Supervised feature selection techniques in network intrusion detection: A critical review

M Di Mauro, G Galatro, G Fortino, A Liotta - Engineering Applications of …, 2021 - Elsevier
Abstract Machine Learning (ML) techniques are becoming an invaluable support for network
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …

Deep learning-based intrusion detection systems: a systematic review

J Lansky, S Ali, M Mohammadi, MK Majeed… - IEEE …, 2021 - ieeexplore.ieee.org
Nowadays, the ever-increasing complication and severity of security attacks on computer
networks have inspired security researchers to incorporate different machine learning …

Application of deep reinforcement learning to intrusion detection for supervised problems

M Lopez-Martin, B Carro… - Expert Systems with …, 2020 - Elsevier
The application of new techniques to increase the performance of intrusion detection
systems is crucial in modern data networks with a growing threat of cyber-attacks. These …

Experimental review of neural-based approaches for network intrusion management

M Di Mauro, G Galatro, A Liotta - IEEE Transactions on Network …, 2020 - ieeexplore.ieee.org
The use of Machine Learning (ML) techniques in Intrusion Detection Systems (IDS) has
taken a prominent role in the network security management field, due to the substantial …

[HTML][HTML] Security of things intrusion detection system for smart healthcare

C Iwendi, JH Anajemba, C Biamba, D Ngabo - Electronics, 2021 - mdpi.com
Web security plays a very crucial role in the Security of Things (SoT) paradigm for smart
healthcare and will continue to be impactful in medical infrastructures in the near future. This …

Intelligent intrusion detection system in smart grid using computational intelligence and machine learning

S Khan, K Kifayat, A Kashif Bashir… - Transactions on …, 2021 - Wiley Online Library
Smart grid systems enhanced the capability of traditional power networks while being
vulnerable to different types of cyber‐attacks. These vulnerabilities could cause attackers to …

Metamorphic malware and obfuscation: a survey of techniques, variants, and generation kits

K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐
changing battlefield over who can innovate over the other. While security analysts are …

[PDF][PDF] Automatic building of a powerful IDS for the cloud based on deep neural network by using a novel combination of simulated annealing algorithm and improved …

Z Chiba, MSEK Alaoui, N Abghour… - International Journal of …, 2022 - academia.edu
Cloud computing (CC) is the fastest-growing data hosting and computational technology that
stands today as a satisfactory answer to the problem of data storage and computing …

Variance threshold as early screening to Boruta feature selection for intrusion detection system

MAFA Fida, T Ahmad… - 2021 13th International …, 2021 - ieeexplore.ieee.org
A rapid development of internet technology brings convenience to society and threat of
exploitation at the same time. As a countermeasure, an Intrusion Detection System (IDS) …

Detection of denial of service attacks in communication networks

ALG Rios, Z Li, K Bekshentayeva… - 2020 IEEE international …, 2020 - ieeexplore.ieee.org
Detection of evolving cyber attacks is a challenging task for conventional network intrusion
detection techniques. Various supervised machine learning algorithms have been …