[HTML][HTML] Machine-learning-based DDoS attack detection using mutual information and random forest feature importance method

M Alduailij, QW Khan, M Tahir, M Sardaraz, M Alduailij… - Symmetry, 2022 - mdpi.com
Cloud computing facilitates the users with on-demand services over the Internet. The
services are accessible from anywhere at any time. Despite the valuable services, the …

A novel method for intrusion detection in computer networks by identifying multivariate outliers and ReliefF feature selection

B Uzun, S Ballı - Neural Computing and Applications, 2022 - Springer
The identification of unusual data in computer networks is a critical task for intrusion
detection systems. In this study, a novel approach has been proposed for improving …

An intrusion detection approach based on incremental long short-term memory

H Zhou, L Kang, H Pan, G Wei, Y Feng - International Journal of …, 2023 - Springer
The notorious attacks of the last few years have propelled cyber security to the top of the
boardroom agenda, and raised the level of criticality to new heights. Therefore, building a …

Detecting cyber attacks with high-frequency features using machine learning algorithms

AN Ozalp, Z Albayrak - Acta Polytechnica Hungarica, 2022 - acikerisim.subu.edu.tr
In computer networks, intrusion detection systems are used to detect cyber-attacks and
anomalies. Feature selection is important for intrusion detection systems to scan the network …

A Comparative Analysis of Intrusion Detection Systems: Leveraging Algorithm Classifications and Feature Selection Techniques

V Shakir, A Mohsin - Journal of Applied Science and Technology Trends, 2024 - jastt.org
With the increasing use of the Internet and its coverage of all areas of life and the increasing
amount of sensitive and confidential information on the Internet, the number of malicious …

Extreme minority class detection in imbalanced data for network intrusion

MS Milosevic, VM Ciric - Computers & Security, 2022 - Elsevier
As the amount of traffic on the Internet increases, so does the number of new and
sophisticated network attacks. Intrusion detection systems are the most important tools for …

[HTML][HTML] Explainable Lightweight Block Attention Module Framework for Network-Based IoT Attack Detection

F Safarov, M Basak, R Nasimov, A Abdusalomov… - Future Internet, 2023 - mdpi.com
In the rapidly evolving landscape of internet usage, ensuring robust cybersecurity measures
has become a paramount concern across diverse fields. Among the numerous cyber threats …

Preprocessing Impact Analysis for Machine Learning-Based Network Intrusion Detection

H Güney - Sakarya University Journal of Computer and …, 2023 - saucis.sakarya.edu.tr
Machine learning (ML) has been frequently used to build intelligent systems in many
problem domains, including cybersecurity. For malicious network activity detection, ML …

A Lightweight Cooperative Intrusion Detection System for RPL-based IoT

H Azzaoui, AZE Boukhamla, P Perazzo… - Wireless Personal …, 2024 - Springer
The successful deployment of an Intrusion Detection System (IDS) in the Internet of Things
(IoT) is subject to two primary criteria: the detection method and the deployment strategy …

Gradient importance enhancement based feature fusion intrusion detection technique

J Fu, X Zhang - Computer Networks, 2022 - Elsevier
In order to better deal with the current unstable network security situation and improve the
accuracy and generalization ability of the intrusion detection model, this paper proposes a …