[HTML][HTML] Overview on intrusion detection systems design exploiting machine learning for networking cybersecurity

P Dini, A Elhanashi, A Begni, S Saponara, Q Zheng… - Applied Sciences, 2023 - mdpi.com
The Intrusion Detection System (IDS) is an effective tool utilized in cybersecurity systems to
detect and identify intrusion attacks. With the increasing volume of data generation, the …

A GA-LR wrapper approach for feature selection in network intrusion detection

C Khammassi, S Krichen - computers & security, 2017 - Elsevier
Intrusions constitute one of the main issues in computer network security. Through malicious
actions, hackers can have unauthorised access that compromises the integrity, the …

Practical real-time intrusion detection using machine learning approaches

P Sangkatsanee, N Wattanapongsakorn… - Computer …, 2011 - Elsevier
The growing prevalence of network attacks is a well-known problem which can impact the
availability, confidentiality, and integrity of critical information for both individuals and …

Network anomaly detection using channel boosted and residual learning based deep convolutional neural network

N Chouhan, A Khan - Applied Soft Computing, 2019 - Elsevier
Anomaly detection in a network is one of the prime concerns for network security. In this
work, a novel Channel Boosted and Residual learning based deep Convolutional Neural …

A NSGA2-LR wrapper approach for feature selection in network intrusion detection

C Khammassi, S Krichen - Computer Networks, 2020 - Elsevier
Feature selection is becoming a major preprocessing phase in which irrelevant and
redundant features are removed, while the more informative ones are retained. The datasets …

Real time DDoS detection using fuzzy estimators

SN Shiaeles, V Katos, AS Karakos… - computers & security, 2012 - Elsevier
We propose a method for DDoS detection by constructing a fuzzy estimator on the mean
packet inter arrival times. We divided the problem into two challenges, the first being the …

A simple recurrent unit model based intrusion detection system with DCGAN

J Yang, T Li, G Liang, W He, Y Zhao - IEEE Access, 2019 - ieeexplore.ieee.org
Due to the complex and time-varying network environments, traditional methods are difficult
to extract accurate features of intrusion behavior from the high-dimensional data samples …

Predicting disputes in public-private partnership projects: Classification and ensemble models

JS Chou, C Lin - Journal of Computing in Civil Engineering, 2013 - ascelibrary.org
Proactively forecasting disputes in the initiation phase of public-private partnership (PPP)
projects can considerably reduce the effort, time, and cost of managing potential claims. This …

Attribute normalization in network intrusion detection

W Wang, X Zhang, S Gombault… - 2009 10th international …, 2009 - ieeexplore.ieee.org
Anomaly intrusion detection is an important issue in computer network security. As a step of
data preprocessing, attribute normalization is essential to detection performance. However …

A practical network-based intrusion detection and prevention system

N Wattanapongsakorn, S Srakaew… - 2012 IEEE 11th …, 2012 - ieeexplore.ieee.org
While Internet and network technology have been growing rapidly, cyber attack incidents
also increase accordingly. The increasing occurrence of network attacks is an important …