Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions

This study reviews and analyses the research landscape for intrusion detection systems (IDSs) based on deep learning (DL) techniques into a coherent taxonomy and identifies the gap in this pivotal research area. The focus is on articles related to the keywords ‘deep learning’, ‘intrusion’ and ‘attac...

Full description

Bibliographic Details
Main Authors: A. M., Aleesa, Zaidan, B. B., Zaidan, A. A., M. Sahar, Nan
Format: Article
Language:English
Published: Springer 2020
Subjects:
Online Access:http://eprints.uthm.edu.my/5253/
http://eprints.uthm.edu.my/5253/1/AJ%202020%20%28121%29.pdf
_version_ 1848888504512151552
author A. M., Aleesa
Zaidan, B. B.
Zaidan, A. A.
M. Sahar, Nan
author_facet A. M., Aleesa
Zaidan, B. B.
Zaidan, A. A.
M. Sahar, Nan
author_sort A. M., Aleesa
building UTHM Institutional Repository
collection Online Access
description This study reviews and analyses the research landscape for intrusion detection systems (IDSs) based on deep learning (DL) techniques into a coherent taxonomy and identifies the gap in this pivotal research area. The focus is on articles related to the keywords ‘deep learning’, ‘intrusion’ and ‘attack’ and their variations in four major databases, namely Web of Science, ScienceDirect, Scopus and the Institute of Electrical and Electronics Engineers’ Xplore. These databases are sufficiently broad to cover the technical literature. The dataset comprises 68 articles. The largest proportion (72.06%; 49/68) relates to articles that develop an approach for evaluating or identifying intrusion detection techniques using the DL approach. The second largest proportion (22.06%; 15/68) relates to studying/applying articles to the DL area, IDSs or other related issues. The third largest proportion (5.88%; 4/68) discusses frameworks/models for running or adopting IDSs. The basic characteristics of this emerging field are identified from the aspects of motivations, open challenges that impede the technology’s utility, authors’ recommendations and substantial analysis. Then, a result analysis mapping for new directions is discussed. Three phases are designed to meet the demands of detecting distributed denial-of-service attacks with a high accuracy rate. This study provides an extensive resource background for researchers who are interested in IDSs based on DL.
first_indexed 2025-11-15T20:11:20Z
format Article
id uthm-5253
institution Universiti Tun Hussein Onn Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T20:11:20Z
publishDate 2020
publisher Springer
recordtype eprints
repository_type Digital Repository
spelling uthm-52532022-01-06T08:07:26Z http://eprints.uthm.edu.my/5253/ Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions A. M., Aleesa Zaidan, B. B. Zaidan, A. A. M. Sahar, Nan T Technology (General) TK5101-6720 Telecommunication. Including telegraphy, telephone, radio, radar, television This study reviews and analyses the research landscape for intrusion detection systems (IDSs) based on deep learning (DL) techniques into a coherent taxonomy and identifies the gap in this pivotal research area. The focus is on articles related to the keywords ‘deep learning’, ‘intrusion’ and ‘attack’ and their variations in four major databases, namely Web of Science, ScienceDirect, Scopus and the Institute of Electrical and Electronics Engineers’ Xplore. These databases are sufficiently broad to cover the technical literature. The dataset comprises 68 articles. The largest proportion (72.06%; 49/68) relates to articles that develop an approach for evaluating or identifying intrusion detection techniques using the DL approach. The second largest proportion (22.06%; 15/68) relates to studying/applying articles to the DL area, IDSs or other related issues. The third largest proportion (5.88%; 4/68) discusses frameworks/models for running or adopting IDSs. The basic characteristics of this emerging field are identified from the aspects of motivations, open challenges that impede the technology’s utility, authors’ recommendations and substantial analysis. Then, a result analysis mapping for new directions is discussed. Three phases are designed to meet the demands of detecting distributed denial-of-service attacks with a high accuracy rate. This study provides an extensive resource background for researchers who are interested in IDSs based on DL. Springer 2020 Article PeerReviewed text en http://eprints.uthm.edu.my/5253/1/AJ%202020%20%28121%29.pdf A. M., Aleesa and Zaidan, B. B. and Zaidan, A. A. and M. Sahar, Nan (2020) Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions. Neural Computing and Applications, 32. pp. 9827-9858. ISSN 0941-0643 https://doi.org/10.1007/s00521-019-04557-3
spellingShingle T Technology (General)
TK5101-6720 Telecommunication. Including telegraphy, telephone, radio, radar, television
A. M., Aleesa
Zaidan, B. B.
Zaidan, A. A.
M. Sahar, Nan
Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
title Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
title_full Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
title_fullStr Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
title_full_unstemmed Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
title_short Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
title_sort review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
topic T Technology (General)
TK5101-6720 Telecommunication. Including telegraphy, telephone, radio, radar, television
url http://eprints.uthm.edu.my/5253/
http://eprints.uthm.edu.my/5253/
http://eprints.uthm.edu.my/5253/1/AJ%202020%20%28121%29.pdf