Advancing Cybersecurity: A Comprehensive Review of AI-driven Detection Techniques
Advancing Cybersecurity: A Comprehensive Review of AI-driven Detection Techniques
*Correspondence:
[email protected]
Abstract
1
Faculty of Computer As the number and cleverness of cyber-attacks keep increasing rapidly, it’s more
and Artificial Intelligence, Helwan important than ever to have good ways to detect and prevent them. Recognizing
University, Cairo, Egypt cyber threats quickly and accurately is crucial because they can cause severe dam-
2
Faculty of Computer
and Information, Kafr El-Sheikh age to individuals and businesses. This paper takes a close look at how we can use
University, Cairo, Egypt artificial intelligence (AI), including machine learning (ML) and deep learning (DL),
alongside metaheuristic algorithms to detect cyber-attacks better. We’ve thoroughly
examined over sixty recent studies to measure how effective these AI tools are at iden-
tifying and fighting a wide range of cyber threats. Our research includes a diverse array
of cyberattacks such as malware attacks, network intrusions, spam, and others, showing
that ML and DL methods, together with metaheuristic algorithms, significantly improve
how well we can find and respond to cyber threats. We compare these AI methods
to find out what they’re good at and where they could improve, especially as we face
new and changing cyber-attacks. This paper presents a straightforward framework
for assessing AI Methods in cyber threat detection. Given the increasing complex-
ity of cyber threats, enhancing AI methods and regularly ensuring strong protection
is critical. We evaluate the effectiveness and the limitations of current ML and DL
proposed models, in addition to the metaheuristic algorithms. Recognizing these limi-
tations is vital for guiding future enhancements. We’re pushing for smart and flexible
solutions that can adapt to new challenges. The findings from our research suggest
that the future of protecting against cyber-attacks will rely on continuously updating AI
methods to stay ahead of hackers’ latest tricks.
Keywords: Cyber-attacks, Artificial intelligence, Machine learning, Deep learning,
Cyber security, Intrusion detection
Introduction
In the face of evolving digital advancements such as software-defined networking (SDN),
big data, and fog computing, the growth of the internet has been remarkable. However,
these advancements come with significant cybersecurity challenges with major impli-
cations for critical infrastructure. Traditional security methods, with their reliance on
fixed security controls like firewalls and intrusion detection and prevention systems,
have struggled to keep pace with the sophisticated nature of contemporary cyber threats
[1]. Deep Learning (DL) has emerged as a transformative force, unlocking new pos-
sibilities for data access, enhanced performance, and potential maximization. It has
© The Author(s) 2024. Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits
use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original
author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third
party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the mate-
rial. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or
exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://
creativecommons.org/licenses/by/4.0/.
Salem et al. Journal of Big Data (2024) 11:105 Page 2 of 38
revolutionized not just artificial intelligence (AI) applications across images, voice, and
behavioral analysis but has also led to groundbreaking advancements in areas includ-
ing robotics, speech, and facial recognition. In the field of cybersecurity, DL has evolved
to play vital roles in detecting intrusions and monitoring for malware. This represents
a notable advancement from the earlier uses of machine learning (ML) [2]. While ML
has shown promise, its reliance on manual feature extraction has become a noticeable
limitation, particularly cybersecurity. The manual compilation of malware features for
ML-based recognition is a case in point, limiting the efficiency and accuracy of threat
detection to predefined features and overlooking unidentified characteristics. Conse-
quently, ML’s adeptness largely depends on the precision of feature extraction and rec-
ognition [3]. DL offers a strategic edge in cyber defense through its ability to uncover
complex, nonlinear correlations within data, thus enabling the recognition of new file
types and previously unknown threats. Notably, DL has propelled advancements in pre-
venting Advanced Persistent Threat (APT) attacks, even recognizing the subtle, high-
level features used in the most evasive tactics.
With the ubiquity of the Internet of Things (IoT), the explosion in network connectiv-
ity, and many associated applications, cybersecurity has become a focal point of contem-
porary security concerns. The need to identify a variety of cyber threats effectively and
develop robust intrusion detection systems has never been more pressing [4]. Advance-
ments in cloud computing have prompted various organizations to outsource their data
and computational requirements, emphasizing the need for a secure platform, particu-
larly within cloud-based systems. Understanding malware behavior in the context of
behavioral space is pivotal to enhancing the effectiveness of traditional security meas-
ures, especially given the vast and varied nature of cybersecurity data [5]. ML stands
at the forefront of automating behavior analysis through informative feature extraction
from network packets, paving the way for developing sophisticated intrusion detection
systems. The essence of ML is to endow computers with the capability to learn and adapt
autonomously without human intervention [6]. In an era where cybersecurity encom-
passes a range of techniques, policies, and procedures aimed at preserving data confi-
dentiality and integrity, the goal is to reduce the risk of attacks and safeguard against
unauthorized access. With the frequency and complexity of attacks escalating, there’s an
acute need for systems capable of identifying significant indicators of potential breaches.
Despite its complexity, DL holds the promise of delivering precise outcomes when prop-
erly trained, representing a significant step forward in cybersecurity methodologies [6].
This paper aims to explore the application of DL, ML, and Metaheuristics in modern
cybersecurity practices, evaluating their effectiveness in addressing cyber-attack threats
and proposing future directions for research and implementation.
Motivation
In today’s rapidly advancing digital era, the cybersecurity landscape faces unprecedented
challenges due to the sophistication and frequency of modern cyber threats. Traditional
security measures, such as firewalls and intrusion detection systems, rely on static con-
trols and manual processes, which are increasingly ineffective against the dynamic and
complex nature of contemporary attacks. These methods often fail to detect advanced
techniques like malware, phishing, APTs, botnets, and insider threats, leading to
Salem et al. Journal of Big Data (2024) 11:105 Page 3 of 38
high false-positive rates, slower response times, and a significant demand for human
intervention.
The motivation for this paper stems from the urgent need to bridge the gap left by
these traditional methods. By exploring AI-driven techniques, specifically DL and ML,
we aim to harness the power of AI to process vast amounts of data in real time, identify
intricate patterns, and adapt to new threats quickly. AI’s ability to learn from data and
continuously evolve makes it an invaluable tool in developing more resilient and scal-
able cybersecurity solutions by addressing challenges such as insider threats that pose
significant risks from within the organization, making them difficult to detect using con-
ventional methods, and botnets, which are networks of compromised devices controlled
by malicious actors capable of executing coordinated attacks that overwhelm traditional
defenses.
Many surveys must comprehensively cover recent studies on the three main topics of
ML, DL, and metaheuristic technologies. Additionally, they often fail to address the full
spectrum of cyber-attacks or include dedicated sections for future work and limitations.
In contrast, our survey provides thorough coverage of these areas, including specific sec-
tions for future works and limitations. Moreover, we have listed all recent datasets along-
side their corresponding studies, ensuring our survey is grounded in the latest research.
This research seeks to demonstrate how AI can transform cybersecurity by providing
more accurate, efficient, and adaptive defenses. By addressing the limitations of tradi-
tional methods, such as manual feature extraction and static controls, and leveraging
AI’s strengths, we aim to enhance the detection and mitigation of sophisticated cyber
threats, including insider threats and botnets, ultimately contributing to a more secure
digital environment.
Main contribution
The primary contribution of this paper is a carefully compiled collection of recent stud-
ies on different types of cyber-attacks and their corresponding detection technologies.
It outlines current challenges and research gaps, providing scholars with a clear over-
view and a solid foundation for further research into the use of AI to detect and mitigate
cyber threats. The contributions of the research are organized into the following points:
Paper structure
The paper is organized into six clearly defined sections to provide a systematic explora-
tion of AI methods in cyber-attack detection. In the ’Introduction’ section, we introduce
the research contributions and motivations. In the ’Background’ section, we discuss the
research background and describe the main topics of the research. In the ’Literature
Review’ section, we review related literature. In the ’Experiments and Setup’ section, we
briefly describe the research methodology used. In the ’Results and Discussion’ section,
we analyze the results and discuss the reasons behind them. Finally, in the ’Conclusion’
section, we summarize the entire text.
Background
The growth of computer networks has transformed how societies function, leading
to an increase in cyberattacks’ frequency and complexity. Cyberattacks are disruptive
activities that target computer systems, networks, or data. They are usually organized
and well-planned and involve synchronized steps to achieve their goals [3]. Intending to
cause damage, unauthorized access, or service interruptions that cause severe data loss
or financial damage and often lead to long-lasting consequences [7], these are the insider
threats that represent a significant and growing segment of these attacks, usually com-
mitted by disgruntled or rogue employees who exploit their authorized access to steal
data or cause harm. These threats can also emerge from intrusive applications that users
accidentally install on their devices, allowing these apps to access and misuse sensitive
information. Advanced behavioral anomaly detection and auto-resiliency mechanisms
are being developed to combat these threats by proactively identifying and mitigating
malicious actions at both the employee and application levels [8].
There is a broad spectrum of cyber-attacks that represent a variety of threats in the
digital world. Insights into several critical types of these attacks are provided, as high-
lighted in the literature and summarized in Table 1. This information emphasizes the
complexity and wide range of cyber threats, illustrating the many attacks organiza-
tions and individuals may encounter in today’s interconnected environment [3]. Bot-
nets, another critical cyber threat, are networks of infected computers controlled by an
attacker to perform coordinated malicious activities, such as DDoS attacks, data theft,
and spamming. These networks can be vast, comprising thousands or even millions of
compromised devices, which makes them incredibly difficult to dismantle. Botnet oper-
ators use sophisticated methods to infect devices and maintain control, continuously
evolving their techniques to avoid detection [9].
The range of cyber-attack types of points to the vital need for effective cybersecu-
rity strategies. It’s crucial to guard sensitive data and keep digital services running
smoothly. Figure 1 categorizes these cyber-attack types. As cyber threats are ever-
changing, it’s essential to remain alert and continuously invest in advanced secu-
rity solutions. Staying ahead of cyber threats means actively adapting to new risks,
Salem et al. Journal of Big Data (2024) 11:105 Page 5 of 38
Phishing This attack involves tricking individuals into divulging sensitive information, such as login cre-
dentials and financial data, by masquerading as trustworthy in electronic communication. It’s a
prevalent method for attackers to gain unauthorized access to personal or corporate data
Malware Short for "malicious software," malware includes viruses, worms, Trojans, and ransomware. It is
designed to cause damage or unauthorized access to computer systems and data. Malware
is a broad category that encompasses various forms of harmful software deployed during
cyber-attacks
DDOS Denial of Service (DoS)/Distributed Denial of Service (DDoS): These attacks aim to overwhelm
a system’s resources, making it unable to respond to legitimate service requests. DDoS attacks
use multiple compromised computer systems as sources of attack traffic, exacerbating the
scale of the assault
MitM Man-in-the-Middle (MitM) Attack: this type of attack intercepts the communication between
two parties without their knowledge. Attackers can steal, alter, or fabricate messages between
the communicating parties, leading to data breaches or eavesdropping
SQL injection This attack technique exploits vulnerabilities in a database-driven website by injecting mali-
cious SQL statements into a query. If successful, an attacker can read, modify, and delete
database information, potentially accessing sensitive data
Zero-Day Exploit Refers to an attack on or before the first or "zeroth" day of a vendor becoming aware of a
vulnerability. These attacks exploit vulnerabilities before they can be patched, making them
particularly dangerous and difficult to defend against
Ransomware Ransomware is a form of malware that encrypts the victim’s files, making them inaccessible
until the attacker pays a ransom for the decryption key. It represents a direct financial threat to
individuals and organizations by holding data or systems hostage
XSS Cross-site Scripting (XSS) attacks use third-party web resources to run scripts in the victim’s
web browser or scriptable application
APT Advanced Persistent Threats (APT): When an individual or group acquires unauthorized access
to a network and goes unnoticed for a long time, attackers may exfiltrate important data,
obviating the need for the organization’s security staff to investigate
BEC Business Email Compromise (BEC) attacks target employees with financial authority, using
detailed research to trick them into sending money to the attacker’s account
Crypto-jacking Crypto-jacking confidentially uses a victim’s computing resources to mine cryptocurrency,
posing a hidden threat by draining organizational network resources
Password attack A password attack involves trying to crack a user’s password using methods like Brute-Force,
Dictionary, Rainbow Table, Credential Stuffing, Password Spraying, and Keylogger attacks,
including phishing for passwords
Insider threat Insider Threats stem from individuals within an organization who misuse their authorized
access to the company’s systems and data
Botnet attack Botnet attack involves a network of compromised computers controlled remotely by an
attacker to execute coordinated malicious activities
employing best practices, and leveraging technology to safeguard against the diverse
tactics used by the attackers [11].
