A survey on data-driven network intrusion detection

D Chou, M Jiang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Data-driven network intrusion detection (NID) has a tendency towards minority attack
classes compared to normal traffic. Many datasets are collected in simulated environments …

Explainable intrusion detection systems (x-ids): A survey of current methods, challenges, and opportunities

S Neupane, J Ables, W Anderson, S Mittal… - IEEE …, 2022 - ieeexplore.ieee.org
The application of Artificial Intelligence (AI) and Machine Learning (ML) to cybersecurity
challenges has gained traction in industry and academia, partially as a result of widespread …

[HTML][HTML] Classification and explanation for intrusion detection system based on ensemble trees and SHAP method

TTH Le, H Kim, H Kang, H Kim - Sensors, 2022 - mdpi.com
In recent years, many methods for intrusion detection systems (IDS) have been designed
and developed in the research community, which have achieved a perfect detection rate …

ROULETTE: A neural attention multi-output model for explainable network intrusion detection

G Andresini, A Appice, FP Caforio, D Malerba… - Expert Systems with …, 2022 - Elsevier
Abstract Network Intrusion Detection (NID) systems are one of the most powerful forms of
defense for protecting public and private networks. Most of the prominent methods applied to …

Explainable artificial intelligence (xai) for intrusion detection and mitigation in intelligent connected vehicles: A review

CI Nwakanma, LAC Ahakonye, JN Njoku… - Applied Sciences, 2023 - mdpi.com
The potential for an intelligent transportation system (ITS) has been made possible by the
growth of the Internet of things (IoT) and artificial intelligence (AI), resulting in the integration …

Examining the suitability of NetFlow features in detecting IoT network intrusions

M Awad, S Fraihat, K Salameh, A Al Redhaei - Sensors, 2022 - mdpi.com
The past few years have witnessed a substantial increase in cyberattacks on Internet of
Things (IoT) devices and their networks. Such attacks pose a significant threat to …

[HTML][HTML] Cyber threat intelligence sharing scheme based on federated learning for network intrusion detection

M Sarhan, S Layeghy, N Moustafa… - Journal of Network and …, 2023 - Springer
The uses of machine learning (ML) technologies in the detection of network attacks have
been proven to be effective when designed and evaluated using data samples originating …

Explainable artificial intelligence (xai) for internet of things: a survey

İ Kök, FY Okay, Ö Muyanlı… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Artificial intelligence (AI) and Machine Learning (ML) are widely employed to make the
solutions more accurate and autonomous in many smart and intelligent applications in the …

Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey

S Ali, Q Li, A Yousafzai - Ad Hoc Networks, 2024 - Elsevier
The industrial internet of things (IIoT) is an evolutionary extension of the traditional Internet of
Things (IoT) into processes and machines for applications in the industrial sector. The IIoT …

[HTML][HTML] Recursive Feature Elimination with Cross-Validation with Decision Tree: Feature Selection Method for Machine Learning-Based Intrusion Detection Systems

M Awad, S Fraihat - Journal of Sensor and Actuator Networks, 2023 - mdpi.com
The frequency of cyber-attacks on the Internet of Things (IoT) networks has significantly
increased in recent years. Anomaly-based network intrusion detection systems (NIDSs) offer …