{"id":"https://openalex.org/W4394994483","doi":"https://doi.org/10.1109/access.2024.3392338","title":"From Bytes to Insights: A Systematic Literature Review on Unraveling IDS Datasets for Enhanced Cybersecurity Understanding","display_name":"From Bytes to Insights: A Systematic Literature Review on Unraveling IDS Datasets for Enhanced Cybersecurity Understanding","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4394994483","doi":"https://doi.org/10.1109/access.2024.3392338"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3392338","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3392338","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10506515.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10506515.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043925187","display_name":"Akbar Khanan","orcid":"https://orcid.org/0000-0002-2226-0001"},"institutions":[{"id":"https://openalex.org/I4210114546","display_name":"College of Applied Sciences, Nizwa","ror":"https://ror.org/01xf31a71","country_code":"OM","type":"education","lineage":["https://openalex.org/I4210114546"]}],"countries":["OM"],"is_corresponding":true,"raw_author_name":"Akbar Khanan","raw_affiliation_strings":["College of Business Administration, A&#x2019;Sharqiyah University, Ibra, Oman"],"raw_orcid":"https://orcid.org/0000-0002-2226-0001","affiliations":[{"raw_affiliation_string":"College of Business Administration, A&#x2019;Sharqiyah University, Ibra, Oman","institution_ids":["https://openalex.org/I4210114546"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039065536","display_name":"Yasir Abdelgadir Mohamed","orcid":"https://orcid.org/0000-0002-9337-7688"},"institutions":[{"id":"https://openalex.org/I4210114546","display_name":"College of Applied Sciences, Nizwa","ror":"https://ror.org/01xf31a71","country_code":"OM","type":"education","lineage":["https://openalex.org/I4210114546"]}],"countries":["OM"],"is_corresponding":false,"raw_author_name":"Yasir Abdelgadir Mohamed","raw_affiliation_strings":["College of Business Administration, A&#x2019;Sharqiyah University, Ibra, Oman"],"raw_orcid":"https://orcid.org/0000-0002-9337-7688","affiliations":[{"raw_affiliation_string":"College of Business Administration, A&#x2019;Sharqiyah University, Ibra, Oman","institution_ids":["https://openalex.org/I4210114546"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065192980","display_name":"Abdul Hakim H. M. Mohamed","orcid":"https://orcid.org/0000-0001-5879-5385"},"institutions":[{"id":"https://openalex.org/I4210114546","display_name":"College of Applied Sciences, Nizwa","ror":"https://ror.org/01xf31a71","country_code":"OM","type":"education","lineage":["https://openalex.org/I4210114546"]}],"countries":["OM"],"is_corresponding":false,"raw_author_name":"Abdul Hakim H. M. Mohamed","raw_affiliation_strings":["College of Business Administration, A&#x2019;Sharqiyah University, Ibra, Oman"],"raw_orcid":"https://orcid.org/0000-0001-5879-5385","affiliations":[{"raw_affiliation_string":"College of Business Administration, A&#x2019;Sharqiyah University, Ibra, Oman","institution_ids":["https://openalex.org/I4210114546"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071455107","display_name":"Mohamed Bashir","orcid":"https://orcid.org/0000-0002-2292-2677"},"institutions":[{"id":"https://openalex.org/I4210114546","display_name":"College of Applied Sciences, Nizwa","ror":"https://ror.org/01xf31a71","country_code":"OM","type":"education","lineage":["https://openalex.org/I4210114546"]}],"countries":["OM"],"is_corresponding":false,"raw_author_name":"Mohamed Bashir","raw_affiliation_strings":["College of Business Administration, A&#x2019;Sharqiyah University, Ibra, Oman"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Business Administration, A&#x2019;Sharqiyah University, Ibra, Oman","institution_ids":["https://openalex.org/I4210114546"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5043925187"],"corresponding_institution_ids":["https://openalex.org/I4210114546"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":6.9513,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.9728367,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"12","issue":null,"first_page":"59289","last_page":"59317"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7683100700378418},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6420426368713379},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.6142380833625793},{"id":"https://openalex.org/keywords/systematic-review","display_name":"Systematic