Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges

G Kocher, G Kumar - Soft Computing, 2021 - Springer
comparison of ML methods such as ANN, SVM, fuzzy approach, swarm intelligence and
evolutionary computation methods in intrusion detection, … a GA-based exhaustive search method …

Comparison deep learning method to traditional methods using for network intrusion detection

B Dong, X Wang - 2016 8th IEEE international conference on …, 2016 - ieeexplore.ieee.org
machine learning. Of importance, the science has become an integral part of network security
since it ensures exhaustive … to form the hybrid malicious detection system. The approach …

[PDF][PDF] Intrusion detection using machine learning: A comparison study

SK Biswas - International Journal of pure and applied mathematics, 2018 - academia.edu
… It is observed that some comparative studies have been done in this field but exhaustive
study is still not done. Therefore this paper intends to design an Intrusion Detection System (IDS…

A detailed investigation and analysis of using machine learning techniques for intrusion detection

P Mishra, V Varadharajan… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
… After the exhaustive survey of literature and critical analysis using the comparison of results
… and in the selection of features in Intrusion Detection Systems. However, they lack in few …

Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations

MA Umer, KN Junejo, MT Jilani, AP Mathur - International Journal of …, 2022 - Elsevier
… Our focus is on a comparison of the proposed approaches … Intrusion detection systems (IDS)
aim at detecting intrusions … Further, it is often difficult to produce an exhaustive dictionary of …

A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions

J Asharf, N Moustafa, H Khurshid, E Debie, W Haider… - Electronics, 2020 - mdpi.com
… Table 1 summarizes a comparison of our survey with the other surveys conducted on IDSs
in IoT networks. As described in the table, this survey covers all important aspects on the …

Anomaly-based intrusion detection systems in iot using deep learning: A systematic literature review

MA Alsoufi, S Razak, MM Siraj, I Nafea, FA Ghaleb… - Applied sciences, 2021 - mdpi.com
… -based intrusion detection and inclusive of those researchers that have conducted overview
literature on different techniques, taxonomies, and comparisons. … system can be exhaustive, …

On the performance of machine learning models for anomaly-based intelligent intrusion detection systems for the internet of things

G Abdelmoumin, DB Rawat… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
… we present a comparative analysis of AML-IDS models for IoT … process that may require an
exhaustive search to obtain the … , “A deep learning methods for intrusion detection systems

Adversarial machine learning in network intrusion detection systems

E Alhajjar, P Maxwell, N Bastian - Expert Systems with Applications, 2021 - Elsevier
… evolutionary computation and deep learning methods to the … The authors introduce an
exhaustive list of attacks/defenses … this work do not allow for comparison between them in terms of …

Comparative analysis of deep learning image detection algorithms

S Srivastava, AV Divekar, C Anilkumar, I Naik… - Journal of Big …, 2021 - Springer
model, there is separate training for the deep convolution network for feature isolation and
the support vector machines … is a combined, deep learning-based object detection system that …