<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Enhancing Intrusion Detection in Organizational Information Systems through AI-Powered Traffic Analysis ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Valentyn</forename><surname>Sobchuk</surname></persName>
							<email>sobchuk@knu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60 Volodymyrska Str</addrLine>
									<postCode>01033</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Serhii</forename><surname>Gakhov</surname></persName>
							<email>gakhovsa@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">State University of Information and Communication Technologies</orgName>
								<address>
									<addrLine>7 Solomyanska, Str</addrLine>
									<postCode>03110</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Yevhen</forename><surname>Smoliev</surname></persName>
							<email>smolev99@mail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">State University of Information and Communication Technologies</orgName>
								<address>
									<addrLine>7 Solomyanska, Str</addrLine>
									<postCode>03110</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Halyna</forename><surname>Haidur</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">State University of Information and Communication Technologies</orgName>
								<address>
									<addrLine>7 Solomyanska, Str</addrLine>
									<postCode>03110</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Enhancing Intrusion Detection in Organizational Information Systems through AI-Powered Traffic Analysis ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">33ACCF7F868834B09B6614D2000C14AC</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T16:49+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Intrusion detection</term>
					<term>intrusion detection systems</term>
					<term>traffic analysis</term>
					<term>artificial intelligence</term>
					<term>machine learning</term>
					<term>deep learning</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In the current digitized world, the massive volumes of data present considerable challenges to cyber security for the information systems of organizations. The sophistication of attacks and anomalies has complicated the development of efficient methods for their detection. Traditional methods such as signature-based intrusion detection and anomaly-based intrusion detection methods have been commonly used to detect attacks and secure networks and information systems. However, the advent of artificial intelligence, especially machine learning and deep learning has presented encouraging outcomes in terms of enhancing speed, accuracy, and efficiency in intrusion detection. This secondary research explores how AI-powered intrusion detection methods are enhancing traffic analysis and anomaly detection to protect organizational information systems. Thus, the major aim of this research is to explore how AI-driven analysis and anomaly detection methods enhance intrusion detection in organizations. The study uses data from carefully selected recent studies on AI-based intrusion techniques, particularly Machine learning-based and deep learningbased intrusion detection methods. The search strategy retrieved 15 studies that were used for data collection. The findings of the study reveal that there is a great enhancement in accuracy and efficiency in traffic analysis and detection of anomalies when AI-based intrusion detection methods are used compared to traditional intrusion detection systems. There are however challenges such as the inability to catch multiple attacks simultaneously and therefore future research is recommended to address these challenges.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>In the contemporary digital age, where cyber threats are rampant, organizations face a constant battle against complex threats and intrusions and, therefore, require strong security measures to protect their valuable assets <ref type="bibr" target="#b0">[1]</ref>. Research has identified intrusion detection as one of the robust measures that can be undertaken by organizations to safeguard their assets <ref type="bibr" target="#b1">[2]</ref>. Intrusion detection is the process of checking and analyzing network traffic, systems, and the behavior of users to identify and respond to possible security breaches or cyber-attacks <ref type="bibr" target="#b1">[2]</ref>. The major goal of intrusion detection is the identification of any unauthorized or malevolent happenings that may compromise the privacy, reliability, or accessibility of the company assets. Intrusion detection is vital in securing the information systems of companies because it guarantees consistent checking of network actions for unauthorized access, identification of breaches, control of data breaches, prevention of infections by malware, detection of intruder threats, prompt response to attacks, adherence to regulations, securing intellectual property, preservation of business continuity, and enhanced reputation and trust <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b2">3]</ref>.</p><p>Intrusion detection is implemented by tools called Intrusion Detection Systems (IDS). The most common systems are Network-based Intrusion Detection Systems (NIDS) and Host-based Intrusion Detection Systems (HIDS). The NIDS monitors network traffic, analyzing packets in real-time to spot any suspicious or malevolent actions, while the HIDS focuses on single hosts or endpoints, checking system logs, file integrity, and other host-specific attributes to identify any signs of compromise or unauthorized access <ref type="bibr" target="#b3">[4]</ref>. Generally, IDS plays a vital role in the identification and response to potential security breaches to safeguard the information systems of an organization. The IDS can clear extant malware and spot social engineering attacks that manipulate users into disclosing delicate information <ref type="bibr" target="#b1">[2]</ref>.</p><p>While these traditional IDS have been the most used technique for discovering assaults and offering safety, the rise of Artificial Intelligence (AI), especially Machine Learning (ML), Deep Learning (DL), and ensemble learning, promises more efficient measures of detecting attacks through AI-powered or AI-based intrusion detection <ref type="bibr" target="#b0">[1]</ref>. The AI-powered IDS utilizes ML algorithms to analyze network traffic and identify anomalous patterns. AI has proven to be beneficial in cyber security since it enhances the technologies used by organizations to combat cybercriminals and assists organizations in safeguarding their data and that of customers <ref type="bibr" target="#b4">[5]</ref>. AI-powered intrusion detection can improve cybersecurity defense by offering early detection of advanced threats, realtime response, lower false positives, and adaptability. Thus, AI-powered traffic analysis would provide a transformative improvement to intrusion detection systems through the leveraging of advanced ML and DL methods. Through the analysis of network traffic patterns, AI algorithms would be able to promptly identify anomalous behaviors, locate possible threats, and distinguish between genuine and suspicious activities <ref type="bibr" target="#b1">[2]</ref>.</p><p>This work aims to conduct research on enhancing intrusion detection in organizational information systems through AI-powered Traffic Analysis. This secondary research will select and evaluate recent relevant literature to highlight how organizations are or can use AI-powered traffic analysis to enhance intrusion detection to safeguard their information systems. The paper will contain a literature review, methodology, results, discussion, recommendations, and conclusion sections.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Aims and Objectives</head><p>The major objective of this study is to determine how AI-driven analysis and anomaly detection methods enhance intrusion detection in organizations.