{"id":"https://openalex.org/W4205373213","doi":"https://doi.org/10.1109/acit53391.2021.9677375","title":"A Comprehensive Survey for Machine Learning and Deep Learning Applications for Detecting Intrusion Detection","display_name":"A Comprehensive Survey for Machine Learning and Deep Learning Applications for Detecting Intrusion Detection","publication_year":2021,"publication_date":"2021-12-21","ids":{"openalex":"https://openalex.org/W4205373213","doi":"https://doi.org/10.1109/acit53391.2021.9677375"},"language":"en","primary_location":{"id":"doi:10.1109/acit53391.2021.9677375","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit53391.2021.9677375","pdf_url":null,"source":{"id":"https://openalex.org/S4363608487","display_name":"2021 22nd International Arab Conference on Information Technology (ACIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012398318","display_name":"Ola Surakhi","orcid":"https://orcid.org/0000-0002-9546-5526"},"institutions":[{"id":"https://openalex.org/I158749337","display_name":"Princess Sumaya University for Technology","ror":"https://ror.org/01jy46q10","country_code":"JO","type":"education","lineage":["https://openalex.org/I158749337"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Ola M. Surakhi","raw_affiliation_strings":["Department of Computer Science, Princess Sumaya University for Technology, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Princess Sumaya University for Technology, Amman, Jordan","institution_ids":["https://openalex.org/I158749337"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067599928","display_name":"Antonio M. Mora","orcid":"https://orcid.org/0000-0003-1603-9105"},"institutions":[{"id":"https://openalex.org/I173304897","display_name":"Universidad de Granada","ror":"https://ror.org/04njjy449","country_code":"ES","type":"education","lineage":["https://openalex.org/I173304897"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Antonio Mora Garcia","raw_affiliation_strings":["Department of Telematics and Communications, University of Granada, Granada, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Telematics and Communications, University of Granada, Granada, Spain","institution_ids":["https://openalex.org/I173304897"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026095617","display_name":"Mohammed Jamoos","orcid":null},"institutions":[{"id":"https://openalex.org/I173304897","display_name":"Universidad de Granada","ror":"https://ror.org/04njjy449","country_code":"ES","type":"education","lineage":["https://openalex.org/I173304897"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Mohammed Jamoos","raw_affiliation_strings":["Department of Telematics and Communications, University of Granada, Granada, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Telematics and Communications, University of Granada, Granada, Spain","institution_ids":["https://openalex.org/I173304897"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091492172","display_name":"Mohammad AlKhanafseh","orcid":"https://orcid.org/0000-0002-6250-7291"},"institutions":[{"id":"https://openalex.org/I94800806","display_name":"Birzeit University","ror":"https://ror.org/0256kw398","country_code":"PS","type":"education","lineage":["https://openalex.org/I94800806"]}],"countries":["PS"],"is_corresponding":false,"raw_author_name":"Mohammad Y. Alkhanafseh","raw_affiliation_strings":["Department of Computer Science, Birzeit University, Ramalla, Palestine"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Birzeit University, Ramalla, Palestine","institution_ids":["https://openalex.org/I94800806"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5012398318"],"corresponding_institution_ids":["https://openalex.org/I158749337"],"apc_list":null,"apc_paid":null,"fwci":1.848,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.85095795,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8131844997406006},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7904088497161865},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6847395896911621},{"id":"https://openalex.org/keywords/strengths-and-weaknesses","display_name":"Strengths and weaknesses","score":0.6601049900054932},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.6487171649932861},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6055895090103149},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5348559617996216},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4636097848415375},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.45219454169273376},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.42714211344718933},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42000940442085266},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.32603082060813904},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2188517451286316},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11145135760307312}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8131844997406006},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7904088497161865},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6847395896911621},{"id":"https://openalex.org/C63882131","wikidata":"https://www.wikidata.org/wiki/Q17122954","display_name":"Strengths and