The cybersecurity community has strongly focused on attack detection as a cor-
nerstone strategy in response to these growing threats. This approach comprehen-
sively monitors network activities, system status, and usage patterns to preemptively
identify and neutralize unauthorized access or attacks. Within this landscape, AI and
its subsets, including ML and DL, offer promising solutions to support cybersecu-
rity. AI’s capacity to rapidly evolve and handle large datasets makes it well-suited for
identifying and responding to sophisticated cyber threats. By analyzing patterns and
learning from experience, AI-based systems can detect malware, insider threats, bot-
nets, network intrusions, phishing attempts, and other malicious activities [12].
Salem et al. Journal of Big Data (2024) 11:105 Page 6 of 38
analytics can foresee potential vulnerabilities before they are exploited, offering a pro-
active form of security rather than a reactive one. In essence, AI empowers cybersecu-
rity with advanced analytical tools, making it an indispensable ally in the battle against
cybercrime [17].
AI technologies encompass several approaches useful in cybersecurity, including:
• ML: Algorithms that enable computers to learn from data without explicit program-
ming, allowing for improved threat detection and classification [18].
• DL: Advanced neural networks that can process large amounts of data and learn
from experience, mimicking human brain functions to recognize complex patterns
[19].
Machine learning
ML is a domain that empowers computers to solve problems and interpret them without
explicit programming. It forecasts outcomes by analyzing past data. This section aims
to offer an overview of ML paradigms, classifications, and architectures. The learning
technique consolidates various ML algorithms, which differ extensively, and categorizes
them according to the nature of the tasks they perform or the complexity of their opera-
tions [22].
ML algorithms are divided into supervised, unsupervised, semi-supervised, and RL, as
shown in Fig. 2. A few more categories have emerged in more detail: semi-supervised,
Salem et al. Journal of Big Data (2024) 11:105 Page 8 of 38
Supervised learning: Supervised learning involves a set of labeled input–output pairs that guide the model during
training. The process includes developing a mapping function from inputs (x) to outputs (y) by analyzing the
data. Common applications include Classification and Regression tasks
Unsupervised learning: This approach does not utilize labeled data for training, aiming to uncover patterns or
structures within the data based on its inherent characteristics. Without predetermined labels or outputs, it
focuses on tasks like Dimensionality Reduction, Clustering, and Association Rule Learning. Language models in
unsupervised learning are often targeted by attacks
Reinforcement learning: Reinforcement learning (RL) operates by interacting with an external environment and
learning through trial and error. It develops predictions about future outcomes based on accumulated experi-
ences, notably without reported privacy attacks in this learning paradigm
Semi-supervised learning: Combining elements of both supervised and unsupervised learning, this method uses
a mix of labeled and unlabeled data to train models, enhancing interpretation with the unlabeled data before
refining tasks with the labeled portion. It is commonly applied in Classification and Regression tasks
Active learning: Active learning strategies select training data purposefully to minimize the need for extensive
labeled datasets, thereby optimizing the cost and time required to gather labeled training data
Ensemble learning: Ensemble learning involves merging multiple weak classifiers to create a robust classifier that
makes decisions based on the aggregate predictions of individual models. Techniques such as boosting and bag-
ging exemplify ensemble learning strategies
active, and ensemble learning, each suited for different types of data and problems as
discussed in Table 2 [18].
A variety of supervised and unsupervised learning techniques have been applied to
develop advanced and effective models capable of identifying and categorizing attacks.
Some of the ML Algorithms are briefly described in Table 3.
Deep learning
DL is a specialized area within ML focused on representation learning through multi-
layer transformations, leading to enhanced accuracy in detection and prediction tasks.
In cybersecurity, DL-enhanced defense mechanisms are increasingly deployed to auto-
mate the identification of cyber threats, with these systems continuously evolving and
enhancing their effectiveness over time [28].
Salem et al. Journal of Big Data (2024) 11:105 Page 9 of 38
Table 3 ML Algorithms
LR Logistic Regression: This technique is applied to classification challenges, predicting the outcome for a
categorical dependent variable. It is specifically designed for binary classification tasks, where the outcome
needs to be a categorical or distinct value [24]
GNB Gaussian Naive Bayes: A probabilistic classification method based on the Gaussian distribution. It operates
under the assumption that each feature independently contributes to the probability of the outcome,
aggregating these probabilities to determine the most likely class [25]
SVM Support Vector Machine works by transforming data into a higher-dimensional space to find a separating
hyperplane between different classes. This method is effective even when the data are not linearly separa-
ble in the original space [26]
DT Decision Tree: this algorithm builds a model in the form of a tree structure. It splits data based on attrib-
utes, using branches to represent decisions and leaf nodes to represent outcomes, aiming to predict a
target variable through simple decision rules [27]
ETC Extra Trees Classifier: generates multiple DTs using random samples of the dataset and features, choosing
split values randomly rather than calculating them. This randomness leads to a diverse and uncorrelated
ensemble of trees [25]
VC Voting Classifier: Combines the predictions of several classifiers by taking a majority vote to determine the
final class. This approach leverages the strengths of various models to improve overall performance [25]
RF Random Forest: An ensemble method that improves prediction accuracy and controls overfitting by aver-
aging the predictions of numerous DT classifiers, each trained on different data samples [27]
KNN K Nearest Neighbor: A method that classifies each data point based on the majority class among its KNNs.
It is a form of semi-supervised learning that relies on the proximity of data points to determine their clas-
sification [24]
BC Bagging Classifier: An ensemble technique that trains base classifiers on random subsets of the original
dataset and aggregates their predictions to form a final prediction, either by voting or averaging [25]
GB Gradient Boosting enhances predictive accuracy by combining multiple weak prediction models, typically
DTs, into a stronger model. This method sequentially corrects the errors of the weak learners, leading to
improved performance [25]
AC AdaBoost Classifier: An ensemble boosting method that combines multiple weak learners to form a more
accurate prediction model. It focuses on correcting the errors of individual learners by adjusting their
contributions to the final model [25]
XB XGBoost: An optimized gradient boosting library that is efficient and scalable for training. It employs
ensemble learning to combine the predictions of weak models, enhancing its capacity to handle large
datasets and achieve superior performance [25]
DL’s basic structure consists of the input layer, hidden layer/s, and output layer,
depending on the computational layers’ there are several models, as shown in Table 4,
which encompass a range of predictive models based on Artificial Neural Networks
(ANNs), which are networks of interconnected neurons transmitting information among
themselves. The distinction between Deep Neural Networks (DNNs) and simpler single-
hidden-layer neural networks lies in the DNNs’ substantial depth, marked by many hid-
den layers facilitating intricate pattern recognition. A DNN typically comprises an input
layer, several hidden layers, and an output layer, with each layer containing neurons that
output nonlinear responses, as shown in Fig. 3. Data progresses from the input layer to
hidden layers, where neurons compute weighted sums and apply activation functions
like ReLU or tanh, before reaching the output layer for final result presentation [19].
These architectures have broad applications in cybersecurity, from detecting false data
injection and network anomalies to developing advanced defense strategies and intru-
sion detection systems.
Metaheuristic
Metaheuristic algorithms are optimization methods that aim to find optimal or near-
optimal solutions to complex problems by exploring and exploiting the search space.
Salem et al. Journal of Big Data (2024) 11:105 Page 10 of 38
CNN Convolutional Neural Networks (CNNs) are tailored for processing multi-array data structures, such as
images or sequences, using local connections and shared weights for efficiency. CNNs often include
convolutional and pooling layers, culminating in fully connected layers, and are used in cybersecurity for
tasks like user authentication and malware detection, as shown in Fig. 4
RNN Recurrent Neural Networks (RNNs) and Long Short-Term Memory (LSTM) networks excel in learning
sequential data patterns, incorporating memory elements to handle temporal dependencies. LSTMs
address RNNs’ vanishing gradient problem by using cell memory units with gate mechanisms, making
them suited for analyzing time-dependent data
FNN Feedforward Neural Networks (FNN) process data from input to output layers through hidden layers in a
single direction. They are simple and effective for tasks like image and speech recognition but not suitable
for sequential data
GRU Gated Recurrent Units (GRU) are RNNs with update and reset gates to manage long-term dependencies
and mitigate the vanishing gradient problem. They excel in language modeling, speech recognition, and
time series prediction
VAE Variational Autoencoders (VAE) use a probabilistic approach to encode data into a latent space for
generating new, similar data samples. They are used in image generation, anomaly detection, and data
augmentation
GNN Graph Neural Networks (GNN) process graph-structured data by aggregating and updating node features
through message-passing mechanisms. They are effective for node classification, link prediction, and
graph classification in various domains
AE Autoencoders (AEs) aim to reconstruct their input at the output, utilizing encoder and decoder compo-
nents for dimensionality reduction and feature learning. AEs are employed in unsupervised learning and
are useful for tasks such as intrusion and spam detection
DBN Deep Belief Networks (DBNs) generate models from stacked Restricted Boltzmann Machines (RBMs),
learning data reconstruction in an unsupervised manner and enabling classification tasks through addi-
tional training
GAN Generative Adversarial Networks (GANs) consist of generative and discriminative networks that learn to
produce data indistinguishable from real data, addressing issues like data imbalance in cybersecurity by
generating synthetic data samples
DRL Deep Reinforcement Learning (DRL) combines RL with DNNs to develop agents that optimize long-term
rewards through actions, effectively addressing dynamic and complex security challenges
LSTM Long Short-Term Memory (LSTM) is a specialized RNN used for sequence prediction tasks, such as lan-
guage processing or time series analysis. It includes three gates—input, forget, and output—to control
the flow of information, solving the vanishing gradient problem of traditional RNNs. While effective for
time series prediction and classification, LSTMs require extensive training and are unsuitable for non-
sequential data
They are derivative-free, flexible, and effective in avoiding local optima. These algo-
rithms initiate their optimization process with one or multiple randomly generated
solutions and do not require derivative calculations like gradient-based methods.
