[HTML][HTML] Dependable intrusion detection system using deep convolutional neural network: A novel framework and performance evaluation approach

V Hnamte, J Hussain - Telematics and Informatics Reports, 2023 - Elsevier
Intrusion detection systems (IDS) play a critical role in safeguarding computer networks
against unauthorized access and malicious activities. However, traditional IDS approaches …

Current trends in AI and ML for cybersecurity: A state-of-the-art survey

N Mohamed - Cogent Engineering, 2023 - Taylor & Francis
This paper provides a comprehensive survey of the state-of-the-art use of Artificial
Intelligence (AI) and Machine Learning (ML) in the field of cybersecurity. The paper …

Reinforcement learning meets network intrusion detection: a transferable and adaptable framework for anomaly behavior identification

M He, X Wang, P Wei, L Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Anomaly detection plays an essential role in network security and traffic classification. Many
studies have focused on anomaly detection to improve network security, including machine …

[HTML][HTML] Machine learning algorithms for raw and unbalanced intrusion detection data in a multi-class classification problem

M Bacevicius, A Paulauskaite-Taraseviciene - Applied Sciences, 2023 - mdpi.com
Various machine learning algorithms have been applied to network intrusion classification
problems, including both binary and multi-class classifications. Despite the existence of …

A fully streaming big data framework for cyber security based on optimized deep learning algorithm

N Hussen, SM Elghamrawy, M Salem… - IEEE …, 2023 - ieeexplore.ieee.org
Real-time deep learning faces the challenge of balancing accuracy and time, especially in
cybersecurity where intrusion detection is crucial. Traditional deep learning techniques have …

Enhanced neural network-based attack investigation framework for network forensics: Identification, detection, and analysis of the attack

S Bhardwaj, M Dave - Computers & Security, 2023 - Elsevier
Network forensics aids in the identification of distinct network-based attacks through packet-
level analysis of collected network traffic. It also unveils the attacker's intentions and …

From Bytes to Insights: A Systematic Literature Review on Unraveling IDS Datasets for Enhanced Cybersecurity Understanding

A Khanan, YA Mohamed, AH Mohamed… - IEEE Access, 2024 - ieeexplore.ieee.org
In the wake of the expanding digital realm, the imperative for robust cybersecurity measures
has burgeoned significantly. This extensive investigation digs into the complicated realm of …

Modelling of intrusion detection using sea horse optimization with machine learning model on cloud environment

C Jansi Sophia Mary, K Mahalakshmi - International Journal of Information …, 2024 - Springer
The growing reliance on cloud services necessitates a heightened focus on security
measures to protect the integrity and privacy of crucial business data. Privacy preservation …

Cloud Network Anomaly Detection Using Machine and Deep Learning Techniques-Recent Research Advancements

A Abdallah, A Alkaabi, G Alameri, SH Rafique… - IEEE …, 2024 - ieeexplore.ieee.org
In the rapidly evolving landscape of computing and networking, the concepts of cloud
networks have gained significant prominence. Although the cloud network offers on-demand …

Optimizing cybersecurity attack detection in computer networks: A comparative analysis of bio-inspired optimization algorithms using the CSE-CIC-IDS 2018 dataset

H Najafi Mohsenabad, MA Tut - Applied Sciences, 2024 - mdpi.com
In computer network security, the escalating use of computer networks and the
corresponding increase in cyberattacks have propelled Intrusion Detection Systems (IDSs) …