A Comprehensive Survey of Databases and Deep Learning Methods for Cybersecurity and Intrusion Detection Systems

Creative Commons License

Gümüşbaş D., Yıldırım T., Genovese A., Scotti F.

IEEE SYSTEMS JOURNAL, vol.15, no.2, pp.1717-1731, 2021 (SCI-Expanded) identifier identifier

  • Publication Type: Article / Article
  • Volume: 15 Issue: 2
  • Publication Date: 2021
  • Doi Number: 10.1109/jsyst.2020.2992966
  • Journal Indexes: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Compendex, INSPEC
  • Page Numbers: pp.1717-1731
  • Keywords: Feature extraction, Computer security, Intrusion detection, Benchmark testing, Data collection, Databases, Machine learning, Cybersecurity, deep learning (DL), intrusion detection system (IDS), TRAFFIC CLASSIFICATION, NETWORK, INTERNET, REPRESENTATIONS
  • Yıldız Technical University Affiliated: Yes


This survey presents a comprehensive overview of machine learning methods for cybersecurity intrusion detection systems, with a specific focus on recent approaches based on deep learning (DL). The review analyzes recent methods with respect to their intrusion detection mechanisms, performance results, and limitations as well as whether they use benchmark databases to ensure a fair evaluation. In addition, a detailed investigation of benchmark datasets for cybersecurity is presented. This article is intended to provide a road map for readers who would like to understand the potential of DL methods for cybersecurity and intrusion detection systems, along with a detailed analysis of the benchmark datasets used in the literature to train DL models.