Salem et al. Journal of Big Data (2024) 11:105 Page 11 of 38
Evolution-based method
• Genetic Algorithm (GA): Based on biological evolution principles, involve reproduction, crossover, and mutation
to evolve solutions
• Differential Evolution (DE): Similar to GA, focusing on population-based mutation, crossover, and selection to
generate new solution vectors
• Genetic Programming (GP): Evolves computer programs to perform a specific task by mimicking the process of
natural evolution
• Evolution Strategies (ES): Uses techniques inspired by biological evolution to optimize real-valued functions
Swarm-based method
• Particle Swarm Optimization (PSO): Inspired by social behaviors of bird flocking and fish schooling, optimizing
solutions based on the swarm’s collective intelligence
• Butterfly Optimization Algorithm (BOA): Mimics butterfly behavior in seeking mates or food through fragrance
emission, utilized for optimization
• Ant Colony Optimization (ACO): Mimics the foraging behavior of ants to find optimal paths through graphs
• Artificial Bee Colony (ABC): Simulates the foraging behavior of honeybees to optimize numerical problems
• Firefly Algorithm (FA): Uses the flashing behavior of fireflies to find global optima by attracting each other based
on their brightness
Human-based method
• Teaching–Learning-Based Optimization (TLBO): Emulates the teaching and learning process in a classroom,
where the best solutions are iteratively improved through teacher and learner phases
• Harmony Search (HS): Inspired by the musical process of finding harmonious states, focusing on memory con-
sideration, pitch adjustment, and randomization
• Cultural Algorithm (CA): Uses the concept of cultural evolution, where knowledge is shared and improved over
generations
• Group Search Optimization (GSO): Based on the group behavior of animals searching for food, such as pack
hunting strategies
Physics-based method
• Gravitational Search Algorithm (GSA): Based on Newton’s law of gravitation, where the search agents are objects
with mass attracting each other to find optimal solutions
• Simulated Annealing (SA): Mimics the annealing process in metallurgy, where a material is heated and then
slowly cooled to remove defects
• Electromagnetic Metaheuristic (EM): Uses principles of electromagnetism, considering solutions as charged
particles that attract or repel each other
• Harmony Search (HS): Listed under human-based due to its dual inspiration, it simulates the physical process of
finding a state of harmony
Literature review
Recent advancements in computing technology, particularly AI, have significantly
impacted everyday life and work by introducing systems capable of performing tasks
that traditionally required human intelligence. AI systems excel in real-time analysis
and decision-making, leveraging vast data volumes to solve complex problems across
various scientific and technological domains. This capability is increasingly critical in
cybersecurity, where the sheer volume of data makes manual analysis impractical, and
the sophistication of threats, including AI-based threats, continuously evolves. Employ-
ing AI can dramatically reduce the costs and time associated with developing threat
recognition algorithms despite the high expenses linked to specialist employment [15].
AI’s role in cybersecurity is multifaceted. It includes the efficient and accurate analy-
sis of large data sets, utilizing historical threat data to anticipate and mitigate future
attacks, even as attack methodologies evolve. AI’s adaptability makes it an invaluable
tool in cyber defense. It is capable of identifying significant changes in attack patterns,
Salem et al. Journal of Big Data (2024) 11:105 Page 13 of 38
managing large-scale data, and enhancing continuous learning within AI security sys-
tems to improve threat response [34].
However, the deployment of AI in cybersecurity is challenging. AI systems require
extensive data to function effectively, and processing such volumes can be resource-
intensive. Moreover, the risk of false alarms can undermine user trust in AI systems, and
delayed responses to threats may compromise system effectiveness [34]. Furthermore,
Cyber-attacks are significant risks to AI-based security systems. Despite these chal-
lenges, ongoing research enhances AI’s robustness against cyberattacks. In our survey,
we provide a comprehensive scope, covering a broad range of AI techniques, including
ML, DL, and metaheuristic algorithms, to address various cyber threats such as mal-
ware, network intrusions, insider threats, botnets, and spam, over sixty recent studies,
and the comparison of multiple AI methodologies. Unlike many surveys that do not
comprehensively cover all three main topics of ML, DL, and metaheuristic technologies,
we ensure that our survey addresses these areas thoroughly. Furthermore, we encompass
a wide array of cyber-attacks and provide specific sections for future works and limita-
tions, which many surveys lack. It also includes a detailed list of recent datasets and their
corresponding studies, ensuring our findings are grounded in the latest research. The
use of diverse benchmark datasets ensures comprehensive validation. The paper empha-
sizes the practical integration of AI and ML models across various environments, such
as IoT, cloud computing, and traditional networks, making its findings highly applica-
ble. Additionally, it highlights practical advantages like automation and real-time threat
response, showcasing the operational benefits of AI in cybersecurity. The future rec-
ommendations are detailed and actionable, focusing on continuous improvement, the
development of new datasets, transparency, explainability, and the early integration of
AI in the cybersecurity lifecycle for proactive measures. In [35] it covers AI, ML, DL,
and RL applications in cybersecurity, including malware detection, intrusion detection,
and vulnerability assessment. However, it could benefit from exploring the integration
of AI with blockchain for enhanced data integrity and real-world case studies for practi-
cal insights. A detailed comparison with traditional methods and discussions on legal,
ethical considerations, and privacy issues are needed. Highlighting human-AI collabo-
ration, robustness against adversarial attacks, and cross-disciplinary approaches would
provide a broader perspective. Future AI evolution to tackle emerging threats, scalabil-
ity, deployment challenges, and organizational readiness, including necessary training
for cybersecurity professionals, are also crucial areas to address. These additions would
make the study more comprehensive and practical for implementing AI and ML in
cybersecurity. In [36] a comprehensive survey on AI system vulnerabilities to cyberat-
tacks categorizes these threats into manipulation and extraction attacks. The technol-
ogies discussed include ML, DL, and various defense mechanisms such as adversarial
training, feature squeezing, and robust aggregation methods. The paper identifies attack
types like adversarial attacks, poisoning attacks, model inversion, and extraction attacks.
Diverse benchmark datasets are utilized for thorough validation; only a specific domain
has been introduced. A comparative analysis of several prominent studies has been con-
ducted to provide a comprehensive understanding of the current landscape in AI and
cybersecurity research. The comparison encompasses a range of criteria, including the
objective and scope, methodology, data sources, and used environments. This analysis
Salem et al. Journal of Big Data (2024) 11:105 Page 14 of 38
highlights the distinct approaches and findings of each study, thereby positioning the
present research within the broader context of existing literature. In [37] it provides
an extensive review of how AI and ML are utilized in cybersecurity. Key technologies
include supervised learning for intrusion detection, malware detection, and network
security. Unsupervised learning techniques to identify new threats. The paper covers
applications like security automation, threat intelligence, vulnerability management, and
security education, including malware, intrusion attempts, ransomware, crypto-jacking,
and IoT attacks, but still, a variety of techniques for cyber-attack detection needs to be
mentioned. In [38] a systematic review of AI applications in cybersecurity categorizes
236 studies within the NIST framework. It highlights AI’s role in automating tasks,
enhancing threat detection, and improving response accuracy using ML, DL, natural
language, and RL technologies. Key areas include asset management, threat hunting,
vulnerability assessment, incident response, and addressing malware, phishing, APTs,
and insider threats. Despite its comprehensive scope, the paper needs more analysis of
practical deployment challenges, ethical implications, and potential biases in AI mod-
els. It must also include discussions on standardized benchmarks and evaluation metrics
for AI effectiveness. Future research should focus on these aspects to ensure robust and
ethical AI applications in cybersecurity.
Some research has focused on identifying software vulnerabilities and malware, which
are key areas where AI can significantly impact. Techniques such as data mining, ML
classifiers like KNNs and SVMs, and DL architectures and metaheuristic algorithms
have been extensively applied to improve malware detection and software security [39].
Asiri et al. introduced the Hybrid Metaheuristics Feature Selection with Stacked DL-
Enabled Cyber-Attack Detection (HMFS-SDLCAD) model to address cyber security
in the IoT environment. Their novel approach employs the Salp Swarm Optimization
based on PSO (SSOPSO) for feature selection alongside a Stacked Bidirectional Gated
Recurrent Unit (SBiGRU) for detecting and classifying cyber-attacks. The model also
uses the Whale Optimization Algorithm (WOA) for optimizing the hyperparameters.
This comprehensive system, validated against benchmark datasets, showed substantial
improvements over existing models, demonstrating its efficacy in real-time cyber-attack
detection [40]. Caviglione et al. present an in-depth analysis of current malware threats,
illustrating how cyberattacks are increasingly sophisticated due to a combination of
technological advancements and innovative exploitation methods. The paper highlights
the rising incidence of malware attacks driven by cybercriminals seeking profits with rel-
atively low risk compared to traditional crimes. The study also discusses the challenges
of modern malware detection due to the complexity and diversity of attacks, empha-
sizing the need for constant evolution in detection techniques. The authors review the
state of malware and its detection, focusing on ML techniques, which are gaining trac-
tion as a means to combat the rapid evolution of malware. Their work underscores the
importance of staying ahead in the ongoing arms race between attackers and defend-
ers in the cyber field [41]. An et al. advanced the field of cyber security by developing
a CNN-based model (V-CNN) for the automated detection of vulnerabilities, utilizing
DL to outperform traditional static analysis. Their approach leveraged a comprehensive
dataset from MITRE’s CVE/CWE and redefined vulnerabilities for enhanced detection.
The V-CNN model demonstrated a remarkable 98% accuracy in identifying security
Salem et al. Journal of Big Data (2024) 11:105 Page 15 of 38
of securing Software Defined Networks (SDNs) from DDoS attacks. They developed a
real-time detection and mitigation model that calculates application-specific thresh-
old limits using a ML model, distinguishing between benign and DDoS traffic. Unlike
static thresholds commonly used in prior research, their dynamic threshold adapts to
current network traffic conditions for more accurate DDoS detection. Upon identifying
DDoS traffic, their system blocks only the offending traffic stream, allowing legitimate
traffic to proceed unhindered. This approach not only improves the efficiency of DDoS
attack mitigation in SDNs but also minimizes disruptions to non-malicious network
applications [49]. Gaur and Gujral have made an enhanced cybersecurity measure for
IoT devices by evaluating ML classifiers aimed at the early detection of DDoS attacks.
Utilizing the CICDDoS2019 dataset, their proposed system demonstrated superior per-
formance through a hybrid feature selection methodology. By implementing chi-square,
Extra Tree, and ANOVA on classifiers like RF, DT, KNNs, and XGBoost, they achieved
an impressive 98.34% accuracy with ANOVA for XGBoost while significantly reducing
feature dimensions by 82.5%. This methodology not only enables the early detection of
DDoS attacks on IoT devices but also contributes to the efficiency and robustness of
cyber defense mechanisms [50].
Additionally, AI has proven effective in phishing and spam detection, where AI algo-
rithms help identify and filter malicious content. Innovative approaches using neural
networks, RL, and combinations of ML techniques like SVM, NB, NN, and DL have
been particularly effective in distinguishing between legitimate communications and
potential security threats, beside metaheuristic algorithms. Asiri et al. have developed
an innovative NN model for cyberattack detection that utilizes an Enhanced Whale
Optimization Algorithm (EWOA). This model specifically addresses the growing threat
of credential stuffing attacks, which exploit the common practice of reusing creden-
tials across multiple platforms. By optimizing the training of the NN, the EWOA sig-
nificantly enhances the system’s ability to detect such cyber threats. Their empirical
analysis shows that this model outperforms traditional methods in detecting credential
stuffing, demonstrating its potential to significantly improve digital security measures
[51]. Atawneh and Aljehani investigated the application of DL to enhance email phish-
ing detection mechanisms. Utilizing a dataset comprised of both phishing and benign
emails, their research exploited advanced DL models, including CNNs, LSTMs, RNNs,
and BERT, for more accurate identification of fraudulent emails. Their work, notable
for leveraging natural language processing techniques, achieved a breakthrough accu-
racy of 99.61% by employing BERT and LSTM models. This study is a testament to the
potential of sophisticated DL techniques in fortifying cybersecurity measures against the
evolving threats of phishing [52]. Asiri et al. made significant advancements in real-time
phishing detection systems using DL. They tackled the increasingly sophisticated phish-
ing attacks, which often exploit legitimate web development techniques to deceive vic-
tims. Their system was designed to detect Tiny Uniform Resource Locators (TinyURLs),
Browsers in the Browser (BiTB), and regular phishing attacks. By splitting their detec-
tion system into a DL model, browser extension, and docker container, they were able
to achieve precision, recall, and F1 score of 99%. The model employed a Bidirectional
Long Short-Term Memory (BiLSTM) with an attention mechanism to classify URLs
efficiently. Furthermore, they introduced three decision strategies—Single Phishing
Salem et al. Journal of Big Data (2024) 11:105 Page 17 of 38
Strategy (SPhS), Mean Sum Strategy (MSS), and Weighted Average Strategy (WeAS)—
to enhance the decision-making process on whether a webpage is benign or malicious.
