A systematic literature review for network intrusion detection system (IDS)

OH Abdulganiyu, T Ait Tchakoucht… - International Journal of …, 2023 - Springer
With the recent increase in internet usage, the number of important, sensitive, confidential
individual and corporate data passing through internet has increasingly grown. With gaps in …

[HTML][HTML] Feature engineering and model optimization based classification method for network intrusion detection

Y Zhang, Z Wang - Applied Sciences, 2023 - mdpi.com
In light of the escalating ubiquity of the Internet, the proliferation of cyber-attacks, coupled
with their intricate and surreptitious nature, has significantly imperiled network security …

[HTML][HTML] NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach

A Rizzardi, S Sicari, AC Porisini - Computers & Security, 2024 - Elsevier
Anomaly detection approaches for network intrusion detection learn to identify deviations
from normal behavior on a data-driven basis. However, current approaches strive to infer the …

Towards an efficient model for network intrusion detection system (IDS): systematic literature review

OH Abdulganiyu, TA Tchakoucht, YK Saheed - Wireless Networks, 2024 - Springer
With the recent rise in internet usage, the volume of crucial, private, and confidential data
traveling online has increased. Attackers have made attempts to break into the network due …

Meta-Analysis and Systematic Review for Anomaly Network Intrusion Detection Systems: Detection Methods, Dataset, Validation Methodology, and Challenges

ZK Maseer, R Yusof, B Al-Bander, A Saif… - arXiv preprint arXiv …, 2023 - arxiv.org
Intrusion detection systems (IDSs) built on artificial intelligence (AI) are presented as latent
mechanisms for actively detecting fresh attacks over a complex network. Although review …

[HTML][HTML] An empirical assessment of ML models for 5G network intrusion detection: A data leakage-free approach

MA Bouke, A Abdullah - e-Prime-Advances in Electrical Engineering …, 2024 - Elsevier
This paper thoroughly compares thirteen unique Machine Learning (ML) models utilized for
Intrusion detection systems (IDS) in a meticulously controlled environment. Unlike previous …

[PDF][PDF] Intrusion Detection System in IoT Based on GA-ELM Hybrid Method

EM Maseno, Z Wang, F Liu - Journal of Advances in Information …, 2023 - academia.edu
In recent years, we have witnessed rapid growth in the application of IoT globally. IoT has
found its applications in governmental and non-governmental institutions. The integration of …

A novel hybrid automatic intrusion detection system using machine learning technique for anomalous detection based on traffic prediction

D Vinod, M Prasad - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Traffic classification is an automated technique that divides computer network traffic into
several categories depending on different factors like protocol or port number. In a …

[HTML][HTML] Research on Intrusion Detection Based on an Enhanced Random Forest Algorithm

C Lu, Y Cao, Z Wang - Applied Sciences, 2024 - mdpi.com
To address the challenges posed by high data dimensionality and class imbalance during
intrusion detection, which result in increased computational complexity, resource …

Analyzing Autoencoder-Based Intrusion Detection System Performance: Impact of Hidden Layers

S Alhassan, G Abdul-Salaam… - Journal of …, 2023 - journals.nauss.edu.sa
The rise in cyberattacks targeting critical network infrastructure has spurred an increased
emphasis on the development of robust cybersecurity measures. In this context, there is a …