Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

S Shamshirband, M Fathi, AT Chronopoulos… - Journal of Information …, 2020 - Elsevier
With the increasing utilization of the Internet and its provided services, an increase in cyber-
attacks to exploit the information occurs. A technology to store and maintain user's …

Feature selection and feature extraction in pattern analysis: A literature review

B Ghojogh, MN Samad, SA Mashhadi, T Kapoor… - arXiv preprint arXiv …, 2019 - arxiv.org
Pattern analysis often requires a pre-processing stage for extracting or selecting features in
order to help the classification, prediction, or clustering stage discriminate or represent the …

Building an intrusion detection system using a filter-based feature selection algorithm

MA Ambusaidi, X He, P Nanda… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
Redundant and irrelevant features in data have caused a long-term problem in network
traffic classification. These features not only slow down the process of classification but also …

A double-layered hybrid approach for network intrusion detection system using combined naive bayes and SVM

T Wisanwanichthan, M Thammawichai - Ieee Access, 2021 - ieeexplore.ieee.org
A pattern matching method (signature-based) is widely used in basic network intrusion
detection systems (IDS). A more robust method is to use a machine learning classifier to …

Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing

O Osanaiye, H Cai, KKR Choo… - EURASIP Journal on …, 2016 - Springer
Widespread adoption of cloud computing has increased the attractiveness of such services
to cybercriminals. Distributed denial of service (DDoS) attacks targeting the cloud's …

A hybrid machine learning method for increasing the performance of network intrusion detection systems

AA Megantara, T Ahmad - Journal of Big Data, 2021 - Springer
The internet has grown enormously for many years. It is not just connecting computer
networks but also a group of devices worldwide involving big data. The internet provides an …

A survey on feature selection techniques based on filtering methods for cyber attack detection

Y Lyu, Y Feng, K Sakurai - Information, 2023 - mdpi.com
Cyber attack detection technology plays a vital role today, since cyber attacks have been
causing great harm and loss to organizations and individuals. Feature selection is a …

Feature selection via mutual information: New theoretical insights

M Beraha, AM Metelli, M Papini… - … joint conference on …, 2019 - ieeexplore.ieee.org
Mutual information has been successfully adopted in filter feature-selection methods to
assess both the relevancy of a subset of features in predicting the target variable and the …

Unsupervised algorithms to detect zero-day attacks: Strategy and application

T Zoppi, A Ceccarelli, A Bondavalli - Ieee Access, 2021 - ieeexplore.ieee.org
In the last decade, researchers, practitioners and companies struggled for devising
mechanisms to detect cyber-security threats. Among others, those efforts originated rule …

An enhanced J48 classification algorithm for the anomaly intrusion detection systems

S Aljawarneh, MB Yassein, M Aljundi - Cluster Computing, 2019 - Springer
In this paper, we have developed an enhanced J48 algorithm, which uses the J48 algorithm
for improving the detection accuracy and the performance of the novel IDS technique. This …