Their system demonstrated the best results with the WeAS, proving the importance of
strategic decision-making processes in cybersecurity [53]. Alohali et al. have proposed
a phishing detection model using metaheuristics and DL to enhance cybersecurity in
sustainable environments. Their method combines an Improved Simulated Annealing-
based Feature Selection (ISA-FS) with Long Short-Term Memory (LSTM) networks,
optimized further using the Bald Eagle Search (BES) algorithm for hyperparameter tun-
ing. This multifaceted approach not only improves the accuracy of detecting phishing
websites but also optimizes the process to reduce computational overhead, achieving an
impressive accuracy rate of 95.78% in their evaluations [54]. For email spam detection,
Sharma and Sahni have explored the use of multi-layer perceptrons (MLPs) for efficient
classification of network traffic, which is vital for identifying malicious activities in real-
time. Their research proposed a hybrid model integrating MLP with DTs to enhance
the predictive accuracy and speed of network intrusion detection systems (NIDS). The
authors demonstrated that their model could achieve high accuracy rates, significantly
outperforming traditional methods in terms of speed and detection rates. Their findings
suggest that the hybrid approach not only reduces the false positive rates in detecting
network anomalies but also efficiently handles large-scale data, making it a promising
solution for future cybersecurity applications [55]. Butt et al. investigated cloud-based
strategies for combating email phishing attacks using ML and DL techniques. Their
study emphasized the effectiveness of using a combination of SVM, Naive Bayes (NB),
and long short-term memory (LSTM) algorithms to classify and detect phishing emails
with high accuracy. These algorithms allowed for a significant advancement in identi-
fying malicious activities, with the SVM algorithm achieving the highest accuracy of
99.62%. This work underlines the potential of integrating various ML approaches to
enhance cybersecurity measures against sophisticated email threats [56].
Collectively, these AI-based technologies address the challenges in cybersecurity
more effectively than traditional methods. They do so by automating the detection
and response processes, enhancing the speed and accuracy of threat detection. Under-
standing the mechanisms and operations behind these AI models offers more profound
insights into their application, highlighting their critical role in developing more resil-
ient cybersecurity systems. Overall, metaheuristic algorithms support the robustness
and adaptability of cyber-attack detection systems, making them more effective against
a wide range of cyber threats. They ensure that detection systems are not only accurate
but also remain relevant over time as attack methods evolve.
The resultant search string, addressed using the above steps, was: ("Software Cyber-
attacks" OR "SW Cyber-attacks") AND ("Detection") AND ("Methods”) AND ("Cyber-
attack" OR "Cyber attack" OR "Cybersecurity" OR "Cyber threats") AND ("Machine
Learning" OR “ML” OR "Deep Learning" OR “DL” OR "Metaheuristic Algorithms"
OR "Optimization Algorithms") OR ("Artificial Intelligence" OR "AI"). This string was
employed to aggregate all published papers, aiming to maximize the scope of relevant
literature within a set timeframe from 2020 up to now.
To refine the selection of primary studies, we established inclusion and exclusion
criteria as shown in Table 6.
Initially, 9084 studies were identified through the search string. After screen-
ing these studies based on titles, abstracts, and keywords, we narrowed them down
to 409 primary studies. Further application of the inclusion and exclusion criteria
reduced the selection to 68 relevant studies. These studies were thoroughly reviewed
to confirm their quality and relevance to our research goals, focusing on their scien-
tific rigor and contributions to the field of cyber-attack detection.
Salem et al. Journal of Big Data (2024) 11:105 Page 21 of 38
[58] 2020 Cyber-attack DBN, DT, and SVM Models accuracy: Multiple includ- Enhance cybersecurity Requires large data- Network based Develop new and hybrid
detection DBN: 97.50, DT: 99.96, ing NSL-KDD, capabilities sets, computational environment models
SVM: 95.11 DARPA resources
[59] 2024 Botnet Attacks Network Traffic Analysis 99.8% botnet traf- Live botnet High accuracy, efficient Challenging deploy- Network infra- Improve traffic analyzer,
and Machine Learning fic filtered, 100% attack dataset traffic filtering ment on resource- structure, IoT enhance honeypot, train
accuracy constrained devices devices ML on recent datasets
(2024) 11:105
[60] 2024 Insider Threat Hybrid detection: Accuracy: 98.48% CERT r4.2 Handles bias and data High computational Organizational Develop employee-specific
Monitoring & Machine Learn- imbalance; improves cost; needs real-time security trained models; deploy cli-
Detection ing + Statistical Criteria prediction accuracy implementation ent–server architecture for
threat detection API
[61] 2024 Intrusive applica- Continuous Threat Identified 378,480 Google Play High accuracy in Resource-intensive, Android Enhance tools for analyz-
tions in Android Monitoring Framework intrusive apps with Store data detecting intrusive time-consuming new ing AndroidManifest.xml,
(CTMF) 77.919% accuracy apps dataset preparation develop dedicated Google
Play API
[62] 2022 DOS/DDOS attacks "Looking-Back" concept 99.81% accuracy Bot-IoT dataset Precise handling of Computational com- IoT Test against smarter attacks
in IoT for detection with RF DoS/DDoS attacks plexity
classifier
[63] 2022 Detect Cyber- MFO-RELM model Accuracy: 99.79%, N-BaIoT Effective cybersecurity Model’s implementa- IOT Incorporate novel cluster-
attacks in IOT Precision: 98.84%, threat identification tion complexity ing and outlier removal
Recall: 98.84%,
F-score: 98.84%
[64] 2023 DDoS for Software- Improved binary grey 99.13% accuracy CSE-CIC- New solution for SDN Extensive parameter SDN Classify different types of
defined Network wolf optimization with IDS2018 security tuning malware
ML algorithms
[65] 2023 Intrusion Detec- FFO for detecting 98.99% accuracy KDD-CUP 99 High performance Handling zero-day Network Develop more adaptable
tion intrusions and PNN for across various cyber- attacks, computational IDS technologies
categorization attacks requirements
[66] 2024 Network Intrusion GSAFS-OQNN model Accuracy: 99.79%, UNSW-NB15 Optimal feature selec- Computational com- Network Improve the model’s
Detection Specificity: 99.88%, tion, adaptability plexity adaptability and scalability
MCC: 98.72%
[67] 2024 DDOS Attacks Evolutionary optimiza- 99.99% accuracy KDD Cup 99, Advances DDoS attack Complexity of imple- Network Further, improve detection
tion algorithms with ML with XGB-GA CIC-IDS 2017 detection, enhances mentation and tuning capabilities
techniques cybersecurity
Page 22 of 38
Table 7 (continued)
Ref. Year Attack problem Used method Result Dataset Pro Cons Environment Future work
Salem et al. Journal of Big Data
[68] 2023 Cloud computing Supervised learning Detection rate over Private cloud High detection rate Scalability and Cloud Detect specific cloud
attacks algorithms, including 99% environment and efficiency in cloud adaption to evolving attacks, explore more
SVM, LR, RF, DT, NB, dataset computing security attacks classifiers
XGBoost, and KNN
[69] 2024 Enhance IDS LR, SVM, DT, and RF RF achieves an F1 UNSW-NB15 Data-driven cyberse- Computational Network Test with actual network
score of 97.80% curity with early threat complexity, scalability traffic data
(2024) 11:105
detection issues
[70] 2023 Various cyber- ML algorithms includ- ADA Boost has 98.3% UNSW-NB15 Improves detection Security challenges in IoT Enhance security in IoT
attacks in IoT ing ADA Boost, LSVM, accuracy accuracy of IDS IoT-based smart cities networks with AI and GA
Auto Encoder Classifier,
QSVM, MLP
[71] 2024 Phishing attacks LR and RF 92% accuracy in Phishing Data- Real-time monitoring, Potential false posi- Web and Internet Expand data, enhance
detecting URLs set from Kaggle high accuracy tives/negatives in clas- Services detection range
sification
[72] 2023 DDOS and MiTC DT, SVM, NB, KNN 99.96% accuracy Simulated Adaptive identifica- Need for extensive Cloud Detect other types of
Attack in the Cloud with DT DDOS and MiTC tion of evolving attack training data attacks in cloud environ-
datasets techniques ments
[73] 2022 Cyber-attacks RF, J48, NB, Multi-Layer 99.76% accuracy NSL-KDD Efficient cyber-attack Requires extensive Network Enhance technique perfor-
detection Perceptron algorithms detection accuracy datasets for training mance
[74] 2024 Malware Detection ML algorithms with RF has 97.68% UNSWNB15 Detects multiple types Computational Cloud Investigate Hidden Markov
feature selection based accuracy of attacks, enhances demands, large data- Models and DL
on TFIDF network security sets needed
[75] 2023 Network Intrusion MLBNIR approach Reduced intrusion InSDN dataset Effective detection and Computational com- SDN Enhance IDS performance
Recovery in SDN including LR, DT, SVM, recovery time by up reduced recovery time plexity with new algorithms
RF to 90% in SDNs
[76] 2023 DDOS Attacks in MTD approach using Efficient detection Kaggle Effective solution for Significant computa- SDN Improve IDS performance
SDN probabilistic linear within 3 s sophisticated cyber tional resources are with new algorithms
models, NN, and trees threats in SDNs needed
Page 23 of 38
Table 8 Recent studies of DL models in cyber-attacks detection
Refs. Year Attack problem Used method Result Dataset Pro Cons Environment Future work
Salem et al. Journal of Big Data
[53] 2024 Phishing Attack Hybrid methods with Precision, Recall, F1 Phishing URLs Real-time detection, Complexity, potential Web and Expand dataset, refine mod-
URL extraction and Score: 99% and benign URLs high accuracy for delayed perfor- Internet els, focus on URL paths
DL model dataset mance Services
[77] 2024 Adversarial attacks DLL-IDS with LID LID method NSL-KDD, CIC- High accuracy, adapta- Computational over- Network Enhance IDS security across
on DL-based IDS method Improved detection IDS2018 ble, maintains accuracy head, optimization domains, explore robust
accuracy from 17.9% on clean samples needed for real-time methods against attacks
(2024) 11:105
[83] 2022 DDOS attack detec- Intrusion detection 99.99% accuracy for CIC-DDoS2019 High detection High computational Network Test architecture against dif-
tion system using DNN, binary classification, accuracy, real-time resources and large ferent IoT datasets, enhance
CNN, and LSTM 99.30% for multiclass performance, adaptive datasets for effective resilience to adversarial learn-
recognition of various training ing attacks
DDoS patterns
[84] 2023 Malware Detection DL methodology Over 99% detection Generated new Substantial improve- Challenge of iden- Cloud Expand application to clas-
(2024) 11:105
with multiple layers rate, 99.80% accuracy Malware dataset ments over existing tifying emerging sifying specific malware types,
and model combina- methods, effective and sophisticated evaluate effectiveness on
tions against known and malware additional datasets
zero-day malware
[85] 2024 Ransomware Ebola optimization Accuracy: 99.88%, Dataset with 840 High accuracy and Computational com- IOT Novel approach combining
Detection search algorithm for Sensitivity: 99.88%, samples including robustness in detection plexity, substantial Ebola optimization with DL
enhanced DL-based Specificity: 99.88% goodware and training data needed for improved detection in IoT
detection ransomware devices
[86] 2023 DDOS, DoS, Brute- Hybrid DL-based Achieved 95% CSE-CIC-IDS-2018 Significant effective- Need for continu- Cloud Enhance adaptability to new
force, and botnet approach for intru- accuracy ness in detecting and ous model updates, cyber threats, integrate more
attacks in the Cloud sion detection using classifying malicious potential computa- advanced AI techniques
PCA, SMO-FCM, activities tional demands
and AE
[87] 2022 IDS DL Model based on Up to 99% detection CSE-CIC-IDS-2018 High accuracy in feature Significant computa- Network Enhance model accuracy,