</p><p>To achieve the objectives above, the specific objectives of the study will include:</p><p>To determine the various AI-powered intrusion detection methods currently used.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>To compare and contrast the impact of various AI-based intrusion detection methods in enhancing traffic analysis and anomaly detection</head><p>To determine the challenges of using AI-driven intrusion detection methods as compared to traditional intrusion detection methods To find possible solutions to overcome identified challenges</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Literature Review</head><p>Overview of intrusion detection methods in organizational information systems With the rising number of cyberattacks and intrusions, monitoring and protecting organizational Crime Complaint Centre (IC3) got over eight hundred thousand complaints concerning data breaches, malware, and many others <ref type="bibr" target="#b5">[6]</ref>. The complaints totaled about 7 billion US dollars and those only represented the cases that were reported. For years, organizations have been using various traditional intrusion detection met A review of literature from diverse sources has established numerous different types of IDS and 3 methods of intrusion detection.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Types of IDS</head><p>Although all IDS have the same purpose, their mode of function differs in various ways. Research has established that there are numerous types of IDS such as NIDS, HIDS, Network Node IDS (NNIDS), Perimeter IDS (PIDS), Virtual Machine-Based IDS (VMIDS), and Stack-Based IDS (SBIDS) among others <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b7">8]</ref>. However, the two most common conventional IDS types used by organizations across the world:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Network Intrusion Detection System (NIDS)</head><p>of all packet metadata and contents to define threats (4). To use NIDS, it has to be installed on a piece ure. After it has been installed, the NIDS will sample every packet that goes through it. NIDS are the most popular type of IDS because they can analyze all incoming and outgoing traffic, they detect actions in real-time which enables quicker responses, they are difficult to detect by intruders, and they can be placed strategically in critical locations <ref type="bibr" target="#b7">(8)</ref>. The major limitations of NIDS however, are hands-on maintenance and low specificity.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Host-Based Intrusion Detection System (HIDS)</head><p>The HIDS passes intrusion detection via a specific endpoint, checks network traffic to and from the machine, observes running processes, and inspects the system logs to and from a chosen device (4). However, the visibility of a HIDS is restricted to its host machine and this lowers the presented setting for decision-making even though it has deep visibility into the internals of the host computer. The major advantages of the HIDS are that it can be set up on computers or servers, it can identify the attacked device, it alerts the administrators when analytical files are tampered with, and it is specifically effective against insider threats <ref type="bibr" target="#b1">(2,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b7">8)</ref>. The proper usage of HIDS needs frequent monitoring.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Methods of Intrusion Detection</head><p>After gathering data, the IDS is intended to monitor network traffic and match traffic patterns to recognized assaults. Depending on the IDS type chosen by the organization, the security solution will depend on the following separate detection methods to keep the organizational network or information system safe: This method of detection aims to detect patterns and compare them with established proof of intrusions. The SIDS method is dependent on a database of past intrusions (fig. <ref type="figure" target="#fig_0">1</ref>). If the activity within the organization's network matches the "signature" of an assault or breach from the database, the network administrator will be notified by the detection system <ref type="bibr" target="#b8">[9]</ref>. The database is the mainstay of the SIDS and hence database updates are frequently required since the SIDS is only able to identify attacks that are recognizable to it. However, this is considered the key limitation of this method because if the company is targeted by a new intrusion method, no volume of updates on the database will safeguard it <ref type="bibr" target="#b9">[10]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Signature-Based Intrusion Detection (SIDS)</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Anomaly-Based Intrusion Detection (AIDS)</head><p>Literature has established that the major advantage of AIDS over SIDS is that AIDS is able to identify those new zero-day intrusions. The AIDS method utilizes ML and statistical data to develop a model of "normal" behavior such that any traffic deviating from this normal behavior is flagged by the system as suspicious. <ref type="bibr" target="#b8">[9]</ref> however argued that the major challenge with AIDS vs SIDS is the possibility for false positives. The author argued that at the end of the day, not all alterations are caused by malevolent happenings and that some are just signs of alterations in the conduct of the organization. However, since AIDS does not have a database of previous assaults for referencing, it may convey every anomaly as intrusions <ref type="bibr" target="#b9">[10]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Hybrid Intrusion Detection</head><p>The hybrid detection method is a combination of SIDS and AIDS. The hybrid system looks at patterns and one-off events and flags new and extant intrusion strategies <ref type="bibr" target="#b10">[11]</ref>. However, <ref type="bibr" target="#b9">[10]</ref> points out that this system has the major limitation of an even bigger uptick in flagged issues. Despite that, taking into consideration that the goal of IDS is flagging possible infringements, it is difficult to view this rise in flags as a downside <ref type="bibr" target="#b8">[9]</ref>.</p><p>In summary, the SIDS uses a database of previous attacks as a reference to detect possible threats, the AIDS pinpoints new breaches such as new malware and adapts to them on the fly using ML, whereas hybrid IDS combines AIDS and SIDS to enlarge the scope of the intrusion detection.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Introduction to AI techniques for traffic analysis and anomaly detection</head><p>Traffic analysis has numerous purposes including assessing the performance and security of network processes and management <ref type="bibr" target="#b11">[12]</ref>. Anomaly detection is important because inconsistencies in data are transferred to considerable, and usually crucial actionable information in a broad range of application spheres. The emergence of AI, especially ML and DL has provided more efficient measures of detecting attacks through AI-powered or AI-based intrusion detection <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b13">14]</ref>. The AIpowered IDS utilizes ML algorithms to analyze network traffic and identify anomalous patterns. As contemporary threats and intrusions become more sophisticated than in the past, more and more experts are now recommending the use of AI-powered network traffic analysis and anomaly detection to solve the challenges of protecting devices and detecting intrusions into networks and information systems of organizations <ref type="bibr" target="#b0">[1]</ref>. There are various AI techniques for analyzing traffic and detecting anomalies and these techniques have revolutionized how companies detect and respond to network security threats (fig. <ref type="figure">2</ref>). <ref type="bibr" target="#b10">[11]</ref> note that these AI techniques