Overview on intrusion detection systems design exploiting machine learning for networking cybersecurity

P Dini, A Elhanashi, A Begni, S Saponara, Q Zheng… - Applied Sciences, 2023 - mdpi.com
The Intrusion Detection System (IDS) is an effective tool utilized in cybersecurity systems to
detect and identify intrusion attacks. With the increasing volume of data generation, the …

[HTML][HTML] A hybrid CNN+ LSTM-based intrusion detection system for industrial IoT networks

HC Altunay, Z Albayrak - … Science and Technology, an International Journal, 2023 - Elsevier
Abstract The Internet of Things (IoT) ecosystem has proliferated based on the use of the
internet and cloud-based technologies in the industrial area. IoT technology used in the …

Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection …

RA Disha, S Waheed - Cybersecurity, 2022 - Springer
To protect the network, resources, and sensitive data, the intrusion detection system (IDS)
has become a fundamental component of organizations that prevents cybercriminal …

Network intrusion detection system using deep learning

L Ashiku, C Dagli - Procedia Computer Science, 2021 - Elsevier
The widespread use of interconnectivity and interoperability of computing systems have
become an indispensable necessity to enhance our daily activities. Simultaneously, it opens …

DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)

S Ur Rehman, M Khaliq, SI Imtiaz, A Rasool… - Future Generation …, 2021 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks can put the communication networks
in instability by throwing malicious traffic and requests in bulk over the network. Computer …

Metamorphic malware and obfuscation: a survey of techniques, variants, and generation kits

K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐
changing battlefield over who can innovate over the other. While security analysts are …

An advanced intrusion detection system for IIoT based on GA and tree based algorithms

SM Kasongo - IEEE Access, 2021 - ieeexplore.ieee.org
The evolution of the Internet and cloud-based technologies have empowered several
organizations with the capacity to implement large-scale Internet of Things (IoT)-based …

An analysis of the KDD99 and UNSW-NB15 datasets for the intrusion detection system

MS Al-Daweri, KA Zainol Ariffin, S Abdullah… - Symmetry, 2020 - mdpi.com
The significant increase in technology development over the internet makes network security
a crucial issue. An intrusion detection system (IDS) shall be introduced to protect the …

Artificial intelligence algorithm-based economic denial of sustainability attack detection systems: Cloud computing environments

THH Aldhyani, H Alkahtani - Sensors, 2022 - mdpi.com
Cloud computing is currently the most cost-effective means of providing commercial and
consumer IT services online. However, it is prone to new flaws. An economic denial of …

A hybrid machine learning method for increasing the performance of network intrusion detection systems

AA Megantara, T Ahmad - Journal of Big Data, 2021 - Springer
The internet has grown enormously for many years. It is not just connecting computer
networks but also a group of devices worldwide involving big data. The internet provides an …