A Comprehensive Survey of Databases and Deep Learning Methods for Cybersecurity and Intrusion Detection Systems


Creative Commons License

Gümüşbaş D., Yıldırım T. , Genovese A., Scotti F.

IEEE SYSTEMS JOURNAL, vol.15, no.2, pp.1717-1731, 2021 (Journal Indexed in SCI) identifier identifier

  • Publication Type: Article / Article
  • Volume: 15 Issue: 2
  • Publication Date: 2021
  • Doi Number: 10.1109/jsyst.2020.2992966
  • Title of Journal : IEEE SYSTEMS JOURNAL
  • Page Numbers: pp.1717-1731
  • Keywords: Feature extraction, Computer security, Intrusion detection, Benchmark testing, Data collection, Databases, Machine learning, Cybersecurity, deep learning (DL), intrusion detection system (IDS), TRAFFIC CLASSIFICATION, NETWORK, INTERNET, REPRESENTATIONS

Abstract

This survey presents a comprehensive overview of machine learning methods for cybersecurity intrusion detection systems, with a specific focus on recent approaches based on deep learning (DL). The review analyzes recent methods with respect to their intrusion detection mechanisms, performance results, and limitations as well as whether they use benchmark databases to ensure a fair evaluation. In addition, a detailed investigation of benchmark datasets for cybersecurity is presented. This article is intended to provide a road map for readers who would like to understand the potential of DL methods for cybersecurity and intrusion detection systems, along with a detailed analysis of the benchmark datasets used in the literature to train DL models.