harness the power of ML and DL algorithms to scrutinize large volumes of networks in real time. For instance, ML algorithms like Support Vector Machines (SVM) and Random Forest are utilized in the identification of patterns in models such as Recurrent Neural Networks (RNN) and Convolutional Neural Networks (CNN) are efficiently used to recognize sophisticated developing anomalies <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b15">16]</ref>. According to <ref type="bibr" target="#b2">[3]</ref>, the idea behind the use of AI techniques such as ML algorithms is to make machines capable of learning by themselves and differentiate between normal and abnormal behavior in the system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Case studies and research findings demonstrating the impact of AI in enhancing detection</head><p>Research findings indicate that many companies are now merging cybersecurity with AI or using AI-powered techniques to enhance the detection of intrusions and anomalies. For instance, Darktrace which is a company with over 30 offices across the world and headquartered in San Francisco, California has been using an AI platform that scrutinizes network data to make computations and identify patterns <ref type="bibr" target="#b16">[17]</ref>. The data is utilized by ML algorithms incorporated in the platform to help companies identify threats and detect deviations from normal behavior. This company has reported that the use of AI-based traffic analysis for its clients has resulted in more than 40% reduction in false positives, hence increased accuracy and efficiency <ref type="bibr" target="#b16">[17]</ref>.</p><p>Blue Hexagon which is another company in Sunnyvale, California, was established on the assumption that DL will extremely transform cybersecurity and the company offers real-time network threat protection to its customers which provides anomaly detection within a second. The organization uses AI to create malware founded on universal threat data and the dark web and then uses this to test its systems and push its proficiencies to the utter limit. Studies conducted by the organization show that AI-powered algorithms are more efficient in detecting advanced threats that could be missed by conventional IDS methods <ref type="bibr" target="#b5">[6]</ref>.</p><p>Cybereason, a company based in Boston, Massachusetts, uses AI-powered detection technology to determine if an organization is under attack. The company uses a cybersecurity analytics platform to monitor, detect, and analyze threats. As a result, the company has been able to achieve early identification of intrusions and averted potential data breaches for the organizations it serves <ref type="bibr" target="#b5">[6]</ref>. These and many other cases have demonstrated how AI has enhanced detection by increasing efficiency, improving accuracy, reducing costs, providing real-time threat detection and response, and improving scalability.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Methodology</head><p>This study employed a secondary research approach to examine how AI-powered traffic analysis enhances intrusion detection in organizational information systems. As secondary research, it entailed selecting and evaluating relevant sources of literature such as extant research, case studies, government publications, and industry reports in the area of cybersecurity and AI-powered intrusion detection</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Search Strategy</head><p>Relevant databases including Google Scholar were electronically searched for studies published within the last 7 years. Further, the bibliographies of the identified studies were also examined for other relevant articles. The articles were limited to those published between January 2016 and July 2023. The search strategy involved the following search terms: enhanced intrusion detection, AIpowered intrusion detection, AI-based techniques for intrusion detection, AI-driven detection of anomalies, and AI-powered traffic analysis. The search terms were combined with Boolean operators. For studies to be included, they had to have been published in English. Therefore, the inclusion selection criteria were such that articles were only considered if they were primary studies, government documents, or industry reports, published in English, not older than 7 years, and contained information on AI-powered or AI-driven intrusion detection in organizations. Thus, the exclusion criteria involved articles not published in English, older than 7 years, not available in full text, and not relevant to the research topic.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Screening/Study Selection</head><p>The first phase of screening involved reviewing the titles and abstracts of the retrieved articles to determine eligibility. Secondly, the full texts of all the possibly relevant articles were obtained and reviewed against the selection criteria for final inclusion. All research journals, government documents, and government reports that reported on the use of AI in intrusion detection or the enhancement of intrusion detection using AI tools and techniques were included in the study. Duplicates were discarded.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Data Analysis</head><p>Data analysis was done using the thematic analysis method. This involved critically reviewing the data to identify patterns, inclinations, and trends that were coded and used to establish the key themes related to the use of AI to enhance intrusion detection in organizational information systems. The analysis and identification of patterns and trends focused on aspects such as the AI techniques and tools implemented, the benefits of using AI-based intrusion detection, case studies and examples of successful implementations, and the impact of AI on intrusion detection capabilities in organizations. The patterns in the data were then organized to form key themes that would later be interpreted in the results and discussion sections of the research. Research journals, industry reports, and case studies were all analyzed using the same thematic analysis method.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Results and Discussion</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Overview of Research Findings</head><p>Security is a necessity for organizational information systems because of the extensive usage of data and the internet. In the previous sections of this report, it was established that one of the major goals of the IDS is detecting network packets through a critical inspection and reporting them to administrators by producing alarms. While numerous IDS have been in use, this research has been founded on the premise and hypothesis that AI-based intrusion detection offers an improved and attractive solution for traffic analysis and detection of anomalies. Hence, this study was conducted to verify this premise. The search strategy retrieved 15 relevant studies, published between 2016 and 2023. Data was extracted from this study based on the research objectives and analyzed using thematic analysis. The overview and discussion of the findings are provided in the following subsections.