LSTM accuracy extraction, adept at tional resources and reduce error rates, and speed
analyzing large datasets extensive training up training by identifying the
data are required most relevant features
[88] 2024 IoT cyber-attack DNN, RNN, and CNN High accuracy of CICDIoT2023 High accuracy, versatil- Substantial compu- IoT Incorporate incremental
detection models 96.56% ity in application, lever- tational resources, training, explore real-time
ages DL for enhanced potential overfit- cyberattack detection system
detection ting, large datasets integration
needed
[89] 2023 Malicious attacks Bi-directional LSTM 99% precision and UGR’16 High precision and Computational Network Explore other feature
detection model recall rates recall rates, effective demands, extensive engineering techniques
identification and clas- datasets for training with Bi-LSTM for improved
sification performance
Page 25 of 38
Table 8 (continued)
Refs. Year Attack problem Used method Result Dataset Pro Cons Environment Future work
[90] 2023 Web-based attacks CNNs and RNNs High accuracy KDD Cup 1999 Effective at identifying High computational Web and Integrate DL with other AI
Salem et al. Journal of Big Data
detection 94–96% and CICIDS2017 sophisticated cyber demand, complex Internet methods like RL for robust,
threats, adaptable to model training Services adaptive systems
cybersecurity chal-
lenges
[91] 2023 Cyber-attacks in IoT Distributed DL Up to 99.95% NSL-KDD and Effective identification Significant compu- IoT Explore integration of DL
networks framework using accuracy BoT-IoT of sophisticated threats, tational resources, with other AI methods like
(2024) 11:105
FFNN and LSTM adaptable to cybersecu- extensive training adversarial learning for more
rity dataset challenges datasets required robust systems
[92] 2022 Network Cyber- Combination of DL Best: LSTM + CNN HTTP DATASET Effective use of DL in Requires large com- Networks Explore additional deep
attacks and ML algorithms (Acc: 99.5%, Prec: CSIC 2010 cybersecurity, detects putational resources learning configurations and
with statistical tech- 100%, Rec: 99%, F1: multiple attacks datasets
niques 99.5%)
[93] 2022 DOS, U2R, probe, Spider Monkey Opti- Acc: 99.02%, Prec: NSL-KDD Significant effective- Computational IoT Further analysis with respect
and R2L attacks mization, Stacked 99.38%, Rec: 98.91%, ness in identifying and demands necessity to payload-based detection,
Deep Polynomial F1: 99.14% classifying malicious for extensive datasets explore different classifiers
Network activities and datasets
[19] 2022 Cybersecurity CNN, RNN, DNN CNN: Acc: 98.64% USTC-TRC2016, High accuracy and Intensive compu- Network Improve DL methodolo-
attack detection with binary class, NSL-KDD precision in attack tational and data gies for better accuracy and
using deep learn- RNN: Acc: 97.75%, detection processing require- efficiency in real-time applica-
ing DNN: Acc: 96.81% ments tions
[94] 2023 Intrusion Detection Transfer Learning Anomaly Detection: InSDN Effective for unknown Requires long train- SDN Combine sampling tech-
in SDN with Reptile-TL 0.71, Attack Type attacks and small sam- ing times (over 4 h) niques with few-shot learning
Identification: 0.91 ple scenarios
[95] 2023 Detection and Adversarial DBN- Accuracy: 91.23%, CICDDoS 2019 Effective against adver- High computational SDN Refine models to enhance
Defense against LSTM Sensitivity to adver- sarial attacks, efficient costs, complex resistance to adversarial
DDoS Attacks in sarial DDoS training model architecture inputs
SDNs
Page 26 of 38
Salem et al. Journal of Big Data (2024) 11:105 Page 27 of 38
complex and large-scale data, which are characteristic of today’s digital ecosystems.
These scholarly works have been critically summarized, covering various DL archi-
tectures like CNNs, RNNs, and more advanced models. The essence of these papers,
along with their novel contributions and findings, has been efficiently encapsulated
in Table 8. This collection serves as a robust analytical tool for researchers to identify
gaps and opportunities for innovation in the landscape of DL applications in cyber
security.
RQ4: What are the most commonly used datasets for detecting cyber‑attacks?
Common datasets for detecting cyber-attacks vary in characteristics, with both old and
modern datasets offering unique benefits and limitations [111]. These datasets are sum-
marized at the below Table 10.
In addition to the commonly used benchmark datasets for detecting cyber-attacks, we
have recently introduced several modern datasets that come with their own unique set
of advantages and limitations:
1 PhiUSIIL phishing URL dataset: This dataset, generated between October 2022 and
May 2023, includes 134,850 legitimate URLs and 100,945 phishing URLs. It features
attributes like top-level domains, URL length, subdomains, and obfuscated charac-
ters. Its balanced nature and recent phishing techniques enhance model accuracy,
although it requires significant computational resources and may over-specialize due
to continuous training [115].
2 CICEV2023 dataset: Created in 2023, this dataset focuses on DDoS attacks on EV
authentication within smart grid infrastructure. It includes metrics such as "Time
delta," "Instruction overhead," and "CPU cycle overhead," with 5,284 normal and
58,000 attacks EV authentication attempts. It provides a robust foundation for devel-
oping detection models but focuses more on infrastructure status than actual EV
charging records [116].
3 Edge-IIoTset dataset: This dataset, generated from November 2021 to January 2022,
includes 61 features and covers various attacks, such as DoS/DDoS, information
gathering, and malware. It supports centralized and federated learning modes and
Table 9 Recent studies of metaheuristic models in cyber-attacks detection
Refs. Year Attack problem Method Result Dataset Pro Cons Environment Future work
Salem et al. Journal of Big Data
[96] 2023 Cyber-attack detec- Hybrid feature selection 99.48% accuracy ToN-IoT Efficient feature minimi- Computational IoT Efficient and fast IDS for IoT
tion in IoT networks scheme with NSGA-II zation complexity
[97] 2023 IoT Cyber threat Framework using BGSA High accuracy UNSW-NB15 High accuracy and low Requires complex IoT Optimizing the feature
detection and BGWO for opti- (99.41%) FPR feature selection selection and classification
mized feature selection framework
[98] 2023 Email Spam Detec- PSO and GA with ML Accuracy(97.66%) Pre- Spam Email and Adapts to new spam Requires complex Email System Explore integration with
(2024) 11:105
tion techniques cision (94.21%) Recall Enron Spam Dataset strategies implementation other meta-heuristic tech-
(97.23%) and tuning, compu- niques
tation intensive
[99] 2024 Intrusion cyber- Deep Stacked Ensem- 99% accuracy MSU-ORNL Adaptability and learning Computational Network Integration of more sophisti-
attacks ble, GWO capability complexity cated AI and ML techniques
[100] 2023 Android malware RHSODL-AMD Model 99.05% accuracy Andro-AutoPsy Effective discrimination Computational Android Improve RHSODL-AMD
detection with RHSO for feature between malware and efficiency technique’s performance
and ARAE model opti- legitimate apps
mized with Adamax
[101] 2023 Cyber-attacks on RBM with artificial root Up to 97.8% accuracy Oak Ridge National High accuracy and adapt- Requires intensive Smart grid power Enhance performance and
SCADA systems foraging optimization Lab Dataset, MSU ability computation systems, SCADA extend the algorithm
systems
[102] 2024 Traffic diversion GA in SDN framework Over 70% accuracy Public dataset High adaptability to SDN Computational SDN Further improvements in
attacks in SDN environments demands the algorithm’s performance
[103] 2023 Network Intrusion GWDTO hybrid 98.1% accuracy and IoT-IDS Enhanced performance Computational Network Enhancements to GWDTO
Detection metaheuristic optimiza- high stability in feature selection complexity algorithm and broader
tion application
[104] 2023 Network Intrusion FCM and NN classifier 99.97% accuracy CICIDS2017 Improved accuracy in High computational Network Further evaluate against
Detection with GA, PSO detecting cyber-attacks resources required recent datasets
[105] 2024 DOS Attack Hybrid optimization- 92.8% accuracy NSL-KDD, BOT-IoT Effective DoS attack Computational Network Test the model across more
based DL with DBN, AO, detection complexity datasets
DHOA
[106] 2024 Network intrusion Bio-inspired optimiza- Over 98.8% accuracy CSE-CIC-IDS2018 High accuracy with Requires meticulous Network Enhance detection capabili-
Detection tion with DL for attack reduced feature sets feature selection ties
detection to achieve high
accuracy
Page 28 of 38
Table 9 (continued)
Refs. Year Attack problem Method Result Dataset Pro Cons Environment Future work
[107] 2021 Network intrusion TS-RF using Tabu Search 83.12% accuracy. UNSW-NB15 Improved classification Requires intensive Network Explore new algorithms and
Salem et al. Journal of Big Data
Detection and RF FR > 60% accuracy, Reduced time computation for models
complexity and feature optimization
space
[48] 2021 DOS Attacks in OCSA for feature 94.12% accuracy KDD Cup 99 Dataset High accuracy in classify- Requires intensive Cloud Enhance detection of vari-
Cloud Computing selection and RNN for ing malicious activities computation ous attacks
(2024) 11:105
detection
[108] 2023 Network Intrusion MQBHOA with HOA and 99.8% accuracy NSL-KDD, CSE-CIC- Effective solution for Computational Network Enhance IDS performance in
Detection quantum computing IDS2018 sophisticated cyber resources need cloud computing
threat detection
[45] 2022 Hierarchical Intru- Meta-heuristic optimiza- Accuracy: 98.93%, DR: UNSW-NB15, CIC- High accuracy, low FAR, Complex setup Network Refinement of FS tech-
sion Detection tion with ELM 99.63%, FAR: 0.01% IDS2017 effective for multiple and computational niques, explore additional
attack types intensity datasets
[109] 2024 Clustering-Based Cuckoo Search (CSA), CSA: FPR 0.02 (best for CICIDS2017 Effective for specific Limited by switch- Network Refine switching probabili-
DDoS Attack Detec- Flower Pollination (FPA), lower approximations), ranges of approximation ing approximations, ties, broader dataset testing
tion Firefly (FSA) FPA: FPR 0.015 (best in feature selection less effective for
for upper approxima- middle ranges
tions), FSA: FPR 0.03
[110] 2023 Malicious attacks in Hybrid Metaheuristics Improved classifica- Microsoft Malware Optimized feature Computational Cloud Further comparative
cloud computing (PSO, FFA, SFLA), CNN tion accuracy; FFA prediction database selection for cloud data complexity and studies and exploration of
achieved the best and GitHub database classification parameter tuning additional metaheuristic
results (99.84%) needs algorithms
[40] 2022 Cyberattacks in IoT Hybrid Metaheuristics, High accuracy 99.77%, Benchmark dataset High accuracy and Computational IoT Incorporate feature reduc-
Deep Learning, SBiGRU, outperformed older robustness against costs tion and outlier removal
SSOPSO models attacks
Page 29 of 38
Salem et al. Journal of Big Data (2024) 11:105 Page 30 of 38
CICIDS2017 2017 ~ 2.8 M 83.1 16.9 DDoS, DoS, BruteForce, and others
MQTTset 2020 ~1 M 70 30 DoS, Publish Flood, Malformed data and
more
CSE-CIC-IDS-2018 2018 ~ 16 M 85 15 DDoS, DoS, Bot, SQL Injection, and more
CIC-DDoS2019 2019 50 M 0.11 99.89 Volumetric DDoS
UNSW-NB15 2015 2.5 M 90 10 Various, including 9 attack types
ADFA-WD 2013 ~ 50 K 71.4 28.6 Brute force, Windows local exploits,
Meterpreter, Hydra
ADFA-LD 2013 ~ 50 K 79.2 20.8 Brute force, Linux local exploits, Meter-
preter, Hydra
UNSW-BotIoT 2019 72 M 60 40 DDoS, DoS, OS, and Service Scan
DoHBrw2020 2020 1.4 M 67.6 32.4 Malicious DNS traffic
ISCX-URL-2016 2016 80 K 30.9 69.1 Benign, spam, phishing, malware URLs
DARPA1998 1998 ~ 4,9 M 97 3 Evaluation of intrusion detection systems
KDD Cup 99 1999 ~4 M 98 2 DOS, Probe, R2L, U2R
NSL-KDD 2009 148 K 70 30 DOS, Probe, R2L, U2R
CAIDA 2007 ~ 20 M Flows 78 22 Various typrs of DdoS attacks
Kyoto 2006 + 2006 ~ 90 M 20 80 DoS, Probing, U2R, R2L
comprises 421,417 normal and 399,417 malicious records. While comprehensive, its
short generation period may limit long-term trend analysis [113].
