Machine Learning for Intrusion Detection in Industrial Control Systems: Challenges and Lessons from Experimental Evaluation,” Cybersecurity, vol. 4, no. 1, pp. 1-12, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Dimitrios Papamartzivanos, Félix Gómez Mármol, and Georgios Kambourakis, “Introducing Deep Learning Self- Adaptive Misuse Network Intrusion Detection Systems, IEEE Access, vol. 7, pp. 13546-13560, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Dipanjan Das Roy, and Dongwan Shin, “Network Intrusion Detection in Smart Grids for Imbalanced Attack Types Using Machine Learning Models,” IEEE International Conference on Information and Communication Technology Convergence, Jeju, Korea (South), pp. 576-581, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Gbenga Ikuomenisan, and Yasser Morgan, “Meta-Review of Recent and Landmark Honeypot Research and Surveys,” Journal of Information Security, vol. 13, no. 4, pp. 181-209, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[39] Iman Sharafaldin et al., “Developing Realistic Distributed Denial of Service (DDOS) Attack Dataset and Taxonomy,” IEEE International Carnahan Conference on Security Technology, Chennai, India, pp. 1-8, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[40] Patrick Vanin et al., “A Study of Network Intrusion Detection Systems Using Artificial Intelligence/Machine Learning,” Applied Sciences, vol. 12, no. 22, pp. 1-27, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Magdy M. Fadel et al., “HDLIDP: A Hybrid Deep Learning Intrusion Detection and Prevention Framework,” Computers, Materials and Continua, vol. 73, no. 2, pp. 2293-2312, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[42] Auwal Sani Iliyasu, Usman Alhaji Abdurrahman, and Lirong Zheng, “Few-Shot Network Intrusion Detection using Discriminative Representation Learning with Supervised Autoencoder,” Applied Sciences, vol. 12, no. 5, pp. 1-17, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[43] Mohd Nor Akmal Khalid, Amjed Ahmed Al-Kadhimi, and Manmeet Mahinderjit Singh, “Recent Developments in Game-Theory Approaches for the Detection and Defense against Advanced Persistent Threats (APTS): A Systematic Review,” Mathematics, vol. 11, no. 6, pp. 1-34, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[44] Joakim Kävrestad et al., “Evaluation of Contextual and Game-Based Training for Phishing Detection,” Future Internet, vol. 14, no. 4, pp. 1-16, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[45] Ruipeng Yang et al., “Subspace Clustering Via Graph Auto-Encoder Network for Unknown Encrypted Traffic Recognition,” Cybersecurity, vol. 5, no. 1, pp. 1-15, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[46] Yakub Kayode Saheed et al., “A Machine Learning-Based Intrusion Detection for Detecting Internet of Things Network Attacks,” Alexandria Engineering Journal, vol. 61, no. 12, pp. 9395-9409, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[47] R. Vinayakumar et al., “Robust Intelligent Malware Detection using Deep Learning,” IEEE Access, vol. 7, pp. 46717-46738, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[48] Hasan Alkahtani, and Theyazn H. H. Aldhyani, “Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep-Learning Algorithms,” Complexity, vol. 2021, pp. 1-18, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[49] Kun Jia et al., “A Lightweight DDOS Detection Scheme under SDN Context,” Cybersecurity, vol. 5, no. 1, pp. 1-15, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[50] Zihan Wu et al., “RTIDS: A Robust Transformer- Based Approach for Intrusion Detection System,” IEEE Access, vol. 10, pp. 64375-64387, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[51] Hashida Haidros Rahima Manzil, and S. Manohar Naik, “Android Malware Category Detection Using a Novel Feature Vector-Based Machine Learning Model,” Cybersecurity, vol. 6, no. 1, pp. 1-11, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[52] R. Vinayakumar