A Survey of Data Stream-Based Intrusion Detection Systems

dc.citation.volume13
dc.contributor.authorMiani RS
dc.contributor.authorBernardo GDG
dc.contributor.authorCassales GW
dc.contributor.authorSenger H
dc.contributor.authorFaria ER
dc.date.accessioned2026-02-23T22:44:39Z
dc.date.issued2025-04-15
dc.description.abstractDetecting malicious activities in network environments poses a challenge that attracts significant attention due to its complexity and importance. Advances in the field have led to the development of several algorithms that approach the problem under the view of a data stream machine learning task. This task involves a set of steps: data collection or choice of public datasets, data pre-processing, data reduction, development or application of data mining techniques, and evaluation methodology. However, these steps must address the inherent issues of dynamic environments such as data streams and intrusion detection systems. These issues include, but are not limited to, the continuous influx of data, changes in both normal and attack class distributions, the emergence of new attack types, and the scarcity of labeled data examples to update the decision models. This survey provides an overview of intrusion detection systems (IDS) using data stream machine learning techniques, characterizing the literature approaches according to the classic steps of the data mining task. In addition, we discuss recommendations for practical IDS development and highlight datasets and tools that can aid in detecting malicious behavior. Finally, we outline potential avenues for future research and open questions in the field.
dc.description.confidentialfalse
dc.description.notessortkey: 2a
dc.format.pagination72953-72983
dc.identifier.citationMiani RS, Bernardo GDG, Cassales GW, Senger H, Faria ER. (2025). A Survey of Data Stream-Based Intrusion Detection Systems. IEEE Access. 13. (pp. 72953-72983).
dc.identifier.doi10.1109/ACCESS.2025.3561105
dc.identifier.eissn2169-3536
dc.identifier.elements-typejournal-article
dc.identifier.urihttps://mro.massey.ac.nz/handle/10179/74201
dc.languageEnglish
dc.publisherIEEE
dc.publisher.urihttps://ieeexplore.ieee.org/document/10965698
dc.relation.isPartOfIEEE Access
dc.rights(c) The author/sen
dc.rights.licenseCC BY 4.0en
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/en
dc.subjectComputer networks
dc.subjectcybersecurity
dc.subjectdata-stream
dc.subjectintrusion detection systems
dc.subjectmachine-learning
dc.titleA Survey of Data Stream-Based Intrusion Detection Systems
dc.typeJournal article
pubs.elements-id609780
pubs.organisational-groupOther

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
609780 PDF.pdf
Size:
2.85 MB
Format:
Adobe Portable Document Format
Description:
Published version.pdf

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
9.22 KB
Format:
Plain Text
Description:

Collections