review","score":0.5042749643325806},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3585401475429535},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09123501181602478},{"id":"https://openalex.org/keywords/medline","display_name":"MEDLINE","score":0.07769766449928284},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.060287028551101685}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7683100700378418},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6420426368713379},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.6142380833625793},{"id":"https://openalex.org/C189708586","wikidata":"https://www.wikidata.org/wiki/Q1504425","display_name":"Systematic review","level":3,"score":0.5042749643325806},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3585401475429535},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09123501181602478},{"id":"https://openalex.org/C2779473830","wikidata":"https://www.wikidata.org/wiki/Q1540899","display_name":"MEDLINE","level":2,"score":0.07769766449928284},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.060287028551101685},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3392338","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3392338","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10506515.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3d1a1773d9304de0b928e00c793a6a6e","is_oa":true,"landing_page_url":"https://doaj.org/article/3d1a1773d9304de0b928e00c793a6a6e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 59289-59317 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3392338","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3392338","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10506515.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4394994483.pdf","grobid_xml":"https://content.openalex.org/works/W4394994483.grobid-xml"},"referenced_works_count":89,"referenced_works":["https://openalex.org/W1981738628","https://openalex.org/W2031163547","https://openalex.org/W2077488147","https://openalex.org/W2099940443","https://openalex.org/W2102683561","https://openalex.org/W2133590498","https://openalex.org/W2183325936","https://openalex.org/W2191950414","https://openalex.org/W2250670532","https://openalex.org/W2287408518","https://openalex.org/W2296509296","https://openalex.org/W2403459574","https://openalex.org/W2469292055","https://openalex.org/W2597441556","https://openalex.org/W2789828921","https://openalex.org/W2798015748","https://openalex.org/W2803881474","https://openalex.org/W2890988085","https://openalex.org/W2897230315","https://openalex.org/W2898935358","https://openalex.org/W2899439128","https://openalex.org/W2901284941","https://openalex.org/W2906631928","https://openalex.org/W2924689635","https://openalex.org/W2943930927","https://openalex.org/W2953448948","https://openalex.org/W2955155733","https://openalex.org/W2958285686","https://openalex.org/W2980759501","https://openalex.org/W2982682021","https://openalex.org/W3012810218","https://openalex.org/W3016974523","https://openalex.org/W3033213260","https://openalex.org/W3093103057","https://openalex.org/W3093410479","https://openalex.org/W3106741970","https://openalex.org/W3119693685","https://openalex.org/W3136205675","https://openalex.org/W3156050669","https://openalex.org/W3161447971","https://openalex.org/W3181596493","https://openalex.org/W3194730353","https://openalex.org/W3196382900","https://openalex.org/W3197944870","https://openalex.org/W3207891930","https://openalex.org/W3208124018","https://openalex.org/W3208593140","https://openalex.org/W3216341310","https://openalex.org/W3217458064","https://openalex.org/W4210908131","https://openalex.org/W4214699222","https://openalex.org/W4220762966","https://openalex.org/W4226319939","https://openalex.org/W4281687072","https://openalex.org/W4281997778","https://openalex.org/W4289529959","https://openalex.org/W4292324311","https://openalex.org/W4294691718","https://openalex.org/W4309089711","https://openalex.org/W4310398036","https://openalex.org/W4311398608","https://openalex.org/W4311703141","https://openalex.org/W4318275388","https://openalex.org/W4319788371","https://openalex.org/W4319965142","https://openalex.org/W4319996419","https://openalex.org/W4321497442","https://