Network Intrusion Detection Using Knapsack Optimization, Mutual Information Gain, and Machine Learning

AS Afolabi, OA Akinola - Journal of Electrical and Computer …, 2024 - Wiley Online Library
The security of communication networks can be compromised through both known and
novel attack methods. Protection against such attacks may be achieved through the use of …

Efficientnetv2-RegNet: an effective deep learning framework for secure SDN based IOT network

B Swathi, SS Kolisetty, GV Sivanarayana, SR Battula - Cluster Computing, 2024 - Springer
Traditional network administration required manual programming of routing policies and
related parameters on specific routers and switches, which was expensive. Therefore …

A Novel Hybrid Feature Selection with Cascaded LSTM: Enhancing Security in IoT Networks

K Sundaram, Y Natarajan… - Wireless …, 2024 - Wiley Online Library
The rapid growth of the Internet of Things (IoT) has created a situation where a huge amount
of sensitive data is constantly being created and sent through many devices, making data …

Empowering Urban Connectivity in Smart Cities using Federated Intrusion Detection

Y Djenouri, AN Belbachir - 2023 IEEE 10th International …, 2023 - ieeexplore.ieee.org
The advent of transformative technologies such as the Internet of Things (IoT) has brought
forth significant advancements in various sectors like smart cities, fintech, learning, and …

Intrusion Classification and Detection System Using Machine Learning Models on NSL-KDD Dataset

A Chakrawarti, SS Shrivastava - International Conference on Computer & …, 2023 - Springer
Intrusion detection systems are crucial to cyberattack protection. This paper presents an
intrusion detection system (IDS) architecture that uses numerous machine learning models …

Deep learning method for efficient cloud IDS utilizing combined behavior and flow-based features

G TV, D AJ - Applied Intelligence, 2024 - Springer
Abstract The Intrusion Detection System (IDS) distinguishes the harmful entries from the
normal ones in network traffic data and aids in network security. Due to the emergence of …

Assamese Fake News Detection: A Comprehensive Exploration of LSTM and Bi-LSTM Techniques

R Phukan, PJ Goutom, N Baruah - Procedia Computer Science, 2024 - Elsevier
The spread of false information in the digital age has led to serious threats about the veracity
and dependability of information traded online. Fake news can exacerbate social and …

A comprehensive study on denial of service (DoS) based on feature selection of a given set datasets in Internet of Things (IoT)

KR Kumar, R Nakkeeran - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) has achieved great recognition, in terms of identifying datasets
through feature selection to increase the performance of the IoT network. In this situation …

Intrusion detection system based on the beetle swarm optimization and K‐RMS clustering algorithm

SG Pran, S Raja, S Jeyasudha - International Journal of …, 2024 - Wiley Online Library
Intrusion detection is a cyber‐security method that is significant for network security. It is
utilized to detect behaviors that compromise security and privacy within a network or in the …

Intrusion detection system: a deep neural network-based concatenated approach

HS Sharma, KJ Singh - The Journal of Supercomputing, 2024 - Springer
In recent years, the field of information security has seen a substantial rise in the use of
approaches that include deep learning. The implementation of deep learning strategies into …