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>AI Techniques and Impact Machine Learning based intrusion detection methods</head><p>Findings indicate that cybersecurity utilizes ML algorithms to make numerous crucial calculations to stop breaches by dropping the data to evade cyber-attacks <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b17">18,</ref><ref type="bibr" target="#b18">19,</ref><ref type="bibr" target="#b19">20,</ref><ref type="bibr" target="#b20">21]</ref>. The research findings indicate that ML has been established to be the most potent security instrument in the detection of assaults, and comprehending the semantic features of the systems appears vital for developing an IDS <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b20">21]</ref>. AI, especially ML techniques, considers the styles of learning to model the algorithm. The findings of this study indicate that ML provides majorly supervised and unsupervised algorithms for categorization depending on the available training data. The study by <ref type="bibr" target="#b0">[1]</ref> provided detailed explanations of the two. They indicated that supervised learning is taught via teach-student associations where the training dataset teaches the target dataset and categorizes the labeled dataset. According to <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b4">5]</ref>, supervised learning produces accurate performance in classifying tasks in the detection of intrusion and it is one of the crucial models in the detection of anomaly. On the other hand, unsupervised learning handles unlabeled data and enables the use to classify the data on the basis of similarity. This form of learning is ideal for efficient analysis of undiscovered patterns <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b4">5]</ref>.</p><p>The most common supervised ML methods for intrusion detection include support vector machine (SVM), logistic regression, KNN algorithm, Bayesian, and Random forest algorithm <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b20">21]</ref>. This study has established that all these supervised ML methods provide a protected tool for detecting invaders in the cloud and also in networking. They contain a feature reduction and dimensionality reduction which offer an additional benefit in the detection and categorization of assaults. This finding aligns with the findings by <ref type="bibr" target="#b21">[22]</ref> who concluded that the use of feature reduction and dimensionality reduction in supervised ML intrusion detection methods strengthens the mechanism for attack detection.</p><p>This study also found that the most common unsupervised ML techniques for intrusion detection include the Fuzzy C-means clustering algorithm and K-means clustering algorithm <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b17">18,</ref><ref type="bibr" target="#b20">21]</ref>. The former allows data points to be allotted to one or more clusters and it aims to give higher classification accuracy and solidity when tried and trained with the KDD 99 Cup dataset whereas the latter splits the K unlabeled dataset into K clusters and allots a membership for evert data section to a cluster depending on the resemblances. A comparison between the two techniques conducted by <ref type="bibr" target="#b0">[1]</ref> revealed that the K-means clustering method showed the best results as it attained a higher accuracy for classification. A further comparison between the supervised and the unsupervised ML intrusion detection methods performed by <ref type="bibr" target="#b0">[1]</ref> showed that KNN is the best method for detecting intrusions as it provides an accuracy of 99.89% (fig. <ref type="figure">3</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 2: Machine Learning Algorithms</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 3: Comparison between DL and ML-based intrusion techniques in terms of accuracy performance</head><p>However, this research has established that although the KNN-supervised approach demonstrated superior accuracy, it is constrained to to a select set of attacks such as R2L, U2R, DoS, and Probe.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Deep Learning-based intrusion detection techniques</head><p>Deep Learning (DL) is a subsection of ML and it can be considered a sophisticated progression of ML algorithms <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b12">13,</ref><ref type="bibr" target="#b14">15,</ref><ref type="bibr" target="#b15">16,</ref><ref type="bibr" target="#b22">23,</ref><ref type="bibr" target="#b23">24,</ref><ref type="bibr" target="#b24">25]</ref>. Literature has described DL as an enhanced form of ML that undertakes feature extraction and classification jobs with numerous successive layers in the absence of any human intervention <ref type="bibr" target="#b0">[1]</ref>. The study by <ref type="bibr" target="#b23">[24]</ref> in their survey on deep learning for anomaly detection, highlighted two important new categories of deep anomaly detection techniques. The first one was the Deep Hybrid Models (DHM) which utilize deep neural networks, especially autoencoders as feature extractors <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b15">16]</ref>. According to <ref type="bibr" target="#b15">[16]</ref>, the DHM utilizes the pre-trained transfer learning models as feature extractors with massive success. <ref type="bibr" target="#b23">[24]</ref> established that the hybrid models provide greater scalability and computational efficiency compared to the traditional IDS because the linear or non-linear kernel models function on lowered input dimensions. <ref type="bibr" target="#b23">[24]</ref> observed that while this AI technique enhances the detection of anomalies, its biggest limitation is that it does not have a trainable objective tailored for the detection of anomalies and hence is unable to extract rich differential features for the detection of outliers. The second technique was One-Class Neural Networks (OC-NN) which is motivated by kernel-based one-class classification that utilizes a combination of the deep networks' ability to mine an increasingly rich illustration of data with the one-class aim of developing a tight envelope around normal data <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b15">16,</ref><ref type="bibr" target="#b23">24]</ref>. The authors found this method to enhance the accuracy and efficiency of irregularity discovery and this finding was in agreement with the findings of previous studies like <ref type="bibr" target="#b25">[26]</ref> and <ref type="bibr" target="#b26">[27]</ref>. According to <ref type="bibr" target="#b23">[24]</ref> one advantage of using the OC-NN deep learning detection intrusion technique is that this model is able to jointly train a deep neural network while enhancing a data-enclosing hypersphere or hyper-plane in output space (fig. <ref type="figure">3</ref>). However, the considerable disadvantage of this technique as established by <ref type="bibr" target="#b23">[24]</ref> is that it takes long to train and update the models for greater dimensional input data. Studies have also highlighted other various deep anomaly detection techniques that are effective and promising such as transfer-learning-based anomaly detection, clustering-based anomaly detection, and deep reinforcement learning (DRL) based anomaly detection among others <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b12">13,</ref><ref type="bibr" target="#b14">15,</ref><ref type="bibr" target="#b15">16]</ref>.</p><p>The findings above were echoed by <ref type="bibr" target="#b24">[25]</ref> who in their study on DL-based intrusion detection for IoT networks concluded that deep learning as a smart method solves the intrusion detection issue that is available for IoT networks. Previous studies have emphasized the importance of cyber security for IoT in contemporary information technology systems <ref type="bibr" target="#b27">[28,</ref><ref type="bibr" target="#b28">29,</ref><ref type="bibr" target="#b29">30]</ref>. The studies also emphasized the necessity for the application of AI to promptly detect malicious attacks. The study by <ref type="bibr" target="#b24">[25]</ref> has provided evidence indicating that the use of deep learning which is an AI is a smart technique that has enhanced the efficiency, speed, and accuracy of intrusion detection. However, despite this progress in using AI techniques to enhance intrusion detection for IoT networks, <ref type="bibr" target="#b18">[19]</ref>, following their survey ML-based intrusion detection methods observed that intrusion detection within the IoT setting is still a problem. The authors noted that despite the numerous positive outcomes realized from the application of AI techniques in the setting of security in information systems and IoT networks, particularly intrusion detection, the rate of false positives is still a challenge that further studies should address. According to <ref type="bibr" target="#b18">[19]</ref>, some AI techniques are able to lower the rate of false positives but, in contrast, increase the classification and training time. <ref type="bibr" target="#b18">[19]</ref> observed that certain AIbased intrusion techniques stabilize the false positive rate but cause a high computational load for training and testing. This is a significant issue in intrusion detection as real-time identification of threats is a relevant factor.