A novel method for intrusion detection in computer networks by identifying multivariate outliers and ReliefF feature selection

B Uzun, S Ballı - Neural Computing and Applications, 2022 - Springer
The identification of unusual data in computer networks is a critical task for intrusion
detection systems. In this study, a novel approach has been proposed for improving …

Anomaly-based intrusion detection system in RPL by applying stochastic and evolutionary game models over IoT environment

DB Gothawal, SV Nagaraj - Wireless Personal Communications, 2020 - Springer
The rapid development of Information and Communication Technology and the growing
number of devices connected to the Internet make the Internet of Things (IoT) as a promising …

Classification model for accuracy and intrusion detection using machine learning approach

A Agarwal, P Sharma, M Alshehri, AA Mohamed… - PeerJ Computer …, 2021 - peerj.com
In today's cyber world, the demand for the internet is increasing day by day, increasing the
concern of network security. The aim of an Intrusion Detection System (IDS) is to provide …

[HTML][HTML] A machine learning-based intrusion detection for detecting internet of things network attacks

YK Saheed, AI Abiodun, S Misra, MK Holone… - Alexandria Engineering …, 2022 - Elsevier
Abstract The Internet of Things (IoT) refers to the collection of all those devices that could
connect to the Internet to collect and share data. The introduction of varied devices …

[PDF][PDF] A malicious URLs detection system using optimization and machine learning classifiers

OV Lee¹, A Heryanto, MF Ab Razak… - Indonesian Journal of …, 2020 - academia.edu
The openness of the World Wide Web (Web) has become more exposed to cyber-attacks.
An attacker performs the cyber-attacks on Web using malware Uniform Resource Locators …

A supervised machine learning-based solution for efficient network intrusion detection using ensemble learning based on hyperparameter optimization

A Sarkar, HS Sharma, MM Singh - International Journal of Information …, 2023 - Springer
An efficient machine learning (ML) ensemble technique for categorizing Intrusion Detection
(ID) is proposed in this study. The tuning of the ML model's parameters is a critical topic …

A Lightweight Energy-Efficient Algorithm for mitigation and isolation of Internal Rank Attackers in RPL based Internet of Things

PS Nandhini, S Kuppuswami, S Malliga, R DeviPriya - Computer Networks, 2022 - Elsevier
Abstract Internet of Things (IoT) has become a pivotal technology for connecting various
physical things or devices to the internet. Despite the potential advantages, security in IoT …

TN-IDS for network layer attacks in RPL based IoT systems

KN Ambili, J Jose - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Routing protocol for Low power and lossy network (RPL) is a standardized optimal protocol
for routing in Internet of Things (IoT). The constrained wireless sensor network in IoT is …

A hybrid approach for intrusion detection based on machine learning

R Singh, M Kalra, S Solanki - International Journal of …, 2020 - inderscienceonline.com
With the evolution of internet, network security has emerged as one of the key areas of
research. Network security is to safeguard the privacy, availability and integrity of the system …

An effective technique for intrusion detection using neuro-fuzzy and radial svm classifier

AM Chandrasekhar, K Raghuveer - Computer Networks & …, 2013 - Springer
Intrusion detection is not yet a perfect technology. This has given data mining the opportunity
to make several important contributions to the field of intrusion detection. In this paper, we …