DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation

M Aamir, SMA Zaidi - International Journal of Information Security, 2019 - Springer
… human behavior with computational intelligence, and it … machine learning steps in a
comprehensive manner to detect DDoS attacks, (2) designing the framework to include optimization

Performance evaluation of Botnet DDoS attack detection using machine learning

TA Tuan, HV Long, LH Son, R Kumar… - … Intelligence, 2020 - Springer
… solution proposed was not optimal and there were scalability … machine learning methods
that are highly scalable. In order to conduct the performance evaluation, we outline a framework

Multi-stage optimized machine learning framework for network intrusion detection

MN Injadat, A Moubayed, AB Nassif… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… However, this work merged all attacks into one label as the goal is to detect an attack … and
the UNSW-NB 2015 dataset) for performance evaluation, this work first studied the impact of …

Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors

D Han, Z Wang, Y Zhong, W Chen… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
… novel practical adversarial attack by formulating it as a bi-level optimization problem with a
… combinatorial optimization task (NP-complete). Hence, we resort to swarm intelligence algo…

Performance analysis of machine learning algorithms in intrusion detection system: A review

T Saranya, S Sridevi, C Deisy, TD Chung… - Procedia Computer …, 2020 - Elsevier
… of various attacks using intelligent ML algorithms. ML can be explained as improving the
learning … In order to produce the optimal predictive model, this ML technique combines several …

Efficient cyber attack detection on the internet of medical things-smart environment based on deep recurrent neural network and machine learning algorithms

YK Saheed, MO Arowolo - IEEE Access, 2021 - ieeexplore.ieee.org
… features of the attacks in the dataset. We used PSO which is a metaheuristic optimization
algorithm for … IT Tosin, and AN Babatunde, ‘‘Student’s performance analysis using decision tree …

A new hybrid approach for intrusion detection using machine learning methods

Ü Çavuşoğlu - Applied Intelligence, 2019 - Springer
machine learning algorithms according to different attack … Then, the subset which may
have optimum performance from … , the evaluation criteria used for performance evaluation are …

Attack classification of an intrusion detection system using deep learning and hyperparameter optimization

YN Kunang, S Nurmaini, D Stiawan… - Journal of Information …, 2021 - Elsevier
… The learning performance evaluation can be shown in the … more effectively combine the
network anomaly-based IDS with an intelligent host-based IDS that works based on the log host […

[HTML][HTML] Injection attack detection using machine learning for smart IoT applications

T Gaber, A El-Ghamry, AE Hassanien - Physical Communication, 2022 - Elsevier
optimized using the Fruitfly algorithm. Using data from the NSL-KDD and UNSW-NB15
datasets, the evaluation … The performance evaluation demonstrated that the accuracy increased …

An intelligent secured framework for cyberattack detection in electric vehicles' CAN bus using machine learning

O Avatefipour, AS Al-Sumaiti, AM El-Sherbeeny… - Ieee …, 2019 - ieeexplore.ieee.org
… an attack if it missed the first packets of the attack broadcast. … } is an essential task for
performance evaluation of an anomaly … as an optimization algorithm to find the optimal value of the …