4 CIC-Malmem-2022 dataset: Released in 2022 by the Canadian Institute of Cyberse-
curity, this dataset includes 58,596 samples with 56 features, focusing on memory-
based obfuscated malware across Trojan, Spyware, and Ransomware. It is suitable for
contemporary threat detection but requires advanced models and extended training
times [117].
5 X-IIoTID dataset: Collected over a week, this dataset captures periodic effects and
includes 820,834 instances with 67 features. It covers diverse IIoT protocols and
attack types, ensuring interoperability and comprehensive labeling. However, it lacks
predefined training and testing splits and has limited coverage of cyber-physical
attacks on PLCs [118].
These modern datasets offer valuable resources for cybersecurity research, ena-
bling the development and validation of more effective detection models and security
frameworks. However, each comes with its own set of challenges that must be consid-
ered when integrating them into research and practical applications.
• Large datasets requirement: require huge training, accurately labeled data, which
is often hard to source in the cybersecurity area [52].
Salem et al. Journal of Big Data (2024) 11:105 Page 31 of 38
These constraints highlight the need for continuous research into more advanced,
adaptable, and efficient ML methods tailored to the dynamic field of cybersecurity.
Despite their high accuracy in detecting various attacks, these challenges highlight the
need for continued enhancement of DL models for cybersecurity.
RQ7: What are the limitations of metaheuristic algorithms used in cyber‑attacks detection?
Metaheuristic algorithms, while advantageous for cyber-attack detection due to their
flexibility and efficiency, face several limitations:
Salem et al. Journal of Big Data (2024) 11:105 Page 32 of 38
Conclusion
The exploration undertaken in this research provides a comprehensive review of AI
methodologies utilized in the area of cyber-attack detection. Our analysis underscores
the pivotal role of ML, DL, and metaheuristic algorithms in refining the responsiveness
and precision of cybersecurity systems. Key findings indicate that while AI technologies
significantly enhance detection rates, they are also challenged by high computational
demands and the necessity for vast, accurate new datasets.
In this comprehensive study, we have accurately analyzed various methods employed
for the detection of cyber-attacks. Our evaluation has been gathered from an initial
collection of 9084 papers, a methodical review based on title, abstract, and keywords,
followed by a stringent application of inclusion and exclusion criteria and generated
68 high-quality studies. Key details such as publication details, citation counts, fields
of study, methodologies, and datasets were extracted primarily from the introductory
sections of each paper, ensuring a concentrated source of research for further analysis.
These papers focus primarily on advanced techniques such as DL, ML, and metaheuris-
tic approaches. A detailed comparison of these techniques against traditional meth-
ods, which has been systematically documented in comparative tables within the study.
These tables serve as a valuable resource, showing the effectiveness of new and tradi-
tional approaches for various types and datasets of cyber-attacks.
A significant insight derived from this research is the key role of dimension reduc-
tion and feature selection in enhancing the efficacy of intrusion detection systems. We
explored how various techniques affect performance metrics, underscoring the necessity
of optimizing AI algorithm hyperparameters through heuristic methods to significantly
improve effectiveness.
Author contributions
Aya Hesham Salem wrote the manuscript and designed all figures and tables. Prof. Amr A. Abohanya reviewed and
supervised the manuscript content. Dr. Safaa Azzam supervised the manuscript content. Prof. Osama Emam supervised
the manuscript content.
Funding
Open access funding provided by The Science, Technology & Innovation Funding Authority (STDF) in cooperation with
The Egyptian Knowledge Bank (EKB).
Data availability
No datasets were generated or analysed during the current study.
Declarations
Competing interests
The authors declare no competing interests.
References
1. Parkar P, Bilimoria A. A survey on cyber security IDS using ML methods. Proceedings—5th International Confer-
ence on Intelligent Computing and Control Systems, ICICCS 2021, no. ICICCS, pp. 352–360, 2021, https://doi.org/
10.1109/ICICCS51141.2021.9432210.
2. Musa NS, Mirza NM, Rafique SH, Abdallah AM, Murugan T. Machine learning and deep learning techniques for
distributed denial of service anomaly detection in software defined networks—current research solutions. IEEE
Access. 2024;12(January):17982–8011. https://doi.org/10.1109/ACCESS.2024.3360868.
3. Eswaran M, et al. Survey of cyber security approaches for attack detection and prevention. IEEE Access.
2023;12(1):1–6. https://doi.org/10.17762/turcomat.v12i2.2406.
4. Alsamiri J, Alsubhi K. Internet of things cyber attacks detection using machine learning. Int J Adv Comput Sci Appl.
2019;10(12):627–34. https://doi.org/10.14569/ijacsa.2019.0101280.
5. Ahmad W, Rasool A, Javed AR, Baker T, Jalil Z. Cyber security in IoT-based cloud computing: a comprehensive
survey. Electronics (Switzerland). 2022;11(1):1–34. https://doi.org/10.3390/electronics11010016.
6. Morovat K, Panda B. A survey of artificial intelligence in cybersecurity. Proceedings—2020 International confer-
ence on computational science and computational intelligence, CSCI 2020, pp. 109–115, 2020, https://doi.org/10.
1109/CSCI51800.2020.00026.
7. Uma M, Padmavathi G. A survey on various cyber attacks and their classification. Int J Netw Secur. 2013;15(5):390–
6. https://doi.org/10.6633/IJNS.201309.
8. Rauf U, Mohsen F, Wei Z. A taxonomic classification of insider threats: existing techniques, future directions and
recommendations. J Cyber Secur Mobil. 2023;12(2):221–52. https://doi.org/10.13052/jcsm2245-1439.1225.
9. Thanh SN, Stege M, El-Habr PI, Bang J, Dragoni N. Survey on botnets: incentives, evolution, detection and current
trends. Future Internet. 2021. https://doi.org/10.3390/fi13080198.
10. Perwej Y, Qamar Abbas S, Pratap Dixit J, Akhtar N, Kumar Jaiswal A. A systematic literature review on the cyber
security. Int J Sci Res Manag. 2021;9(12):669–710. https://doi.org/10.18535/ijsrm/v9i12.ec04.
11. AbuBakar A, Zolkipli MF. Cyber security threats and predictions: a survey. Int J Adv Eng Manag (IJAEM).
2023;5(2):733. https://doi.org/10.35629/5252-0502733741.
12. Parizad A, Hatziadoniu CJ. Cyber-attack detection using principal component analysis and noisy clustering algo-
rithms: a collaborative machine learning-based framework. IEEE Trans Smart Grid. 2022;13(6):4848–61. https://doi.
org/10.1109/TSG.2022.3176311.
13. Philosophical logic and artificial intelligence. Springer Netherlands, 1989. https://doi.org/10.1007/
978-94-009-2448-2.
14. Pomerol J-C. Artificial intelligence and human decision making. Eur J Oper Res. 1997;99(1):3–25. https://doi.org/10.
1016/S0377-2217(96)00378-5.
15. Dokur NB. Artificial Intelligence (AI) applications in cyber security. https://www.researchgate.net/publication/
367253331.
16. Hua Li J. Cyber security meets artificial intelligence: a survey. Front Inf Technol Electron Eng. 2018;19(12):1462–74.
https://doi.org/10.1631/FITEE.1800573.
17. Welukar JN, Bajoria GP. Artificial intelligence in cyber security—a review. Int J Sci Res Sci Technol. 2021. https://doi.
org/10.32628/IJSRST218675.
18. Thomas T, Vijayaraghavan AP, Emmanuel S. Machine learning approaches in cyber security analytics. 2019. https://
doi.org/10.1007/978-981-15-1706-8.
19. Barik K, Misra S, Konar K, Fernandez-Sanz L, Koyuncu M. Cybersecurity deep: approaches, attacks dataset, and
comparative study. Appl Artif Intell. 2022. https://doi.org/10.1080/08839514.2022.2055399.
20. Nordin NS, et al. A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detec-
tion. Indonesian J Electr Eng Comput Sci. 2021;23(2):1146–58. https://doi.org/10.11591/ijeecs.v23.i2.pp1146-1158.
21. Agrawal P, Abutarboush HF, Ganesh T, Mohamed AW. Metaheuristic algorithms on feature selection: a survey of
one decade of research (2009–2019). IEEE Access. 2021;9:26766–91. https://doi.org/10.1109/ACCESS.2021.30564
07.
22. Kuntla GS, Tian X, Li Z. Security and privacy in machine learning: a survey. Issues Inf Syst. 2021;22(3):224–40.
https://doi.org/10.48009/3_iis_2021_242-258.
23. Peng J, Jury EC, Dönnes P, Ciurtin C. Machine learning techniques for personalised medicine approaches in
immune-mediated chronic inflammatory diseases: applications and challenges. Front Pharmacol. 2021;12(Sep-
tember):1–18. https://doi.org/10.3389/fphar.2021.720694.
24. Alduailij M, Khan QW, Tahir M, Sardaraz M, Alduailij M, Malik F. Machine-learning-based DDoS attack detection
using mutual information and random forest feature importance method. Symmetry (Basel). 2022;14(6):1–15.
https://doi.org/10.3390/sym14061095.
