A modified grey wolf optimization algorithm for an intrusion detection system

A Alzaqebah, I Aljarah, O Al-Kadi, R Damaševičius - Mathematics, 2022 - mdpi.com
Cyber-attacks and unauthorized application usage have increased due to the extensive use
of Internet services and applications over computer networks, posing a threat to the service's …

A novel fully convolutional neural network approach for detection and classification of attacks on industrial IoT devices in smart manufacturing systems

M Shahin, FF Chen, H Bouzary… - … International Journal of …, 2022 - Springer
Abstract Recently, Internet of things (IoT) devices have been widely implemented and
technologically advanced in manufacturing settings to monitor, collect, exchange, analyze …

Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection

A Chohra, P Shirani, EMB Karbab, M Debbabi - Computers & Security, 2022 - Elsevier
In this paper, we propose an optimization approach by leveraging swarm intelligence and
ensemble methods to solve the non-deterministic feature selection problem. The proposed …

An edge based hybrid intrusion detection framework for mobile edge computing

A Singh, K Chatterjee, SC Satapathy - Complex & Intelligent Systems, 2022 - Springer
Abstract The Mobile Edge Computing (MEC) model attracts more users to its services due to
its characteristics and rapid delivery approach. This network architecture capability enables …

An efficient framework for detection and classification of iot botnet traffic

S Maurya, S Kumar, U Garg, M Kumar - ECS Sensors Plus, 2022 - iopscience.iop.org
Abstract The Internet of Things (IoT) has become an integral requirement to equip common
life. According to IDC, the number of IoT devices may increase exponentially up to a trillion …

Lbdmids: LSTM based deep learning model for intrusion detection systems for IOT networks

K Saurabh, S Sood, PA Kumar, U Singh… - 2022 IEEE World AI …, 2022 - ieeexplore.ieee.org
In the recent years, we have witnessed a huge growth in the number of Internet of Things
(loT) and edge devices being used in our everyday activities. This demands the security of …

Privacy-preserving big data analytics for cyber-physical systems

M Keshk, N Moustafa, E Sitnikova, B Turnbull - Wireless Networks, 2022 - Springer
Cyber-physical systems (CPS) generate big data collected from combining physical and
digital entities, but the challenge of CPS privacy-preservation demands further research to …

A comparative study on the impact of adversarial machine learning attacks on contemporary intrusion detection datasets

M Pujari, Y Pacheco, B Cherukuri, W Sun - SN Computer Science, 2022 - Springer
Adversarial attack techniques have taken a firm stand against the capabilities of deep neural
networks, rendering them less efficient in performing their functions. Various kind of attacks …

Optimization of intrusion detection systems determined by ameliorated HNADAM-SGD algorithm

S Shyla, V Bhatnagar, V Bali, S Bali - Electronics, 2022 - mdpi.com
Information security is of pivotal concern for consistently streaming information over the
widespread internetwork. The bottleneck flow of incoming and outgoing data traffic …

An abnormal traffic detection model combined biindrnn with global attention

H Li, H Ge, H Yang, J Yan, Y Sang - IEEE access, 2022 - ieeexplore.ieee.org
As time series data with internal correlation, networks traffic data can be used for abnormal
detection using Recurrent Neural Network (RNN) and its variants, but existing models are …