weaknesses","level":2,"score":0.6601049900054932},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.6487171649932861},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6055895090103149},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5348559617996216},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4636097848415375},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.45219454169273376},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42714211344718933},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42000940442085266},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32603082060813904},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2188517451286316},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11145135760307312},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit53391.2021.9677375","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit53391.2021.9677375","pdf_url":null,"source":{"id":"https://openalex.org/S4363608487","display_name":"2021 22nd International Arab Conference on Information Technology (ACIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":62,"referenced_works":["https://openalex.org/W1492196703","https://openalex.org/W1739844664","https://openalex.org/W2012701999","https://openalex.org/W2099940443","https://openalex.org/W2120617515","https://openalex.org/W2122646361","https://openalex.org/W2142334564","https://openalex.org/W2142889610","https://openalex.org/W2150847526","https://openalex.org/W2408092810","https://openalex.org/W2468321486","https://openalex.org/W2525336835","https://openalex.org/W2617118748","https://openalex.org/W2789420469","https://openalex.org/W2789828921","https://openalex.org/W2790513427","https://openalex.org/W2797220274","https://openalex.org/W2801763249","https://openalex.org/W2803217416","https://openalex.org/W2886710006","https://openalex.org/W2890103762","https://openalex.org/W2901671482","https://openalex.org/W2910612999","https://openalex.org/W2913330314","https://openalex.org/W2919936975","https://openalex.org/W2929049293","https://openalex.org/W2941288225","https://openalex.org/W2944643572","https://openalex.org/W2951326654","https://openalex.org/W2963748489","https://openalex.org/W2969430493","https://openalex.org/W2980576170","https://openalex.org/W2986887468","https://openalex.org/W3005630930","https://openalex.org/W3014936050","https://openalex.org/W3017250473","https://openalex.org/W3027236250","https://openalex.org/W3027870121","https://openalex.org/W3028360451","https://openalex.org/W3032021129","https://openalex.org/W3033030226","https://openalex.org/W3033403042","https://openalex.org/W3040937085","https://openalex.org/W3045661671","https://openalex.org/W3082729101","https://openalex.org/W3083690138","https://openalex.org/W3087836803","https://openalex.org/W3089397955","https://openalex.org/W3092688604","https://openalex.org/W3093410479","https://openalex.org/W3093931417","https://openalex.org/W3096252500","https://openalex.org/W3125540236","https://openalex.org/W3128910312","https://openalex.org/W3133624139","https://openalex.org/W3158456479","https://openalex.org/W3160455160","https://openalex.org/W3214373139","https://openalex.org/W6629523211","https://openalex.org/W6713615597","https://openalex.org/W6727654133","https://openalex.org/W6779736363"],"related_works":["https://openalex.org/W2376886931","https://openalex.org/W2061466315","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426","https://openalex.org/W2377372927"],"abstract_inverted_index":{"The":[0,115,165],"rapid":[1],"development":[2],"in":[3,10,25,32,67,77,117,209,219,245],"computer":[4],"network":[5,15,34,69],"and":[6,14,19,35,55,81,97,112,131,153,158,181,185,191,223,230,238,249],"internet":[7],"have":[8,22,88,148],"resulted":[9],"increased":[11],"corresponding":[12],"data":[13],"attacks.":[16],"Many":[17],"novels":[18],"improvement":[20,116],"technologies":[21],"been":[23,149],"developed":[24],"the":[26,33,46,58,71,91,104,118,125,143,175,205,213,228,236,239,243],"literature":[27],"to":[28,51,102,137,161,170],"handle":[29],"security":[30],"issues":[31],"accurately":[36],"detect":[37],"intrusions.":[38,63],"Intrusion":[39],"Detection":[40],"System":[41],"(IDS)":[42],"is":[43],"one":[44],"of":[45,57,93,106,120,199,221,232],"technological":[47],"tools":[48],"that":[49,147],"aim":[50],"ensure":[52],"confidentiality,":[53],"integrity":[54],"availability":[56],"system":[59,122],"by":[60,108,216],"preventing":[61],"possible":[62],"Despite":[64],"its":[65],"effectiveness":[66],"reducing":[68,113],"intrusion,":[70],"IDS":[72,107,121,132,163,179,246],"still":[73],"face":[74],"some":[75],"challenges":[76,237],"improving":[78],"detection":[79,126],"accuracy":[80,110],"False":[82],"Error":[83],"Rate":[84],"(FER).":[85,114],"Recently,":[86],"researchers":[87],"shifted":[89],"toward":[90],"use":[92],"Machine":[94],"Learning":[95,99],"(ML)":[96],"Deep":[98],"(DL)":[100],"methods":[101,160,187],"enhance":[103],"performance":[105,119],"increasing":[109],"rate":[111],"depends":[123],"on":[124],"method":[127],"used,":[128],"benchmark":[129],"dataset":[130,224],"environment.":[133],"This":[134],"paper":[135],"aims":[136],"provide":[138],"a":[139],"comprehensive":[140],"survey":[141],"for":[142,193,242],"most":[144,206],"recent":[145,207],"articles":[146,208],"published":[150],"between":[151],"2018":[152],"2021":[154],"which":[155],"used":[156,225],"ML":[157,184,248],"DL":[159,186,250],"improve":[162],"accuracy.":[164],"selected":[166],"papers":[167],"are":[168,251],"analysed":[169],"cover":[171],"an":[172],"overview":[173],"about":[174,204],"following":[176],"aspects:":[177],"(1)":[178],"concepts":[180],"taxonomy.":[182],"(2)":[183],"along":[188],"with":[189,212,226],"strengths":[190,229],"weaknesses":[192,231],"each":[194,217,233],"one.":[195],"(3)":[196],"Benchmark":[197],"datasets":[198],"IDS.":[200],"(4)":[201],"Comprehensive":[202],"review":[203],"this":[210],"domain":[211],"advancement":[214],"provided":[215],"work":[218],"terms":[220],"methodology":[222],"highlighting":[227],"work.":[234],"Finally,":[235],"future":[240],"scope":[241],"research":[244],"based":[247],"provided.":[252]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