25. Gawand MKSP. A comparative study of cyber attack detection & prediction using machine learning algorithms.
Researchgate. 2013. https://doi.org/10.21203/rs.3.rs-3238552/v1
26. Sarker IH. CyberLearning: effectiveness analysis of machine learning security modeling to detect cyber-anomalies
and multi-attacks. Internet Things. 2021;14:100393. https://doi.org/10.1016/j.iot.2021.100393.
27. Hasan M, Islam MM, Zarif MII, Hashem MMA. Attack and anomaly detection in IoT sensors in IoT sites using
machine learning approaches. Internet Things. 2019;7:100059. https://doi.org/10.1016/j.iot.2019.100059.
28. Sarker IH, Kayes ASM, Badsha S, Alqahtani H, Watters P, Ng A. Cybersecurity data science: an overview from
machine learning perspective. J Big Data. 2020. https://doi.org/10.1186/s40537-020-00318-5.
29. Rodriguez E, Otero B, Gutierrez N, Canal R. A survey of deep learning techniques for cybersecurity in mobile
networks. IEEE Commun Surv Tutor. 2021;23(3):1920–55. https://doi.org/10.1109/COMST.2021.3086296.
30. Pourafshin F. Big data mining in internet of things using fusion of deep features. Int J Sci Res Eng Trends.
2021;7(2):1089–93.
31. Gu H, Wang Y, Hong S, Gui G. Blind channel identification aided generalized automatic modulation recognition
based on deep learning. IEEE Access. 2019;7:110722–9. https://doi.org/10.1109/ACCESS.2019.2934354.
Salem et al. Journal of Big Data (2024) 11:105 Page 36 of 38
32. Hassan IH, Mohammed A, Masama MA. Metaheuristic algorithms in network intrusion detection. In: Comprehen-
sive metaheuristics. Elsevier; 2023. p. 95–129. https://doi.org/10.1016/B978-0-323-91781-0.00006-5.
33. Rajwar K, Deep K, Das S. An exhaustive review of the metaheuristic algorithms for search and optimization: tax-
onomy, applications, and open challenges. Artif Intell Rev. 2023. https://doi.org/10.1007/s10462-023-10470-y.
34. Role of AI in cyber security through Anomaly detection and Predictive analysis. J Inf Educ Res. 2023;3:2. https://
doi.org/10.52783/jier.v3i2.314.
35. Ozkan-Okay M, et al. A comprehensive survey: evaluating the efficiency of artificial intelligence and machine
learning techniques on cyber security solutions. IEEE Access. 2024;12:12229–56. https://doi.org/10.1109/ACCESS.
2024.3355547.
36. Sangwan RS, Badr Y, Srinivasan SM. Cybersecurity for AI systems: a survey. J Cybersecur Privacy. 2023;3(2):166–90.
https://doi.org/10.3390/jcp3020010.
37. Mohamed N. Current trends in AI and ML for cybersecurity: a state-of-the-art survey. Cogent Eng. 2023. https://
doi.org/10.1080/23311916.2023.2272358.
38. Kaur R, Gabrijelčič D, Klobučar T. Artificial intelligence for cybersecurity: literature review and future research direc-
tions. Inf Fusion. 2023. https://doi.org/10.1016/j.inffus.2023.101804.
39. Bin Hulayyil S, Li S, Xu L. Machine-learning-based vulnerability detection and classification in internet of things
device security. Electronics (Switzerland). 2023. https://doi.org/10.3390/electronics12183927.
40. Asiri MM, et al. Hybrid metaheuristics feature selection with stacked deep learning-enabled cyber-attack detec-
tion model. Comput Syst Sci Eng. 2023;45(2):1679–94. https://doi.org/10.32604/csse.2023.031063.
41. Caviglione L, et al. Tight arms race: overview of current malware threats and trends in their detection. IEEE Access.
2021;9:5371–96. https://doi.org/10.1109/ACCESS.2020.3048319.
42. An JH, Wang Z, Joe I. A CNN-based automatic vulnerability detection. EURASIP J Wirel Commun Netw. 2023.
https://doi.org/10.1186/s13638-023-02255-2.
43. Lucky G, Jjunju F, Marshall A. A lightweight decision-tree algorithm for detecting DDoS flooding attacks. In Pro-
ceedings—companion of the 2020 IEEE 20th international conference on software quality, reliability, and security,
QRS-C 2020, Institute of Electrical and Electronics Engineers Inc., Dec. 2020, pp. 382–389. https://doi.org/10.1109/
QRS-C51114.2020.00072.
44. . Mynuddin M, Hossain MI, Uddin Khan S, Islam MA, Mohammed Abdul Ahad D, Tanvir MS. Cyber security system
using fuzzy logic. In International Conference on Electrical, Computer, Communications and Mechatronics Engi-
neering, ICECCME 2023, Institute of Electrical and Electronics Engineers Inc., 2023. https://doi.org/10.1109/ICECC
ME57830.2023.10252778.
45. ElDahshan KA, AlHabshy AAA, Hameed BI. Meta-heuristic optimization algorithm-based hierarchical intrusion
detection system. Computers. 2022. https://doi.org/10.3390/computers11120170.
46. Soliman S, Oudah W, Aljuhani A. Deep learning-based intrusion detection approach for securing industrial Inter-
net of Things. Alex Eng J. 2023;81:371–83. https://doi.org/10.1016/j.aej.2023.09.023.
47. Psychogyios K, Papadakis A, Bourou S, Nikolaou N, Maniatis A, Zahariadis T. Deep learning for intrusion detection
systems (IDSs) in time series data. Future Internet. 2024;16(3):73. https://doi.org/10.3390/fi16030073.
48. SaiSindhuTheja R, Shyam GK. An efficient metaheuristic algorithm based feature selection and recurrent neural
network for DoS attack detection in cloud computing environment. Appl Soft Comput. 2021;100: 106997. https://
doi.org/10.1016/j.asoc.2020.106997.
49. Sanjeetha R, Kanavalli A, Gupta A, Pattanaik A, Agarwal S. Real-time DDoS detection and mitigation in software
defined networks using machine learning techniques. Int J Comput. 2022;21(3):353–9. https://doi.org/10.47839/
ijc.21.3.2691.
50. Gaur V, Kumar R. Analysis of machine learning classifiers for early detection of DDoS attacks on IoT devices. Arab J
Sci Eng. 2022;47(2):1353–74. https://doi.org/10.1007/s13369-021-05947-3.
51. Jyothi KK, et al. A novel optimized neural network model for cyber attack detection using enhanced whale opti-
mization algorithm. Sci Rep. 2024. https://doi.org/10.1038/s41598-024-55098-2.
52. Atawneh S, Aljehani H. Phishing email detection model using deep learning. Electronics (Switzerland). 2023.
https://doi.org/10.3390/electronics12204261.
53. Asiri S, Xiao Y, Alzahrani S, Li T. PhishingRTDS: a real-time detection system for phishing attacks using a Deep
Learning model. Comput Secur. 2024;141: 103843. https://doi.org/10.1016/j.cose.2024.103843.
54. AbdullahAlohali M, et al. Metaheuristics with deep learning driven phishing detection for sustainable and secure
environment. Sustain Energy Technol Assess. 2023. https://doi.org/10.1016/j.seta.2023.103114.
55. Zavrak S, Yilmaz S. Email spam detection using hierarchical attention hybrid deep learning method. Expert Syst
Appl. 2023. https://doi.org/10.1016/j.eswa.2023.120977.
56. Butt UA, Amin R, Aldabbas H, Mohan S, Alouffi B, Ahmadian A. Cloud-based email phishing attack using machine
and deep learning algorithm. Complex Intell Syst. 2023;9(3):3043–70. https://doi.org/10.1007/s40747-022-00760-3.
57. Kitchenham S, Charters B. Guidelines for performing systematic literature reviews in software engineering. Techni-
cal report, Ver. 2.3 EBSE, vol. 1, no. January 2007, pp. 1–54, 2007. https://citeseerx.ist.psu.edu/viewdoc/download?
doi=10.1.1.117.471&rep=rep1&type=pdf.
58. Shaukat K, Luo S, Chen S, Liu D. Cyber threat detection using machine learning techniques: a performance evalu-
ation perspective. 1st Annual international conference on cyber warfare and security, ICCWS 2020—Proceedings,
2020, https://doi.org/10.1109/ICCWS48432.2020.9292388.
59. Prasad A, Chandra S. BotDefender: a collaborative defense framework against botnet attacks using network traffic
analysis and machine learning. Arab J Sci Eng. 2024;49(3):3313–29. https://doi.org/10.1007/s13369-023-08016-z.
60. Wei Z, Rauf U, Mohsen F. E-Watcher: insider threat monitoring and detection for enhanced security. Ann Telecom-
mun. 2024. https://doi.org/10.1007/s12243-024-01023-7.
61. Mohsen F, Rauf U, Lavric V, Kokushkin A, Wei Z, Martinez A. On identification of intrusive applications: a step
toward heuristics-based adaptive security policy. IEEE Access. 2024;12:37586–99. https://doi.org/10.1109/ACCESS.
2024.3373202.
Salem et al. Journal of Big Data (2024) 11:105 Page 37 of 38
62. Mihoub A, Ben Fredj O, Cheikhrouhou O, Derhab A, Krichen M. Denial of service attack detection and mitiga-
tion for internet of things using looking-back-enabled machine learning techniques. Comput Electr Eng.
2022;98(2021): 107716. https://doi.org/10.1016/j.compeleceng.2022.107716.
63. Alrowais F, Althahabi S, Alotaibi SS, Mohamed A, Hamza MA, Marzouk R. Automated machine learning enabled
cybersecurity threat detection in internet of things environment. Comput Syst Sci Eng. 2023;45(1):687–700.
https://doi.org/10.32604/csse.2023.030188.
64. Liu Z, Wang Y, Feng F, Liu Y, Li Z, Shan Y. A DDoS detection method based on feature engineering and machine
learning in software-defined networks. Sensors. 2023. https://doi.org/10.3390/s23136176.
65. Omer N, Samak AH, Taloba AI, Abd El-Aziz RM. A novel optimized probabilistic neural network approach for intru-
sion detection and categorization. Alex Eng J. 2023;72:351–61. https://doi.org/10.1016/j.aej.2023.03.093.
66. Aljehane NO, Mengash HA, Hassine SBH, Alotaibi FA, Salama AS, Abdelbagi S. Optimizing intrusion detection using
intelligent feature selection with machine learning model. Alex Eng J. 2024;91(January):39–49. https://doi.org/10.
1016/j.aej.2024.01.073.
67. Talpur F, Korejo IA, Chandio AA, Ghulam A. ML-based detection of DDoS attacks using evolutionary algorithms
optimization. 2024;24(5):1672. https://doi.org/10.3390/s24051672
68. Kumar A, Dutta S, Pranav P. Supervised learning for attack detection in cloud. Int J Exp Res Rev. 2023;31:74–84.
https://doi.org/10.52756/10.52756/ijerr.2023.v31spl.008.
69. More S, Idrissi M, Mahmoud H, Asyhari AT. Enhanced intrusion detection systems performance with UNSW-NB15
data analysis. Algorithms. 2024;17(2):64. https://doi.org/10.3390/a17020064.
70. Chohan MN, Haider U, Ayub MY, Shoukat H, Bhatia TK, Ul Hassan MF. Detection of cyber attacks using machine
learning based intrusion detection system for IoT based smart cities. EAI Endorsed Trans Smart Cities. 2023;7(1):1–
7. https://doi.org/10.4108/eetsc.3222.
