Intelligent Techniques for Detecting Network Attacks: Review and Research Directions

被引:25
|
作者
Aljabri, Malak [1 ,2 ]
Aljameel, Sumayh S. [3 ]
Mohammad, Rami Mustafa A. [4 ]
Almotiri, Sultan H. [1 ]
Mirza, Samiha [2 ]
Anis, Fatima M. [2 ]
Aboulnour, Menna [2 ]
Alomari, Dorieh M. [5 ]
Alhamed, Dina H. [5 ]
Altamimi, Hanan S. [2 ]
机构
[1] Umm Al Qura Univ, Coll Comp & Informat Syst, Comp Sci Dept, Mecca 21955, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, SAUDI ARAMCO Cybersecur Chair, POB 1982, Dammam 31441, Saudi Arabia
[3] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, POB 1982, Dammam 31441, Saudi Arabia
[4] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Informat Syst, POB 1982, Dammam 31441, Saudi Arabia
[5] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Engn, SAUDI ARAMCO Cybersecur, POB 1982, Dammam 31441, Saudi Arabia
关键词
network security; network attacks; attack detection; machine learning; deep learning; INTRUSION DETECTION; LEARNING APPROACH; MACHINE; CLASSIFICATION; BOTNET; URL; WEB; IOT;
D O I
10.3390/s21217070
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks. Network attacks refer to all types of unauthorized access to a network including any attempts to damage and disrupt the network, often leading to serious consequences. Network attack detection is an active area of research in the community of cybersecurity. In the literature, there are various descriptions of network attack detection systems involving various intelligent-based techniques including machine learning (ML) and deep learning (DL) models. However, although such techniques have proved useful within specific domains, no technique has proved useful in mitigating all kinds of network attacks. This is because some intelligent-based approaches lack essential capabilities that render them reliable systems that are able to confront different types of network attacks. This was the main motivation behind this research, which evaluates contemporary intelligent-based research directions to address the gap that still exists in the field. The main components of any intelligent-based system are the training datasets, the algorithms, and the evaluation metrics; these were the main benchmark criteria used to assess the intelligent-based systems included in this research article. This research provides a rich source of references for scholars seeking to determine their scope of research in this field. Furthermore, although the paper does present a set of suggestions about future inductive directions, it leaves the reader free to derive additional insights about how to develop intelligent-based systems to counter current and future network attacks.
引用
收藏
页数:43
相关论文
共 50 条
  • [1] Computational intelligent techniques for detecting denial of service attacks
    Mukkamala, S
    Sung, AH
    [J]. INNOVATIONS IN APPLIED ARTIFICIAL INTELLIGENCE, 2004, 3029 : 616 - 624
  • [2] Detecting Malicious URLs Using Machine Learning Techniques: Review and Research Directions
    Aljabri, Malak
    Altamimi, Hanan S.
    Albelali, Shahd A.
    Al-Harbi, Maimunah
    Alhuraib, Haya T.
    Alotaibi, Najd K.
    Alahmadi, Amal A.
    Alhaidari, Fahd
    Mohammad, Rami Mustafa A.
    Salah, Khaled
    [J]. IEEE ACCESS, 2022, 10 : 121395 - 121417
  • [3] Cybersecurity in Deep Learning Techniques: Detecting Network Attacks
    Ghazal, Shatha Fawaz
    Mjlae, Salameh A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (11) : 221 - 230
  • [4] INTELLIGENT NETWORK DIRECTIONS
    SABLE, EG
    KETTLER, HW
    [J]. AT&T TECHNICAL JOURNAL, 1991, 70 (3-4): : 2 - 10
  • [5] Security Attacks in Named Data Networking: A Review and Research Directions
    Kumar, Naveen
    Singh, Ashutosh Kumar
    Aleem, Abdul
    Srivastava, Shashank
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2019, 34 (06): : 1319 - 1350
  • [6] Security Attacks in Named Data Networking: A Review and Research Directions
    Kumar N.
    Singh A.K.
    Aleem A.
    Srivastava S.
    [J]. Journal of Computer Science and Technology, 2019, 34 (06): : 1319 - 1350
  • [7] Research on techniques for detecting brute-force attacks on corporate email
    Liu, Xiaomei
    Hu, Xuewei
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2024, 24 (03) : 1379 - 1393
  • [8] Research Directions in Network Architectures and Protocols for Intelligent Digital Infrastructures
    Garcia-Luna-Aceves, J. J.
    [J]. PROCEEDINGS OF THE INT'L ACM CONFERENCE ON MODELING, ANALYSIS AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, MSWIM 2023, 2023, : 1 - 4
  • [9] Adversarial NLP for Social Network Applications: Attacks, Defenses, and Research Directions
    Alsmadi, Izzat
    Ahmad, Kashif
    Nazzal, Mahmoud
    Alam, Firoj
    Al-Fuqaha, Ala
    Khreishah, Abdallah
    Algosaibi, Abdulelah
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 10 (06) : 3089 - 3108
  • [10] A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions
    De Alwis, Chamitha
    Porambage, Pawani
    Dev, Kapal
    Gadekallu, Thippa Reddy
    Liyanage, Madhusanka
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (01): : 534 - 570