et al., “Deep Learning Approach for Intelligent Intrusion Detection System,” IEEE Access, vol. 7, pp. 41525-41550, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[53] Mohamed Amine Ferrag et al., “Edge- IIOTSET: A New Comprehensive Realistic Cyber Security Dataset of IOT and IIOT Applications for Central Ized and Federated Learning,” IEEE Access, vol. 10, pp. 40281-40306, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[54] Jokha Ali, “Intrusion Detection Systems Trends to Counteract Growing Cyber- Attacks on Cyber-Physical Systems,” 22nd International Arab Conference on Information Technology, Muscat, Oman, pp. 1-6, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[55] Masoud Mehrabi Koushki et al., “On Building Machine Learning Pipelines for Android Malware Detection: A Procedural Survey of Practices, Challenges and Opportunities,” Cybersecurity, vol. 5, no. 1, pp. 1-37, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[56] Esra Söğüt, and O. Ayhan Erdem, “A Multi- Model Proposal for Classificationm and Detection of DDOS Attacks on Scada Systems,” Applied Sciences, vol. 13, no. 10, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[57] Muhammad Imran Tariq et al., “A Review of Deep Learning Security and Privacy Defensive Techniques,” Mobile Information Systems, vol. 2020, pp. 1-8, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[58] Sapna Sadhwani et al., “A Lightweight Model for DDOS Attack Detection using Machine Learning Techniques,” Applied Sciences, vol. 13, no. 17, pp. 1-31, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[59] A.O. Adejimi et al., “A Dynamic Intrusion Detection System for Critical Information Infrastructure,” Scientific African, vol. 21, pp. 1-12, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[60] F. Zare, and P. Mahmoudi-Nasr, “Feature Engineering Methods in Intrusion Detection System: A Performance Evaluation,” International Journal of Engineering, Transactions B: Applications, vol. 36, no. 7, pp. 1343-1353, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[61] Chen Hajaj, Nitay Hason, and Nitay Hason, “Less is More: Robust and Novel Features for Malicious Domain Detection,” Electronics, vol. 11, no. 6, pp. 1-19, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[62] Ondrej Linda, Todd Vollmer, and Milos Manic, “Neural Network-Based Intrusion Detection System for Critical Infrastructures,” International Joint Conference on Neural Networks, Atlanta, GA, USA, pp. 1827-1834, 2009.

[CrossRef] [Google Scholar] [Publisher Link]
[63] Abdelouahid Derhab et al., “Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering,” Wireless Communications and Mobile Computing, vol. 2020, pp. 1-16, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[64] William Villegas-Ch, Jaime Govea, and Angel Jaramillo-Alcazar, “IoT Anomaly Detection to Strengthen Cybersecurity in the Critical Infrastructure of Smart Cities,” Applied Sciences, vol. 13, no. 19, pp. 1-20, 2023.
[CrossRef]
[Google Scholar] [Publisher Link]
[65] Abdu Salam et al., “Deep Learning Techniques for Web-Based Attack Detection in Industry 5.0: A Novel Approach,” Technologies, vol. 11, no. 4, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[66] Raisa Abedin Disha, and Sajjad Waheed, “Performance Analysis of Machine Learning Models for Intrusion Detection System using GINI Impurity-Based Weighted Random Forest (GIWRF) Feature Selection Technique,” Cybersecurity, vol. 5, no. 1, pp. 1-22, 2022
. [CrossRef] [Google Scholar] [Publisher Link]
