A systematic literature review for network intrusion detection system (IDS)

OH Abdulganiyu, T Ait Tchakoucht… - International Journal of …, 2023 - Springer
With the recent increase in internet usage, the number of important, sensitive, confidential
individual and corporate data passing through internet has increasingly grown. With gaps in …

A deep and systematic review of the intrusion detection systems in the fog environment

L Yi, M Yin, M Darbandi - Transactions on Emerging …, 2023 - Wiley Online Library
Fog computing has arisen to complement cloud computing, offering a cost‐effective
architecture to power the Internet of things. Fog computing is a network computing and …

Hierarchical federated learning based anomaly detection using digital twins for smart healthcare

D Gupta, O Kayode, S Bhatt, M Gupta… - 2021 IEEE 7th …, 2021 - ieeexplore.ieee.org
Internet of Medical Things (IoMT) is becoming ubiquitous with a proliferation of smart
medical devices and applications used in smart hospitals, smart-home based care, and …

A novel network intrusion detection method based on metaheuristic optimisation algorithms

R Ghanbarzadeh, A Hosseinalipour… - Journal of ambient …, 2023 - Springer
The growing use of the Internet with its vulnerabilities has necessitated the adoption of
Intrusion Detection Systems (IDS) to assure security. IDSs are protective systems that detect …

A classy multifacet clustering and fused optimization based classification methodologies for SCADA security

AO Khadidos, H Manoharan, S Selvarajan… - Energies, 2022 - mdpi.com
Detecting intrusions from the supervisory control and data acquisition (SCADA) systems is
one of the most essential and challenging processes in recent times. Most of the …

Research of machine learning algorithms for the development of intrusion detection systems in 5G mobile networks and beyond

A Imanbayev, S Tynymbayev, R Odarchenko… - Sensors, 2022 - mdpi.com
The introduction of fifth generation mobile networks is underway all over the world which
makes many people think about the security of the network from any hacking. Over the past …

Towards data security assessments using an IDS security model for cyber-physical smart cities

AK Sangaiah, A Javadpour, P Pinto - Information Sciences, 2023 - Elsevier
Technology has enabled many devices to exchange huge amounts of data and
communicate with each other as Edge Intelligence in Smart Cities (EISC), as a result of rapid …

Machine Learning Algorithms for Raw and Unbalanced Intrusion Detection Data in a Multi-Class Classification Problem

M Bacevicius, A Paulauskaite-Taraseviciene - Applied Sciences, 2023 - mdpi.com
Various machine learning algorithms have been applied to network intrusion classification
problems, including both binary and multi-class classifications. Despite the existence of …

A novel feature selection approach to classify intrusion attacks in network communications

M Ozkan-Okay, R Samet, Ö Aslan, S Kosunalp, T Iliev… - Applied Sciences, 2023 - mdpi.com
The fast development of communication technologies and computer systems brings several
challenges from a security point of view. The increasing number of IoT devices as well as …

Visualizing realistic benchmarked ids dataset: Cira-cic-dohbrw-2020

MHM Yusof, AA Almohammedi, V Shepelev… - IEEE …, 2022 - ieeexplore.ieee.org
Intrusion Detection System (IDS) dataset is crucial to detect lateral movement of cyber-
attacks. IDS dataset will help to train the IDS classifier model to achieve earliest detection. A …