</p><p>AIDS was initially developed as an improved method to overcome the limitations of the SIDS such as requiring regular maintenance of the database. Recent developments, especially the introduction of AI have brought further improvements to the AIDS technique compared to how the technique has traditionally been utilized. In their study on IDS in a cloud environment, <ref type="bibr" target="#b2">[3]</ref> assessed the improvements that have been made to the traditional methods of intrusion detection, particularly AIDS and SIDS. For instance, <ref type="bibr" target="#b2">[3]</ref> reviewed the proposed AIDS technique in which AIDS uses a machine-learning technique based on static program behavior analysis. This technique has two stages. First, the programs are decoded and second, context-free grammar is created to represent the process flow. Two feature selection techniques-Information Gain (IG) and Document Frequency) are employed separately as suggested by <ref type="bibr" target="#b30">[31]</ref>. Another AI-driven AIDS technique reviewed by <ref type="bibr" target="#b2">[3]</ref> was the entropy-based IDS whose purpose is to detect unknown attacks in the cloud environment. The authors reported high accuracy levels for this technique, noting that with an accuracy rate of 98%, this method is able to detect intruders. However, they observed that the limitation of these methods is that they can only detect traffic attacks like DoS/DDoS and IP spoofing with no consideration for worms, viruses, and rootkits.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>AI-driven AIDS</head><p>Further analysis by <ref type="bibr" target="#b2">[3]</ref> based on an earlier primary study by <ref type="bibr" target="#b31">[32]</ref> showed that combining fuzzy C-means with artificial neural networks (ANN) reduces false alarms and enhances IDS accuracy. In this technique, the huge database is broken down into groups that are then used in training the different ANN modules. The fuzzy segment is then utilized to bring together the outcomes of numerous ANNs. According to <ref type="bibr" target="#b2">[3]</ref>, the outcomes show that this approach is able to detect a broad array of hypervisor attacks with greater accuracy of detection and a reduced portion of false alarms. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Challenges</head><p>The findings and discussion above indicate that AI is playing a vital role in intrusion detection by giving superior accuracy rates in IDS. However, analysis of findings despite enhancing intrusion detection, AI use presents several challenges, especially concerning the effective detection of multiple attacks. The study has found that AI-based intrusion detection approaches prioritize accuracy and fail to consider other essential performance metrics like F1 score, recall, FAR, and precision. Three key challenges presented by AI have been established in this study. The first challenge is catching multiple attacks. <ref type="bibr" target="#b0">[1]</ref> and <ref type="bibr" target="#b10">[11]</ref> explained that it is accurate to detect one assault with an AI-based IDS but it is difficult to detect numerous attacks simultaneously. The second challenge is poor performance caused by noisy data. <ref type="bibr" target="#b0">[1]</ref> and <ref type="bibr" target="#b10">[11]</ref> discovered that the freely accessible datasets for the detection of attacks are big and are likely to have noisy data which can harm the performance of the system <ref type="bibr" target="#b10">[11]</ref>. The third challenge is failing to consider the influence of time intricacy and the use of CPU <ref type="bibr" target="#b31">[32]</ref>. This study found that the majority of the AI frameworks ignore the influence of time intricacy and the use of CPU on the performance of the system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Possible solutions Detecting Multiple Attacks</head><p>The challenge of detecting multiple attacks simultaneously is a major concern in intrusion detection. Traditional AI-based IDSs often struggle to identify and differentiate between various types of attacks occurring concurrently. This limitation can be attributed to the complexity of attack patterns and the evolving nature of cyber threats. However, hybrid classification approaches can address this challenge by combining the strengths of different classification algorithms.</p><p>For instance, the study proposes a hybrid approach that combines K-means clustering and Adaptive Support Vector Machine (A-SVM) algorithms. The K-means algorithm clusters similar data points based on their behavior, while the A-SVM algorithm classifies the data into normal or anomalous categories. This hybrid approach leverages the clustering capabilities of K-means to group similar attacks together, making it easier for the A-SVM algorithm to identify and classify them.</p><p>Another approach combines Support Vector Machines (SVM) and k-Nearest Neighbor (k-NN) algorithms. The hybrid method leverages the strengths of both classifiers, where SVM is used for initial classification, and k-NN handles instances that are difficult to classify. This two-step approach improves detection rates and reduces false positives, offering a robust solution for handling large and complex datasets. A notable study demonstrated this by applying the hybrid method to the NSL-KDD dataset, a benchmark for IDS performance evaluation. The results showed that the hybrid model outperformed traditional methods and several recent hybrid approaches. The use of SVM provided a reliable initial classification, while k-NN further refined the classification of uncertain instances, leading to improved overall performance.</p><p>The goal is to create a hybrid intrusion detection system (IDS) that first uses SVM to classify data and then employs k-NN for refining uncertain classifications (fig. <ref type="figure" target="#fig_3">5, 6</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Support Vector Machine (SVM)</head><p>Objective Function: Maximization of the margin between classes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>𝑚𝑖𝑛</head><formula xml:id="formula_0">𝑤,𝑏 1 2 ‖𝑤‖ 2<label>(1)</label></formula><p>Subject to:</p><formula xml:id="formula_1">𝑦 𝑖 (𝑤 × 𝑥 𝑖 + 𝑏) ≥ 1 ∀ 𝑖 (<label>2</label></formula><formula xml:id="formula_2">)</formula><p>where w is the weight vector, b is the bias,𝑥 𝑖 is the feature vector, and 𝑦 𝑖 is the label. Classification of the data points using:</p><formula xml:id="formula_3">𝑓(𝑥) = 𝑠𝑖𝑔𝑛(𝑤 × 𝑥 + 𝑏)<label>(3)</label></formula><p>Definition of the margin for classification certainty:</p><formula xml:id="formula_4">𝛾 = 𝑦 𝑖 (𝑤×𝑥+𝑏) ‖𝑤‖<label>(4)</label></formula><p>if γ &lt; threshold pass the instance to k-NN.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Mitigating the Impact of Noisy Data</head><p>The presence of noisy data in intrusion detection datasets is another significant challenge. Noisy data can introduce errors and inconsistencies, leading to inaccurate classifications and reduced system performance. Hybrid classification approaches can mitigate the impact of noisy data by incorporating data preprocessing and feature selection techniques.