Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation

BA Tama, S Lim - Computer Science Review, 2021 - Elsevier
Intrusion detection systems (IDSs) are intrinsically linked to a comprehensive solution of
cyberattacks prevention instruments. To achieve a higher detection rate, the ability to design …

An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment

R SaiSindhuTheja, GK Shyam - Applied Soft Computing, 2021 - Elsevier
Abstract Detection of Denial of Service (DoS) attack is one of the most critical issues in cloud
computing. The attack detection framework is very complex due to the nonlinear thought of …

An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection

MA Khan, N Iqbal, H Jamil, DH Kim - Journal of Network and Computer …, 2023 - Elsevier
Traditional ML based IDS cannot handle high-speed and ever-evolving attacks.
Furthermore, these traditional IDS face several common challenges, such as processing …

Framework for mobile Internet of Things security monitoring based on big data processing and machine learning

I Kotenko, I Saenko, A Branitskiy - IEEE Access, 2018 - ieeexplore.ieee.org
The paper discusses a new framework combining the possibilities of Big Data processing
and machine leaning developed for security monitoring of mobile Internet of Things. The …

Design and modeling an Adaptive Neuro-Fuzzy Inference System (ANFIS) for the prediction of a security index in VANET

BA Bensaber, CGP Diaz, Y Lahrouni - Journal of Computational Science, 2020 - Elsevier
Abstract Vehicular Ad hoc NETworks (VANET) allow communications between vehicles
using their own connection infrastructure. There are several advantages and applications in …

SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network

AA Ahmed, MF Mohammed - Journal of Computational Science, 2018 - Elsevier
Sensitive information can be exposed to critical risks when communicated through computer
networks. The ability of cybercriminals to hide their intention to attack obstructs existing …

Wsn-bfsf: A new dataset for attacks detection in wireless sensor networks

M Dener, C Okur, S Al, A Orman - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The popularity of wireless sensor networks (WSNs) increases as the usage areas and the
number of integrated systems increase, and this situation attracts the attention of attackers …

[PDF][PDF] Applying Big Data Processing and Machine Learning Methods for Mobile Internet of Things Security Monitoring.

IV Kotenko, I Saenko, A Branitskiy - J. Internet Serv. Inf. Secur., 2018 - isyou.info
The paper offers a new approach to Big Data processing for security monitoring of mobile
Internet of things elements based on machine learning and its implementation using parallel …

Machine learning and big data processing for cybersecurity data analysis

I Kotenko, I Saenko, A Branitskiy - Data science in cybersecurity and …, 2020 - Springer
The chapter presents an approach to cybersecurity data analysis based on the combination
of a set of machine learning methods and Big Data technologies for network attack and …

Modelling of the social engineering attacks based on social graph of employees communications analysis

A Suleimanov, M Abramov… - 2018 IEEE Industrial …, 2018 - ieeexplore.ieee.org
The article is aimed at solving the problem of constructing and analyzing a compressed
social graph, taking into account the estimates of the probability of a transition of the …