A comprehensive systematic literature review on intrusion detection systems

M Ozkan-Okay, R Samet, Ö Aslan, D Gupta - IEEE Access, 2021 - ieeexplore.ieee.org
Effectively detecting intrusions in the computer networks still remains problematic. This is
because cyber attackers are changing packet contents to disguise the intrusion detection …

Intrusion detection systems in cloud computing paradigm: analysis and overview

P Rana, I Batra, A Malik, AL Imoize, Y Kim… - …, 2022 - Wiley Online Library
Cloud computing paradigm is growing rapidly, and it allows users to get services via the
Internet as pay‐per‐use and it is convenient for developing, deploying, and accessing …

Automated behavioral analysis of malware: A case study of wannacry ransomware

Q Chen, RA Bridges - 2017 16th IEEE International Conference …, 2017 - ieeexplore.ieee.org
Ransomware, a class of self-propagating malware that uses encryption to hold the victims'
data ransom, has emerged in recent years as one of the most dangerous cyber threats, with …

A multi-classifier network-based crypto ransomware detection system: A case study of locky ransomware

AO Almashhadani, M Kaiiali, S Sezer, P O'Kane - IEEE access, 2019 - ieeexplore.ieee.org
Ransomware is a type of advanced malware that has spread rapidly in recent years, causing
significant financial losses for a wide range of victims, including organizations, healthcare …

Cybersecurity in big data era: From securing big data to data-driven security

DB Rawat, R Doku, M Garuba - IEEE Transactions on Services …, 2019 - ieeexplore.ieee.org
''Knowledge is power” is an old adage that has been found to be true in today's information
age. Knowledge is derived from having access to information. The ability to gather …

Towards effective network intrusion detection: from concept to creation on Azure cloud

S Rajagopal, PP Kundapur, KS Hareesha - IEEE Access, 2021 - ieeexplore.ieee.org
Network Intrusion Detection is one of the most researched topics in the field of computer
security. Hacktivists use sophisticated tools to launch numerous attacks that hamper the …

3D-IDS: Doubly Disentangled Dynamic Intrusion Detection

C Qiu, Y Geng, J Lu, K Chen, S Zhu, Y Su… - Proceedings of the 29th …, 2023 - dl.acm.org
Network-based intrusion detection system (NIDS) monitors network traffic for malicious
activities, forming the frontline defense against increasing attacks over information …

[PDF][PDF] Intrusion prevention system using convolutional neural network for wireless sensor network

PR Chandre, P Mahalle, G Shinde - IAES International Journal of Artificial …, 2022 - viit.ac.in
Now-a-days, there is exponential growth in the field of wireless sensor network. In wireless
sensor networks (WSN's), most of communication happen through wireless media hence …

[PDF][PDF] Dynamic Evolving Cauchy Possibilistic Clustering Based on the Self-Similarity Principle (DECS) for Enhancing Intrusion Detection System.

SM Hadi, AH Alsaeedi, RR Nuiaa, S Manickam… - International Journal of …, 2022 - inass.org
Unsupervised machine learning plays a critical role in improving the security level of
applications and systems. The cyberattack floods the network with data streams to deny …

Optimal feature selection for machine learning based intrusion detection system by exploiting attribute dependence

GP Dubey, RK Bhujade - Materials Today: Proceedings, 2021 - Elsevier
Feature Engineering plays an important role in the development of a Machine Learning-
based Classifier; especially for Intrusion Detection Systems. It helps in reducing the …