71. Singh A, Shibargatti A, Jena MA, Manvi S. Machine learning based detection of phishing websites in chrome. 1st
Int Conf Emma-2021. 2024;2742: 020072. https://doi.org/10.1063/5.0184539.
72. Rexha B, Thaqi R, Mazrekaj A, Vishi K. Guarding the Cloud: an effective detection of cloud-based cyber attacks
using machine learning algorithm. Int J Online Biomed Eng. 2023. https://doi.org/10.3991/ijoe.v19i18.45483.
73. Özalp AN, Albayrak Z. Detecting cyber attacks with high-frequency features using machine learning algorithms.
Acta Polytech Hungarica. 2022;19(7):213–33. https://doi.org/10.12700/APH.19.7.2022.7.12.
74. Azeem M, Khan D, Iftikhar S, Bawazeer S, Alzahrani M. Analyzing and comparing the effectiveness of malware
detection: a study of machine learning approaches. Heliyon. 2024;10(1): e23574. https://doi.org/10.1016/j.heliyon.
2023.e23574.
75. Hammad M, Hewahi N, Elmedany W. Enhancing network intrusion recovery in SDN with machine learning: an
innovative approach. Arab J Basic Appl Sci. 2023;30(1):561–72. https://doi.org/10.1080/25765299.2023.2261219.
76. Ribeiro MA, Pereira Fonseca MS, de Santi J. Detecting and mitigating DDoS attacks with moving target defense
approach based on automated flow classification in SDN networks. Comput Secur. 2023;134(August): 103462.
https://doi.org/10.1016/j.cose.2023.103462.
77. Yuan X, Han S, Huang W, Ye H, Kong X, Zhang F. A simple framework to enhance the adversarial robustness of
deep learning-based intrusion detection system. Comput Secur. 2024. https://doi.org/10.1016/j.cose.2023.103644.
78. Devendiran R, Turukmane AV. Dugat-LSTM: deep learning based network intrusion detection system using cha-
otic optimization strategy. Expert Syst Appl. 2024. https://doi.org/10.1016/j.eswa.2023.123027.
79. Yaras S, Dener M. IoT-Based Intrusion Detection System Using New Hybrid Deep Learning Algorithm. Electronics.
2024;13(6):1053. https://doi.org/10.3390/electronics.
80. Hnamte V, Hussain J. Dependable intrusion detection system using deep convolutional neural network: a novel
framework and performance evaluation approach. Telemat Inform Rep. 2023. https://doi.org/10.1016/j.teler.2023.
100077.
81. Makkar A, Kumar N. An efficient deep learning-based scheme for web spam detection in IoT environment. Futur
Gener Comput Syst. 2020;108:467–87. https://doi.org/10.1016/j.future.2020.03.004.
82. Aslan O, Yilmaz AA. A new malware classification framework based on deep learning algorithms. IEEE Access.
2021;9:87936–51. https://doi.org/10.1109/ACCESS.2021.3089586.
83. Akgun D, Hizal S, Cavusoglu U. A new DDoS attacks intrusion detection model based on deep learning for cyber-
security. Comput Secur. 2022;118: 102748. https://doi.org/10.1016/j.cose.2022.102748.
84. Aslan Ö. Separating malicious from benign software using deep learning algorithm. Electronics (Switzerland).
2023. https://doi.org/10.3390/electronics12081861.
85. Alzahrani IR, Allafi R. Integrating Ebola optimization search algorithm for enhanced deep learning-based ransom-
ware detection in Internet of Things security. AIMS Math. 2024;9(3):6784–802. https://doi.org/10.3934/math.20243
31.
86. Balajee RM, Jayanthi Kannan MK. Intrusion detection on AWS cloud through hybrid deep learning algorithm.
Electronics. 2023;12(6):1423. https://doi.org/10.3390/electronics12061423.
87. Farhan BI, Jasim AD. Performance analysis of intrusion detection for deep learning model based on CSE-CIC-
IDS2018 dataset. Indonesian J Electric Eng Comput Sci. 2022;26(2):1165–72. https://doi.org/10.11591/ijeecs.v26.i2.
pp1165-1172.
88. Abbas S, et al. Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT
networks. PeerJ Comput Sci. 2024;10: e1793. https://doi.org/10.7717/peerj-cs.1793.
89. Alamyar AM, License RF. Detecting malicious attacks using cyber-security models using deep learning approach.
pp. 0–26, 2023.
90. Salam A, Ullah F, Amin F, Mohammad A. Deep learning techniques for web-based attack detection in, MDPI, pp.
1–18, 2023.
91. Jullian O, Otero B, Rodriguez E, Gutierrez N, Antona H, Canal R. Deep-learning based detection for cyber-attacks in
IoT networks: a distributed attack detection framework. J Netw Syst Manage. 2023;31(2):1–24. https://doi.org/10.
1007/s10922-023-09722-7.
Salem et al. Journal of Big Data (2024) 11:105 Page 38 of 38
92. Ghazal SF, Mjlae SA. Cybersecurity in deep learning techniques: detecting network attacks. Int J Adv Comput Sci
Appl. 2022;13(11):221–30. https://doi.org/10.14569/IJACSA.2022.0131125.
93. Otoum Y, Liu D, Nayak A. DL-IDS: a deep learning-based intrusion detection framework for securing IoT. Trans
Emerg Telecommun Technol. 2022;33(3):1–14. https://doi.org/10.1002/ett.3803.
94. Chuang HM, Ye LJ. Applying transfer learning approaches for intrusion detection in software-defined networking.
Sustainability (Switzerland). 2023;15(12):1–24. https://doi.org/10.3390/su15129395.
95. Chen L, Wang Z, Huo R, Huang T. An adversarial DBN-LSTM method for detecting and defending against DDoS
attacks in SDN environments. Algorithms. 2023. https://doi.org/10.3390/a16040197.
96. Dey AK, Gupta GP, Sahu SP. Hybrid meta-heuristic based feature selection mechanism for cyber-attack detection
in IoT-enabled networks. Procedia Comput Sci. 2022;218:318–27. https://doi.org/10.1016/j.procs.2023.01.014.
97. Dey AK, Gupta GP, Sahu SP. A metaheuristic-based ensemble feature selection framework for cyber threat detec-
tion in IoT-enabled networks. Decis Anal J. 2023;7(January): 100206. https://doi.org/10.1016/j.dajour.2023.100206.
98. Mange P, Lule A, Savant R. Advanced spam email detection using machine learning and bio-inspired meta-heuris-
tics algorithms. Int J Intell Syst Appl Eng IJISAE. 2023;2024(4s):122–35.
99. Naeem H, Ullah F, Srivastava G. Classification of intrusion cyber-attacks in smart power grids using deep ensemble
learning with metaheuristic-based optimization. Expert Syst. 2024. https://doi.org/10.1111/exsy.13556.
100. Albakri A, Alhayan F, Alturki N, Ahamed S, Shamsudheen S. Metaheuristics with deep learning model for cyber-
security and android malware detection and classification. Appl Sci (Switzerland). 2023. https://doi.org/10.3390/
app13042172.
101. Diaba SY, Shafie-Khah M, Elmusrati M. Cyber security in power systems using meta-heuristic and deep learning
algorithms. IEEE Access. 2023;11(February):18660–72. https://doi.org/10.1109/ACCESS.2023.3247193.
102. Alshammari MA, Abd El-Aziz AA, Hamdi H. Detecting traffic diversion using metaheuristic algorithm in SDN. Int J
Intell Syst Appl Eng. 2024;12(9):369–79.
103. Alkanhel R, et al. Network intrusion detection based on feature selection and hybrid metaheuristic optimization.
Comput Mater Continua. 2023;74(2):2677–93. https://doi.org/10.32604/cmc.2023.033273.
104. Mjahed O, El Hadaj S, El Guarmah EM, Mjahed S. Improved supervised and unsupervised metaheuristic-based
approaches to detect intrusion in various datasets. CMES Comput Model Eng Sci. 2023;137(1):265–98. https://doi.
org/10.32604/cmes.2023.027581.
105. Thomas M, Meshram BB. DoS attack detection using Aquila deer hunting optimization enabled deep belief net-
work. Int J Web Inf Syst. 2024. https://doi.org/10.1108/IJWIS-06-2023-0089.
106. Mohsenabad HN, Tut MA. Optimizing cybersecurity attack detection in computer networks: a comparative analy-
sis of bio-inspired optimization algorithms using the CSE-CIC-IDS 2018 dataset. Appl Sci. 2024;14(3):1044. https://
doi.org/10.3390/app14031044.
107. Nazir A, Khan RA. A novel combinatorial optimization based feature selection method for network intrusion detec-
tion. Comput Secur. 2021;102: 102164. https://doi.org/10.1016/j.cose.2020.102164.
108. Ghanbarzadeh R, Hosseinalipour A, Ghaffari A. A novel network intrusion detection method based on metaheuris-
tic optimisation algorithms. J Ambient Intell Human Comput. 2023;14(6):7575–92. https://doi.org/10.1007/
s12652-023-04571-3.
109. Zeinalpour A, McElroy CP. Comparing metaheuristic search techniques in addressing the effectiveness of
clustering-based DDoS attack detection methods. Electronics (Switzerland). 2024. https://doi.org/10.3390/elect
ronics13050899.
110. Goyal N, Trivedi MC. Metaheuristic algorithms for optimization and feature selection in cloud data classification
using convolutional neural network. J Inf Technol Manag. 2023;15(3):99–112. https://doi.org/10.22059/JITM.2023.
93627.
111. Prasad A, Chandra S. Machine learning to combat cyberattack: a survey of datasets and challenges. J Model Simul.
2023;20(4):577–88. https://doi.org/10.1177/15485129221094881.
112. Yang Z, et al. A systematic literature review of methods and datasets for anomaly-based network intrusion detec-
tion. Comput Secur. 2022. https://doi.org/10.1016/j.cose.2022.102675.
113. Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H. Edge-IIoTset: a new comprehensive realistic cyber security
dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access. 2022;10:40281–306. https://
doi.org/10.1109/ACCESS.2022.3165809.
114. Khraisat A, Gondal I, Vamplew P, Kamruzzaman J. Survey of intrusion detection systems: techniques, datasets and
challenges. Cybersecurity. 2019. https://doi.org/10.1186/s42400-019-0038-7.
115. Prasad A, Chandra S. PhiUSIIL: a diverse security profile empowered phishing URL detection framework based on
similarity index and incremental learning. Comput Secur. 2024. https://doi.org/10.1016/j.cose.2023.103545.
116. Kim Y, Hakak S, Ghorbani A. DDoS Attack Dataset (CICEV2023) against EV Authentication in Charging Infrastruc-
ture. In 2023 20th Annual International Conference on Privacy, Security and Trust, PST 2023, Institute of Electrical
and Electronics Engineers Inc., 2023. https://doi.org/10.1109/PST58708.2023.10320202.
117. Shafin SS, Karmakar G, Mareels I. Obfuscated memory malware detection in resource-constrained IoT devices for
smart city applications. Sensors. 2023. https://doi.org/10.3390/s23115348.
118. Al-Hawawreh M, Sitnikova E, Aboutorab N. X-IIoTID: a connectivity-agnostic and device-agnostic intrusion data set
for industrial internet of things. IEEE Internet Things J. 2022;9(5):3962–77. https://doi.org/10.1109/JIOT.2021.31020
56.
119. Thota S, Menaka D. Botnet detection in the internet-of-things networks using convolutional neural network with
pelican optimization algorithm. Automatika 2024;65(1):250–60. https://doi.org/10.1080/00051144.2023.2288486
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.