openalex.org/W4322581663","https://openalex.org/W4322622028","https://openalex.org/W4324093415","https://openalex.org/W4361264071","https://openalex.org/W4362677817","https://openalex.org/W4365513113","https://openalex.org/W4367182499","https://openalex.org/W4379053954","https://openalex.org/W4381550190","https://openalex.org/W4381661839","https://openalex.org/W4382793227","https://openalex.org/W4383535390","https://openalex.org/W4384695285","https://openalex.org/W4385687973","https://openalex.org/W4385806329","https://openalex.org/W4388797346","https://openalex.org/W4388893996","https://openalex.org/W4389482644","https://openalex.org/W6696151112","https://openalex.org/W6713047218","https://openalex.org/W6838325008","https://openalex.org/W6963397662"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W121858127","https://openalex.org/W2775143306","https://openalex.org/W2390279801","https://openalex.org/W4289329995","https://openalex.org/W2373574911","https://openalex.org/W2046727832","https://openalex.org/W4247895841"],"abstract_inverted_index":{"In":[0],"the":[1,4,8,22,29,90,100,119,126,148,157,168,180,187,195,203,212,234,239,276],"wake":[2],"of":[3,25,31,37,45,102,112,122,153,170,182,197,215,233,241,259,278],"expanding":[5],"digital":[6],"realm,":[7],"imperative":[9],"for":[10,63,176,248,269],"robust":[11],"cybersecurity":[12,26,103,177,204,221,284],"measures":[13],"has":[14],"burgeoned":[15],"significantly.":[16],"This":[17,41,143,253],"extensive":[18],"investigation":[19],"digs":[20],"into":[21],"complicated":[23,51],"realm":[24],"datasets,":[27,222],"with":[28,130,179,186],"goal":[30,181],"improving":[32],"our":[33],"understanding":[34],"and":[35,80,92,96,150,163,174,200,245,262,272,282],"implementation":[36],"these":[38],"critical":[39,257],"tools.":[40],"study\u2019s":[42],"comprehensive":[43],"evaluation":[44],"37":[46,220],"distinct":[47],"datasets":[48,129,172,208],"shows":[49],"a":[50,83,131,242,256,279],"world":[52],"in":[53,99,206],"which":[54],"no":[55,227],"one":[56,228],"dataset":[57,74,190,229,247,260,273],"stands":[58],"out":[59],"as":[60,77],"totally":[61],"suitable":[62],"all":[64,232],"uses.":[65],"A":[66],"precise":[67],"balance":[68,159],"must":[69],"be":[70],"struck":[71],"between":[72,161],"crucial":[73],"qualities":[75],"such":[76],"diversity,":[78],"authenticity,":[79],"usefulness.":[81],"Using":[82],"complete":[84],"assessment":[85,258],"technique,":[86],"this":[87],"paper":[88],"illuminates":[89],"challenges":[91],"possibilities":[93],"that":[94,209,226],"developers":[95],"researchers":[97],"face":[98],"field":[101],"datasets.":[104],"Although":[105],"some":[106],"databases":[107],"accurately":[108,210],"identify":[109],"certain":[110],"forms":[111],"cyberattacks,":[113],"their":[114,263],"coverage":[115],"may":[116,137],"not":[117],"include":[118],"whole":[120],"range":[121],"cyber":[123,154,216],"threats.":[124,217],"On":[125],"other":[127],"hand,":[128],"strong":[132],"emphasis":[133],"on":[134],"accurate":[135],"portrayal":[136],"forgo":[138],"comprehensiveness":[139],"or":[140],"practical":[141],"use.":[142],"intricacy":[144],"is":[145,224],"heightened":[146],"by":[147],"dynamic":[149],"sophisticated":[151],"nature":[152,214],"threats,":[155],"emphasizing":[156],"delicate":[158],"required":[160],"accuracy":[162],"practicality.":[164],"The":[165],"study":[166],"emphasizes":[167,194],"necessity":[169],"selecting":[171],"strategically":[173],"contextually":[175],"studies,":[178],"matching":[183],"research":[184],"objectives":[185],"most":[188],"appropriate":[189],"selections.":[191],"Furthermore,":[192],"it":[193,223],"need":[196,240],"continual":[198],"cooperation":[199],"innovation":[201],"within":[202],"community":[205],"developing":[207,246],"represent":[211],"ever-changing":[213],"After":[218],"analyzing":[219],"obvious":[225],"can":[230],"meet":[231],"field\u2019s":[235],"unique":[236],"demands,":[237],"demonstrating":[238],"flexible,":[243],"adaptable,":[244],"intrusion":[249],"detection":[250],"systems":[251],"(IDS).":[252],"inquiry":[254],"offers":[255],"characteristics":[261],"related":[264],"issues,":[265],"providing":[266],"essential":[267],"insights":[268],"academics,":[270],"professionals,":[271],"creators,":[274],"enabling":[275],"construction":[277],"more":[280],"resilient":[281],"adaptable":[283],"infrastructure.":[285]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