[67] Azriel Henry et al., “Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System,” Sensors, vol. 23, no. 2, pp. 1-22, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[68] Yanmiao Li et al., “One-Class LSTM Network for Anomalous Network Traffic Detection,” Applied Sciences, vol. 12, no. 10, pp. 1-16, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[69] Najla Al-Taleb, and Nazar Abbas Saqib, “Towards a Hybrid Machine Learning Model for Intelligent Cyber Threat Identification in Smart City Environments,” Applied Sciences, vol. 12, no. 4, pp. 1-16, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[70] Bedine Kerim, “Securing IoT Net- Work Against DDOS Attacks Using Multi-Agent IDS,” Journal of Physics: Conference Series, vol. 1898, no. 1, pp. 1-7, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[71] Robert Osei-Kyei et al., “Systematic Review of Critical Infrastructure Resilience Indicators,” Construction Innovation, vol. 23, no. 5, pp. 1210-1231, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[72] Mohanad Sarhan et al., “Feature Extraction for Machine Learning-Based Intrusion Detection in Iot Networks,” Digital Communications and Networks, vol. 10, no. 1, pp. 205-216, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[73] Sydney M. Kasongo, and Yanxia Sun, “Performance Analysis of Intrusion Detection Systems using a Feature Selection Method on the Unsw-Nb15 Dataset,” Journal of Big Data, vol. 7, no. 1, pp. 1-20, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[74] Dhiaa Musleh et al., “Intrusion Detection System using Feature Extraction with Machine Learning Algorithms in IoT,” Journal of Sensor and Actuator Net-Works, vol. 12, no. 2, pp. 1-19, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[75] Anita Gehlot, and Ankita Joshi, “Neural Network Based Intrusion Detection System for Critical Infrastructure,” 2nd Mysore Sub Section International Conference, Mysuru, India, pp. 1-6, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[76] Ahmad Javaid et al., “A Deep Learning Approach for Network Intrusion Detection Systems,” Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies, pp. 21-26, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[77] Dimitris Deyannis et al., “The Diversification and Enhancement of an IDs Scheme for the Cybersecurity Needs of Modern Supply Chains,” Electronics, vol. 11, no. 13, pp. 1-17, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[78] Opeyemi Lateef Usman et al., “Advance Machine Learning Methods for Dyslexia Biomarker Detection: A Review of Implementation Details and Challenges,” IEEE Access, vol. 9, pp. 36879-36897, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[79] Tao Peng et al., “A Lightweight Multi-Source Fast Android Malware Detection Model,” Applied Sciences, vol. 12, no. 11, pp. 1-25, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[80] Jorge Hochstetter-Diez et al., “A Prioritization Strategy for Public Institutions to Improve Information Security Maturity,” Applied Sciences, vol. 13, no. 14, pp. 1-20, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[81] Damilola Adesina et al., “Adversarial Machine Learning in Wireless Communications using Rf Data: A Review,” IEEE Communications Surveys and Tutorials, vol. 25, no. 1, pp. 77-100, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[82] Ioannis Karamitsos et al., “Malware Detection for Forensic Memory using Deep Recurrent Neural Networks,” Journal of Information Security, vol. 11, no. 2, pp. 103-120, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[83] Adeel Abbas et al., “A New Ensemble-Based Intrusion Detection System for Internet of Things,” Arabian Journal for Science and Engineering, vol. 47, no. 2, pp. 1805-1819, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[84] Volodymyr Tkach et al., “Non-Pattern-Based Anomaly Detection in Time-Series,” Electronics, vol. 12, no. 3, pp. 1-25, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[85] Guangming Xian, “Cyber Intrusion Prevention for Large-Scale Semi-Supervised Deep Learning Based on Local and Non-Local Regularization,” IEEE Access, vol. 8, pp. 55526-55539, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[86] Oyeniyi Akeem Alimi, Khmaies Ouahada, and Adnan M. Abu-Mahfouz, “A Review of Machine Learning Approaches to Power System Security and Stability,” IEEE Access, vol. 8, pp. 113512-113531, 2020.
