Table 2.
Review article | Ferrag et al. (2020) | Aleesa et al. (2020) | Ahmad et al. (2021) | Gamage and Samarabandu (2020) | Ahmad and Alsmadi (2021) | This article |
---|---|---|---|---|---|---|
Focused security domain | Cyber security intrusion detection | IDS | IDS | NID | IoT security | DDoS |
ML/DL | DL | DL | ML/DL | DL | ML/DL | DL |
Systematic study | ||||||
Taxonomy | ||||||
Preprocessing strategy | ||||||
Types of attack used in existing literature from the datasets | ||||||
Strengths | ||||||
Weaknesses | ||||||
Research gaps |