Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey

A McCarthy, E Ghadafi, P Andriotis, P Legg - Journal of Cybersecurity …, 2022 - mdpi.com
Machine learning has become widely adopted as a strategy for dealing with a variety of
cybersecurity issues, ranging from insider threat detection to intrusion and malware …

Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system

MHL Louk, BA Tama - Expert Systems with Applications, 2023 - Elsevier
The mission of an intrusion detection system (IDS) is to monitor network activities and
assess whether or not they are malevolent. Specifically, anomaly-based IDS can discover …

Synthetic attack data generation model applying generative adversarial network for intrusion detection

V Kumar, D Sinha - Computers & Security, 2023 - Elsevier
Detecting a large number of attack classes accurately applying machine learning (ML) and
deep learning (DL) techniques depends on the number of representative samples available …

Overcoming the challenges of data lack, leakage, and dimensionality in intrusion detection systems: a comprehensive review

MA Bouke, A Abdullah, NI Udzir… - Journal of Communication …, 2024 - jcis.sbrt.org.br
Abstract The Internet of Things (IoT) and cloud computing are rapidly gaining momentum as
decentralized internet-based technologies and have led to an increase in information in …

Numerical feature selection and hyperbolic tangent feature scaling in machine learning-based detection of anomalies in the computer network behavior

D Protić, M Stanković, R Prodanović, I Vulić… - Electronics, 2023 - mdpi.com
Anomaly-based intrusion detection systems identify the computer network behavior which
deviates from the statistical model of typical network behavior. Binary classifiers based on …

Effective network intrusion detection using stacking-based ensemble approach

M Ali, M Haque, MH Durad, A Usman… - International Journal of …, 2023 - Springer
The increasing demand for communication between networked devices connected either
through an intranet or the internet increases the need for a reliable and accurate network …

Peerambush: Multi-layer perceptron to detect peer-to-peer botnet

AHH Kabla, AH Thamrin, M Anbar, S Manickam… - Symmetry, 2022 - mdpi.com
Due to emerging internet technologies that mostly depend on the decentralization concept,
such as cryptocurrencies, cyber attackers also use the decentralization concept to develop …

Feature drift aware for intrusion detection system using developed variable length particle swarm optimization in data stream

MS Noori, RKZ Sahbudin, A Sali, F Hashim - IEEE Access, 2023 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) serve as critical components in safeguarding network
security by detecting malicious activities. Although IDS has recently been treated primarily …

Cybersecurity in smart cities: Detection of opposing decisions on anomalies in the computer network behavior

D Protic, L Gaur, M Stankovic, MA Rahman - Electronics, 2022 - mdpi.com
The increased use of urban technologies in smart cities brings new challenges and issues.
Cyber security has become increasingly important as many critical components of …

Infrastructure-wide and intent-based networking dataset for 5G-and-beyond AI-driven autonomous networks

J Andrade-Hoz, Q Wang, JM Alcaraz-Calero - Sensors, 2024 - mdpi.com
In the era of Autonomous Networks (ANs), artificial intelligence (AI) plays a crucial role for
their development in cellular networks, especially in 5G-and-beyond networks. The …