Network intrusion detection system: A systematic study of machine learning and deep learning approaches

Z Ahmad, A Shahid Khan, C Wai Shiang… - Transactions on …, 2021 - Wiley Online Library
The rapid advances in the internet and communication fields have resulted in a huge
increase in the network size and the corresponding data. As a result, many novel attacks are …

A comprehensive survey on network anomaly detection

G Fernandes, JJPC Rodrigues, LF Carvalho… - Telecommunication …, 2019 - Springer
Nowadays, there is a huge and growing concern about security in information and
communication technology among the scientific community because any attack or anomaly …

[PDF][PDF] 网络安全入侵检测: 研究综述

蒋建春, 马恒太, 任党恩, 卿斯汉 - 软件学报, 2000 - jos.org.cn
网络安全入侵检测A研究综述 Page 1 !"""#$%&’(&"""(!!)!!*!+,"#"- ./&"""0123456178179:53; 软件
学报 < <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< =16>!!?@1> …

Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues

A Aldweesh, A Derhab, AZ Emam - Knowledge-Based Systems, 2020 - Elsevier
The massive growth of data that are transmitted through a variety of devices and
communication protocols have raised serious security concerns, which have increased the …

Intrusion detection system: A comprehensive review

HJ Liao, CHR Lin, YC Lin, KY Tung - Journal of Network and Computer …, 2013 - Elsevier
With the increasing amount of network throughput and security threat, the study of intrusion
detection systems (IDSs) has received a lot of attention throughout the computer science …

Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey

PLS Jayalaxmi, R Saha, G Kumar, M Conti… - IEEE Access, 2022 - ieeexplore.ieee.org
The increasing number of connected devices in the era of Internet of Thing (IoT) has also
increased the number intrusions. Intrusion Detection System (IDS) is a secondary intelligent …

Shallow and deep networks intrusion detection system: A taxonomy and survey

E Hodo, X Bellekens, A Hamilton, C Tachtatzis… - arXiv preprint arXiv …, 2017 - arxiv.org
Intrusion detection has attracted a considerable interest from researchers and industries.
The community, after many years of research, still faces the problem of building reliable and …

From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods

A Nisioti, A Mylonas, PD Yoo… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last five years there has been an increase in the frequency and diversity of network
attacks. This holds true, as more and more organizations admit compromises on a daily …

Taxonomy and survey of collaborative intrusion detection

E Vasilomanolakis, S Karuppayah… - ACM computing …, 2015 - dl.acm.org
The dependency of our society on networked computers has become frightening: In the
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …

Machine-learning-assisted security and privacy provisioning for edge computing: A survey

S Singh, R Sulthana, T Shewale… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Edge computing (EC), is a technological game changer that has the ability to connect
millions of sensors and provide services at the device end. The broad vision of EC integrates …