</p><p>In the study, a hybrid IDS system is proposed that integrates nature-inspired algorithms and machine learning approaches. The system employs a Genetic Algorithm (GA) for feature selection, which helps to identify and remove irrelevant or noisy features from the dataset. By focusing on the most informative features, the system can improve its classification accuracy and robustness against noisy data. Additionally, the use of Discrete Wavelet Transform (DWT) with Artificial Bee Colony (ABC) further refines the data by dividing it into categories and filtering out irrelevant features.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Addressing Time Complexity and CPU Usage</head><p>The disregard for time complexity and CPU usage in AI frameworks is a critical challenge that can hinder the real-time performance of intrusion detection systems. Hybrid classification approaches can address this challenge by incorporating optimization techniques and efficient algorithms.</p><p>For example, the study explores different hybrid classification techniques using the Gray Wolf Optimizer (GWO) algorithm. The GWO algorithm is a nature-inspired optimization technique that mimics the leadership hierarchy and hunting mechanism of gray wolves. By incorporating the GWO algorithm, the hybrid classification approaches can optimize the feature selection process and improve the efficiency of the classifiers, thereby reducing time complexity and CPU usage.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusions</head><p>Intrusion detection has been identified as one of the robust measures that can be undertaken by organizations to safeguard their assets. AI has proven to be beneficial in cyber security since it enhances the technologies used by organizations to combat cybercriminals and assists organizations in safeguarding their data and that of customers. This paper aimed to determine how AI-driven analysis and anomaly detection enhances intrusion detection in organizations.</p><p>A literature review was conducted that analyzed the existing findings on intrusion detection methods in organizational information systems, the types of IDS and methods of intrusion detection, the AI techniques currently in use for traffic analysis and anomaly detection, and case studies that show the impact of AI in enhancing intrusion detection. A secondary research methodology was used to find articles that were used to complete the study. Data from the articles was analyzed using thematic analysis. The findings established and categorized the AI-driven intrusion methods into four major groups namely-ML-based methods, DL-based methods, and AI-driven AIDS. The research findings indicate that ML has been proven to be the most potent security instrument in the detection of attacks.</p><p>ML-based techniques have been found to have enhanced accuracy in detection, with KNN in particular achieving a 99.89% accuracy rate. DL-based methods are enhanced forms of ML-based intrusion detection and hence are more efficient and more accurate in providing timely analysis of traffic and detection of anomalies. AI-based AIDS is better than traditional AIDS as it is able to detect a broad array of hypervisor attacks with greater accuracy of detection and a reduced portion of false alarms. The study also found three key challenges presented by the use of AI-based intrusion detection methods. They include catching multiple attacks, poor performance caused by noisy data, and failing to consider the effect of time complexity and utilization of CPU. Hybrid classification approaches offer promising solutions to overcome the challenges faced by AI-based intrusion detection systems.</p><p>By combining the strengths of different classification algorithms, incorporating data preprocessing and feature selection techniques, and addressing time complexity and CPU usage, these approaches can enhance the accuracy, robustness, and real-time performance of IDSs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Declaration of Competing Interests</head><p>The author declares that to the best of their knowledge, there are no competing personal associations or monetary interests that could have appeared to influence the work reported in this study.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Funding</head><p>This work was fully funded by the author and received no external funding.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Conceptual working of SIDS approaches</figDesc><graphic coords="3,142.55,517.55,315.47,134.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Conceptual working of AIDS based on ML</figDesc><graphic coords="9,137.57,214.09,324.75,125.99" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: An Enhanced Approach Combining SVM and k-NN</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Result achieved using the hybrid algorithm</figDesc><graphic coords="11,162.32,62.35,275.25,85.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="7,76.55,89.94,450.70,255.25" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="7,76.55,371.53,401.30,234.75" type="bitmap" /></figure>
		</body>
		<back>

			<div type="availability">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Declaration on Generative AI</head><p>The authors have not employed any Generative AI tools.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A comprehensive review of AI-based intrusion detection system</title>
		<author>
			<persName><forename type="first">T</forename><surname>Sowmya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">M</forename><surname>Anita</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Measurement: Sensors</title>
		<imprint>
			<biblScope unit="page">100827</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">Understanding modern intrusion detection systems: a survey</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">H</forename><surname>Yeo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Che</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lakkaraju</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1708.07174</idno>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Intrusion detection system in cloud environment: Literature survey &amp; future research directions</title>
		<author>
			<persName><forename type="first">S</forename><surname>Lata</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Information Management Data Insights</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page">100134</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Analysis of host-based and network-based intrusion detection systems</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">D</forename><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Network and Information Security</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="41" to="47" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Machine learning based intrusion detection systems for IoT applications</title>
		<author>
			<persName><forename type="first">A</forename><surname>Verma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Ranga</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Wireless Personal Communications</title>
		<imprint>
			<biblScope unit="volume">111</biblScope>
			<biblScope unit="page" from="2287" to="2310" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">H</forename><surname>Sajid</surname></persName>
		</author>
		<ptr target="https://www.v7labs.com/blog/ai-in-cybersecurity" />
		<title level="m">AI in cybersecurity: 5 crucial applications</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A survey of intrusion detection systems leveraging host data</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">A</forename><surname>Bridges</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">R</forename><surname>Glass-Vanderlan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">D</forename><surname>Iannacone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Vincent</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Chen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Computing Surveys (CSUR)</title>
