A holistic review of network anomaly detection systems: A comprehensive survey

N Moustafa, J Hu, J Slay - Journal of Network and Computer Applications, 2019 - Elsevier
Abstract Network Anomaly Detection Systems (NADSs) are gaining a more important role in
most network defense systems for detecting and preventing potential threats. The paper …

An effective intrusion detection approach using SVM with naïve Bayes feature embedding

J Gu, S Lu - Computers & Security, 2021 - Elsevier
Network security has become increasingly important in recent decades, while intrusion
detection system plays a critical role in protecting it. Various machine learning techniques …

Intrusion detection in industrial internet of things network‐based on deep learning model with rule‐based feature selection

JB Awotunde, C Chakraborty… - … and mobile computing, 2021 - Wiley Online Library
The Industrial Internet of Things (IIoT) is a recent research area that links digital equipment
and services to physical systems. The IIoT has been used to generate large quantities of …

A machine learning security framework for iot systems

M Bagaa, T Taleb, JB Bernabe, A Skarmeta - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things security is attracting a growing attention from both academic and industry
communities. Indeed, IoT devices are prone to various security attacks varying from Denial …

Identification of malicious activities in industrial internet of things based on deep learning models

ALH Muna, N Moustafa, E Sitnikova - Journal of information security and …, 2018 - Elsevier
Abstract Internet Industrial Control Systems (IICSs) that connect technological appliances
and services with physical systems have become a new direction of research as they face …

A systemic IoT–fog–cloud architecture for big-data analytics and cyber security systems: A review of fog computing

N Moustafa - Secure Edge Computing, 2021 - taylorfrancis.com
With the rapid growth of the Internet of Things (IoT), current Cloud systems face various
drawbacks such as lack of mobility support, location-awareness, geo-distribution, high …

A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection

V Hajisalem, S Babaie - Computer Networks, 2018 - Elsevier
Due to the widespread use of the internet, computer systems are prone to information theft
that has led to the emergence of Intrusion Detection Systems (IDSs). Various approaches …

A modified grey wolf optimization algorithm for an intrusion detection system

A Alzaqebah, I Aljarah, O Al-Kadi, R Damaševičius - Mathematics, 2022 - mdpi.com
Cyber-attacks and unauthorized application usage have increased due to the extensive use
of Internet services and applications over computer networks, posing a threat to the service's …

Research on intrusion detection based on particle swarm optimization in IoT

J Liu, D Yang, M Lian, M Li - IEEE Access, 2021 - ieeexplore.ieee.org
With the advent of the “Internet plus” era, the Internet of Things (IoT) is gradually penetrating
into various fields, and the scale of its equipment is also showing an explosive growth trend …

An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems

M Keshk, E Sitnikova, N Moustafa… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Protecting Cyber-physical Systems (CPSs) is highly important for preserving sensitive
information and detecting cyber threats. Developing a robust privacy-preserving anomaly …