A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis

Intrusion detection (ID) is critical in securing computer networks against various malicious attacks. Recent advancements in machine learning (ML), deep learning (DL), federated learning (FL), and explainable artificial intelligence (XAI) have drawn significant attention as potential approaches for...

Full description

Saved in:
Bibliographic Details
Main Authors: Salman Muneer, Umer Farooq, Atifa Athar, Muhammad Ahsan Raza, Taher M. Ghazal, Shadman Sakib
Format: Article
Language:English
Published: Wiley 2024-01-01
Series:Journal of Engineering
Online Access:http://dx.doi.org/10.1155/2024/3909173
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850233521412505600
author Salman Muneer
Umer Farooq
Atifa Athar
Muhammad Ahsan Raza
Taher M. Ghazal
Shadman Sakib
author_facet Salman Muneer
Umer Farooq
Atifa Athar
Muhammad Ahsan Raza
Taher M. Ghazal
Shadman Sakib
author_sort Salman Muneer
collection DOAJ
description Intrusion detection (ID) is critical in securing computer networks against various malicious attacks. Recent advancements in machine learning (ML), deep learning (DL), federated learning (FL), and explainable artificial intelligence (XAI) have drawn significant attention as potential approaches for ID. DL-based approaches have shown impressive performance in ID by automatically learning relevant features from data but require significant labelled data and computational resources to train complex models. ML-based approaches require fewer computational resources and labelled data, but their ability to generalize to unseen data is limited. FL is a relatively new approach that enables multiple entities to train a model collectively without exchanging their data, providing privacy and security benefits, making it an attractive option for ID. However, FL-based approaches require more communication resources and additional computation to aggregate models from different entities. XAI is critical for understanding how AI models make decisions, improving interpretability and transparency. While existing literature has explored the strengths and weaknesses of DL, ML, FL, and XAI-based approaches for ID, a significant gap exists in providing a comprehensive analysis of the specific use cases and scenarios where each approach is most suitable. This paper seeks to fill this void by delivering an in-depth review that not only highlights strengths and weaknesses but also offers guidance for selecting the appropriate approach based on the unique ID context and available resources. The selection of an appropriate approach depends on the specific use case, and this work provides insights into which method is best suited for various network sizes, data availability, privacy, and security concerns, thus aiding practitioners in making informed decisions for their ID needs.
format Article
id doaj-art-0bebd08b70f0470186cbde2c2b7917d7
institution OA Journals
issn 2314-4912
language English
publishDate 2024-01-01
publisher Wiley
record_format Article
series Journal of Engineering
spelling doaj-art-0bebd08b70f0470186cbde2c2b7917d72025-08-20T02:02:55ZengWileyJournal of Engineering2314-49122024-01-01202410.1155/2024/3909173A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive AnalysisSalman Muneer0Umer Farooq1Atifa Athar2Muhammad Ahsan Raza3Taher M. Ghazal4Shadman Sakib5National College of Business Administration and EconomicsDepartment of Computer ScienceDepartment of Computer ScienceDepartment of Information SciencesCentre for Cyber Physical SystemsDepartment of Finance and BankingIntrusion detection (ID) is critical in securing computer networks against various malicious attacks. Recent advancements in machine learning (ML), deep learning (DL), federated learning (FL), and explainable artificial intelligence (XAI) have drawn significant attention as potential approaches for ID. DL-based approaches have shown impressive performance in ID by automatically learning relevant features from data but require significant labelled data and computational resources to train complex models. ML-based approaches require fewer computational resources and labelled data, but their ability to generalize to unseen data is limited. FL is a relatively new approach that enables multiple entities to train a model collectively without exchanging their data, providing privacy and security benefits, making it an attractive option for ID. However, FL-based approaches require more communication resources and additional computation to aggregate models from different entities. XAI is critical for understanding how AI models make decisions, improving interpretability and transparency. While existing literature has explored the strengths and weaknesses of DL, ML, FL, and XAI-based approaches for ID, a significant gap exists in providing a comprehensive analysis of the specific use cases and scenarios where each approach is most suitable. This paper seeks to fill this void by delivering an in-depth review that not only highlights strengths and weaknesses but also offers guidance for selecting the appropriate approach based on the unique ID context and available resources. The selection of an appropriate approach depends on the specific use case, and this work provides insights into which method is best suited for various network sizes, data availability, privacy, and security concerns, thus aiding practitioners in making informed decisions for their ID needs.http://dx.doi.org/10.1155/2024/3909173
spellingShingle Salman Muneer
Umer Farooq
Atifa Athar
Muhammad Ahsan Raza
Taher M. Ghazal
Shadman Sakib
A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis
Journal of Engineering
title A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis
title_full A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis
title_fullStr A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis
title_full_unstemmed A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis
title_short A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis
title_sort critical review of artificial intelligence based approaches in intrusion detection a comprehensive analysis
url http://dx.doi.org/10.1155/2024/3909173
work_keys_str_mv AT salmanmuneer acriticalreviewofartificialintelligencebasedapproachesinintrusiondetectionacomprehensiveanalysis
AT umerfarooq acriticalreviewofartificialintelligencebasedapproachesinintrusiondetectionacomprehensiveanalysis
AT atifaathar acriticalreviewofartificialintelligencebasedapproachesinintrusiondetectionacomprehensiveanalysis
AT muhammadahsanraza acriticalreviewofartificialintelligencebasedapproachesinintrusiondetectionacomprehensiveanalysis
AT tahermghazal acriticalreviewofartificialintelligencebasedapproachesinintrusiondetectionacomprehensiveanalysis
AT shadmansakib acriticalreviewofartificialintelligencebasedapproachesinintrusiondetectionacomprehensiveanalysis
AT salmanmuneer criticalreviewofartificialintelligencebasedapproachesinintrusiondetectionacomprehensiveanalysis
AT umerfarooq criticalreviewofartificialintelligencebasedapproachesinintrusiondetectionacomprehensiveanalysis
AT atifaathar criticalreviewofartificialintelligencebasedapproachesinintrusiondetectionacomprehensiveanalysis
AT muhammadahsanraza criticalreviewofartificialintelligencebasedapproachesinintrusiondetectionacomprehensiveanalysis
AT tahermghazal criticalreviewofartificialintelligencebasedapproachesinintrusiondetectionacomprehensiveanalysis
AT shadmansakib criticalreviewofartificialintelligencebasedapproachesinintrusiondetectionacomprehensiveanalysis