[CrossRef] [Google Scholar ] [Publisher Link]
[87] Lan Liu et al., “Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning,” IEEE Access, vol. 9, pp. 7550-7563, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[88] Idriss Idriss et al., “Toward a Deep Learning-Based Intrusion Detection System for IoT against Botnet Attacks,” International Journal of Artificial Intelligence, vol. 10, no. 1, pp. 110-120, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[89] Abdulaziz Fatani et al., “IoT Intrusion Detection System using Deep Learning and Enhanced Transient Search Optimizationm,” IEEE Access, vol. 9, pp. 123448-12346, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[90] Imtiaz Ullah, and Qusay H. Mahmoud, “Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks, IEEE Access, vol. 9, pp. 103906-103926, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[91] Adel Alqudhaibi et al., “Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations,” Sensors, vol. 23, no. 9, pp. 1-17, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[92] Khaled M. Alnifie, and Charles Kim, “Appraising the Manifestation of Optimism Bias and its Impact on Human Perception of Cyber Security: A Meta-Analysis,” Journal of Information Security, vol. 14, no. 2, pp. 93-110, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[93] Haizhou Wang, Anoop Singhal, and Peng Liu, “Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with Rop Payload Detection,” Cybersecurity, vol. 6, no. 1, pp. 1-15, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[94] Rubayyi Alghamdi, and Martine Bellaiche, “An Ensemble Deep Learning Based IDs for IoT using Lambda Architecture,” Cybersecurity, vol. 6, no. 1, pp. 1-17, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[95] Sung Bum Park, Hyo Jin Jo, and Dong Hoon Lee, “G-IDCS: Graph-Based Intrusion Detection and Classification System for can Protocol,” IEEE Access, vol. 11, pp. 39213-39227, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[96] Zeeshan Ahmad et al., “Network Intrusion Detection System: A Systematic Study of Machine Learning and Deep Learning Approaches,” Transactions on Emerging Telecommunications Technologies, vol. 32. no. 1, pp. 1-29, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[97] Béla Genge, Piroska Haller, and Adrian-Silviu Roman, “E-Apt Detect: Early Advanced Persistent Threat Detection in Critical Infrastructures with Dynamic Attestation,” Applied Sciences, vol. 13, no. 6, pp. 1-22, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[98] Konstantinos Ntafloukas, Daniel P. McCrum, and Daniel P. McCrum, “A Cyber-Physical Risk Assessment Approach for Internet of Things Enabled Transportation Infrastructure,” Applied Sciences, vol. 12, no. 18, pp. 1-20, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[99] Yanjie He, and Wei Li, “A Novel Lightweight Anonymous Proxy Traffic Detection Method Based on Spatial-Temporal Features,” Sensors, vol. 22, no. 11, pp. 1-15, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[100] Chin-Ling Chen, and Jian Lin Lai, “An Experimental Detection of Distributed Denial of Service Attack in CDX 3 Platform Based on Snort,” Sensors, vol. 23, no. 13, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[101] Mahmoud Al-Dwairi et al., “Ransomware-Resilient Self- Healing Xml Documents,” Future Internet, vol. 14, no. 4, pp. 1-19, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[102] João Vitorino, Nuno Oliveira, and Isabel Praça, “Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection,” Future Internet, vol. 14, no. 4, pp. 1-18, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[103] Yingchun Niu et al., “Application of a New Feature Generation Algorithm in Intrusion Detection System,” Wire-Less Communications and Mobile Computing, vol. 2020, pp. 1-7, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[104] Abdulrahman Al-Abassi et al., “An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System,” IEEE Access, vol. 8, pp. 83965-83973, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[105] In-Sun Choi, Junho Hong, and Tae-Wan Kim, “Multi-Agent Based Cyber-Attack Detection and Mitigation for Distribution Automation System,” IEEE Access, vol. 8, pp. 183495-183504, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[106] Yakub Kayode Saheed, Oluwadamilare Harazeem Abdulganiyu, and Taha Ait Tchakoucht, “A Novel Hybrid Ensemble Learning for Anomaly Detection in Industrial Sensor Networks and Scada Systems for Smart City Infrastructures,” Journal of King Saud University-Computer and Information Sciences, vol. 35, no. 5, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[107] Sydney Mambwe Kasongo, and Yanxia Sun, “A Deep Learning Method with Filter-Based Feature Engineering for Wireless Intrusion Detection System,” IEEE Access, vol. 7, pp. 38597-38607, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[108] Tomás Sureda Riera et al., “A New Multi-Label Dataset for Web Attacks Capec Classification using Machine Learning Techniques,” Computers and Security, vol. 120, pp. 1-18, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[109] Shailesh Singh Panwar, Y.P. Raiwani, and Lokesh Singh Panwar, “Evaluation of Network Intrusion Detection with Features Selection and Machine Learning Algorithms on Cicids-2017 Dataset,” International Conference on Advances in Engineering Science Management & Technology, Uttaranchal University, Dehradun, India, pp. 1-10, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[110] Ansam Khraisat et al., “Survey of Intrusion Detection Systems: Techniques, Datasets and Challenges,” Cybersecurity, vol. 2, no.1, pp. 1-22, 2019.
[CrossRef] [Google Scholar] [Publisher Link]