		<imprint>
			<biblScope unit="volume">52</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1" to="35" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Host-based intrusion detection system with system calls: Review and future trends</title>
		<author>
			<persName><forename type="first">M</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Xue</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Zhong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Chen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Computing Surveys (CSUR)</title>
		<imprint>
			<biblScope unit="volume">51</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="1" to="36" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A survey of network anomaly detection techniques</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ahmed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">N</forename><surname>Mahmood</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Network and Computer Applications</title>
		<imprint>
			<biblScope unit="volume">60</biblScope>
			<biblScope unit="page" from="19" to="31" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Comparison of hybrid intrusion detection system</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">N</forename><surname>Cahyo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Sari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Riasetiawan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">12th International Conference on Information Technology and Electrical Engineering (ICITEE)</title>
				<imprint>
			<date type="published" when="2020-10">2020. October. 2020</date>
			<biblScope unit="page" from="92" to="97" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Survey of intrusion detection systems: techniques, datasets, and challenges</title>
		<author>
			<persName><forename type="first">A</forename><surname>Khraisat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Gondal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Vamplew</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kamruzzaman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybersecurity</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1" to="22" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Machine learning for traffic analysis: a review</title>
		<author>
			<persName><forename type="first">N</forename><surname>Alqudah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Yaseen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Procedia Computer Science</title>
		<imprint>
			<biblScope unit="volume">170</biblScope>
			<biblScope unit="page" from="911" to="916" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">A comparative analysis of different intrusion detection techniques in cloud computing</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bakshi</surname></persName>
		</author>
		<author>
			<persName><surname>Sunanda</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advanced Informatics for Computing Research: Second International Conference, ICAICR 2018</title>
				<meeting><address><addrLine>Shimla, India</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Singapore</publisher>
			<date type="published" when="2018">2019. July 14 15, 2018</date>
			<biblScope unit="page" from="358" to="378" />
		</imprint>
	</monogr>
	<note>Revised Selected Papers. Part II 2</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">A Survey on Network Intrusion System Attacks Classification Using Machine Learning Techniques</title>
		<author>
			<persName><forename type="first">V</forename><surname>Deepa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Radha</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IOP Conference Series: Materials Science and Engineering</title>
				<imprint>
			<publisher>IOP Publishing</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">1022</biblScope>
			<biblScope unit="page">12036</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">May. A deep learning approach for network intrusion detection system</title>
		<author>
			<persName><forename type="first">A</forename><surname>Javaid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Niyaz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Sun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Alam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 9th EAI International Conference on Bioinspired Information and Communications Technologies (formerly BIONETICS)</title>
				<meeting>the 9th EAI International Conference on Bioinspired Information and Communications Technologies (formerly BIONETICS)</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="21" to="26" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Deep learning methods applied to intrusion detection: survey, taxonomy, and challenges</title>
		<author>
			<persName><forename type="first">O</forename><surname>Lifandali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Abghour</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Decision Aid Sciences and Application (DASA)</title>
				<imprint>
			<date type="published" when="2021-12">2021. December. 2021</date>
			<biblScope unit="page" from="1035" to="1044" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">How companies are already using AI</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ramaswamy</surname></persName>
		</author>
		<ptr target="https://hbr.org/2017/04/how-companies-are-already-using-ai" />
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A machine learning based intrusion detection system for mobile Internet of Things</title>
		<author>
			<persName><forename type="first">A</forename><surname>Amouri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">T</forename><surname>Alaparthy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">D</forename><surname>Morgera</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page">461</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Internet of Things: A survey on machine learning-based intrusion detection approaches</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">A</forename><surname>Da Costa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">P</forename><surname>Papa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">O</forename><surname>Lisboa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Munoz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">H C</forename><surname>De Albuquerque</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Networks</title>
		<imprint>
			<biblScope unit="volume">151</biblScope>
			<biblScope unit="page" from="147" to="157" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Towards Machine Learning Based Intrusion Detection in IoT Networks</title>
		<author>
			<persName><forename type="first">N</forename><surname>Islam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Farhin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Sultana</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Kaiser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Rahman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mahmud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S M</forename><surname>Sanwarhosen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">H</forename><surname>Cho</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers, Materials &amp; Continua</title>
		<imprint>
			<biblScope unit="volume">69</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">A taxonomy of machine-learning-based intrusion detection systems for the internet of things: A survey</title>
		<author>
			<persName><forename type="first">A</forename><surname>Jamalipour</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Murali</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet of Things Journal</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">12</biblScope>
