[PDF][PDF] Intrusion Detection: A Review

M Aljanabi, MA Ismail, RA Hasan, J Sulaiman - Mesopotamian Journal of …, 2021 - iasj.net
Due to the processes involved in the electronic transformation of data, the use of computer
systems and the Internet in recent years has led to significant security, privacy, and …

DDoS attack detection and mitigation in SDN using machine learning

F Khashab, J Moubarak, A Feghali… - 2021 IEEE 7th …, 2021 - ieeexplore.ieee.org
Software Defined Networking (SDN) is a networking paradigm that has been very popular
due to its advantages over traditional networks with regard to scalability, flexibility, and its …

[HTML][HTML] AdStop: Efficient flow-based mobile adware detection using machine learning

MM Alani, AI Awad - Computers & Security, 2022 - Elsevier
In recent years, mobile devices have become commonly used not only for voice
communications but also to play a major role in our daily activities. Accordingly, the number …

Enhancement performance of random forest algorithm via one hot encoding for IoT IDS

AY Hussein, P Falcarin, AT Sadiq - Periodicals of Engineering and …, 2021 - pen.ius.edu.ba
The random forest algorithm is one of important supervised machine learning (ML)
algorithms. In the present paper, the accuracy of the results of the random forest (RF) …

Flow-based anomaly detection using neural network optimized with GSA algorithm

Z Jadidi, V Muthukkumarasamy… - 2013 IEEE 33rd …, 2013 - ieeexplore.ieee.org
Reliable high-speed networks are essential to provide quality services to ever growing
Internet applications. A Network Intrusion Detection System (NIDS) is an important tool to …

Discriminating flash crowds from DDoS attacks using efficient thresholding algorithm

J David, C Thomas - Journal of Parallel and Distributed Computing, 2021 - Elsevier
Abstract Distributed Denial-of-Service attacks have been a challenge to cyberspace, as the
attackers send a large number of attack packets similar to the normal traffic, to throttle …

A multi-layer perceptron approach for flow-based anomaly detection

L Van Efferen, AMT Ali-Eldin - 2017 international symposium …, 2017 - ieeexplore.ieee.org
The increase in successful cyber-attacks on systems with firewalls and encryption
techniques has led to the creation of Intrusion Detection Systems (IDS). Machine learning …

An Ensemble of Text Convolutional Neural Networks and Multi-Head Attention Layers for Classifying Threats in Network Packets

H Kim, Y Yoon - Electronics, 2023 - mdpi.com
Using traditional methods based on detection rules written by human security experts
presents significant challenges for the accurate detection of network threats, which are …

Cortex-inspired ensemble based network intrusion detection system

A Muhammad, I Murtza, A Saadia, K Kifayat - Neural Computing and …, 2023 - Springer
With the invention of modern network technologies in recent decades, the exponential
growth in wireless devices and their ease in wireless connectivity, network traffic is …

Evaluating machine learning approaches for cyber and physical anomalies in scada systems

L Faramondi, F Flammini, S Guarino… - … Conference on Cyber …, 2023 - ieeexplore.ieee.org
In recent years, machine learning (ML) techniques have been widely adopted as anomaly-
based Intrusion Detection System in order to evaluate cyber and physical attacks against …