Exploring the effect of training-time randomness on the performance of deep neural networks for intrusion detection

M Catillo, A Pecchia, U Villano - Soft Computing, 2024 - Springer
The number of papers on machine learning and deep neural networks applied to intrusion
detection systems (IDS) is ever-increasing. Differently from existing work on the topic, this …

Cluster-based federated learning framework for intrusion detection

L Cai, N Chen, Y Wei, H Chen… - 2022 IEEE 13th …, 2022 - ieeexplore.ieee.org
With the rapid development of Industrial Internet, the network intrusion detection has
become particularly important. In the Industrial Internet, large-scale data is distributed in the …

[HTML][HTML] A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems

H Asad, S Adhikari, I Gashi - International Journal of Information Security, 2024 - Springer
The signature-based network intrusion detection systems (IDSs) entail relying on a pre-
established signatures and IP addresses that are frequently updated to keep up with the …

A Quantitative Logarithmic Transformation-Based Intrusion Detection System

B Lan, TC Lo, R Wei, HY Tang, CK Shieh - Ieee Access, 2023 - ieeexplore.ieee.org
Intrusion detection systems (IDS) play a vital role in protecting networks from malicious
attacks. Modern IDS use machine-learning or deep-learning models to deal with the …

A Novel Poisoning Attack on Few-Shot based Network Intrusion Detection

N Alhussien, A Aleroud - NOMS 2023-2023 IEEE/IFIP Network …, 2023 - ieeexplore.ieee.org
With the advancement of Machine Learning (ML) algorithms, more organizations started
using Machine Learning based Intrusion Detection Systems (ML-IDSs) to mitigate …

[HTML][HTML] Enhancing IoT Security: A Comparative Study of Feature Reduction Techniques for Intrusion Detection System

J Li, H Chen, MO Shahizan, LM Yusuf - Intelligent Systems with …, 2024 - Elsevier
Abstract Internet of Things (IoT) devices are extensively utilized but are susceptible to
cyberattacks, posing significant security challenges. To mitigate these threats, machine …

Fed-LSAE: Thwarting poisoning attacks against federated cyber threat detection system via autoencoder-based latent space inspection

TD Luong, VM Tien, NH Quyen, DTT Hien… - arXiv preprint arXiv …, 2023 - arxiv.org
The significant rise of security concerns in conventional centralized learning has promoted
federated learning (FL) adoption in building intelligent applications without privacy …

Performance Analysis of Machine Learning Algorithms in Intrusion Detection Systems

FM Çimen, Y Sönmez, M İlbaş - Düzce Üniversitesi Bilim ve …, 2021 - dergipark.org.tr
With the developing technology, the need for the dissemination and protection of information
is becoming increasingly important. Recently, attacks on information systems have …

Leveraging network vulnerability detection using improved import vector machine and Cuckoo search based Grey Wolf Optimizer

P Preethi, I Vasudevan, S Saravanan… - … for Learning (ICOTL), 2023 - ieeexplore.ieee.org
In the current interconnected and susceptible digital environment, the demand for reliable
network attack prediction systems has reached a critical level. This research paper presents …

Feature Selection for High-Dimensional Imbalanced Malware Data Using Filter and Wrapper Selection Methods

M Abujazoh, D Al-Darras, NA Hamad… - 2023 International …, 2023 - ieeexplore.ieee.org
Feature selection is a vital preprocessing step before utilizing any machine learning
algorithm. It aims at reducing the number of features in the dataset by removing irrelevant …