			<biblScope unit="page" from="9444" to="9466" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">CANN: An intrusion detection system based on combining cluster centers and nearest neighbors</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">C</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">W</forename><surname>Ke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">F</forename><surname>Tsai</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Knowledge-based systems</title>
		<imprint>
			<biblScope unit="volume">78</biblScope>
			<biblScope unit="page" from="13" to="21" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">A novel deep learning-based intrusion detection system for IOT networks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Awajan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page">34</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<title level="m" type="main">Deep learning for anomaly detection: A survey</title>
		<author>
			<persName><forename type="first">R</forename><surname>Chalapathy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chawla</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1901.03407</idno>
		<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Deep learningbased intrusion detection for IoT networks</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Fu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Syed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Baig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Teo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Robles-Kelly</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 24th pacific rim international symposium on dependable computing (PRDC)</title>
				<imprint>
			<date type="published" when="2019-12">2019. December. 2019</date>
			<biblScope unit="page" from="256" to="25609" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Deep one-class classification</title>
		<author>
			<persName><forename type="first">L</forename><surname>Ruff</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Vandermeulen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Goernitz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Deecke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Siddiqui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Binder</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Müller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kloft</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International conference on machine learning</title>
				<imprint>
			<publisher>PMLR</publisher>
			<date type="published" when="2018-07">2018. July</date>
			<biblScope unit="page" from="4393" to="4402" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<title level="m" type="main">Anomaly detection using one-class neural networks</title>
		<author>
			<persName><forename type="first">R</forename><surname>Chalapathy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Menon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chawla</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1802.06360</idno>
		<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b27">
	<monogr>
		<title level="m" type="main">Cybersecurity issues and challenges</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">A</forename><surname>Fischer</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note>In brief</note>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Internet of things for sustainability: perspectives in privacy, cybersecurity, and future trends</title>
		<author>
			<persName><forename type="first">A</forename><surname>Salam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Salam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Internet of Things for sustainable community development: Wireless communications, sensing, and systems</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="299" to="327" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">The cybersecurity in development of IoT embedded technologies</title>
		<author>
			<persName><forename type="first">B</forename><surname>Usmonov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Evsutin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Iskhakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Shelupanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Iskhakova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Meshcheryakov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2017 International Conference on Information Science and Communications Technologies (ICISCT)</title>
				<imprint>
			<date type="published" when="2017-11">2017. November</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<author>
			<persName><forename type="first">H</forename><surname>Wu</surname></persName>
		</author>
		<title level="m">Towards integrating learning algorithms into computer system design</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
		<respStmt>
			<orgName>UNSW Sydney</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Doctoral dissertation</note>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Anomaly detection system in cloud environment using fuzzy clustering-based ANN</title>
		<author>
			<persName><forename type="first">N</forename><surname>Pandeeswari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Kumar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mobile Networks and Applications</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page" from="494" to="505" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">A deep learning approach to network intrusion detection</title>
		<author>
			<persName><forename type="first">N</forename><surname>Shone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">N</forename><surname>Ngoc</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">D</forename><surname>Phai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Shi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE transactions on emerging topics in computational intelligence</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="41" to="50" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">A Hybrid Approach based on Classification and Clustering for Intrusion Detection System</title>
		<author>
			<persName><forename type="first">K</forename><surname>Jasmeen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Amanjot</forename><surname>Chahal</surname></persName>
		</author>
		<author>
			<persName><surname>Kaur</surname></persName>
		</author>
		<idno type="DOI">10.5815/ijmsc.2016.04.04</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Mathematical Sciences and Computing(IJMSC)</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="34" to="40" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<monogr>
		<title level="m" type="main">A Hybrid Method for Intrusion Detection Using SVM and k-NN</title>
		<author>
			<persName><forename type="first">Abhishek</forename><forename type="middle">&amp;</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Maheep</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Krishan</forename><surname>Berwal</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-67187-7_13</idno>
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">A hybrid approach for cyber security: improved intrusion detection system using Ann-Svm</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kajal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Nandal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Indian J. Comput. Sci Eng</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="412" to="425" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title/>
		<author>
			<persName><forename type="first">Durgesh</forename><surname>Srivastava</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rajeshwar</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vikram</forename><surname>Singh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Sciences And Engineering</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="757" to="764" />
			<date type="published" when="2019-05">2019. May 2019</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
