Machine learning for anomaly detection: A systematic review

AB Nassif, MA Talib, Q Nasir, FM Dakalbab - Ieee Access, 2021 - ieeexplore.ieee.org
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …

A detailed investigation and analysis of using machine learning techniques for intrusion detection

P Mishra, V Varadharajan… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Intrusion detection is one of the important security problems in todays cyber world. A
significant number of techniques have been developed which are based on machine …

Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices

M Eskandari, ZH Janjua, M Vecchio… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Cyber-threat protection is today's one of the most challenging research branches of
information technology, while the exponentially increasing number of tiny, connected …

Supervised feature selection techniques in network intrusion detection: A critical review

M Di Mauro, G Galatro, G Fortino, A Liotta - Engineering Applications of …, 2021 - Elsevier
Abstract Machine Learning (ML) techniques are becoming an invaluable support for network
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …

Adversarial machine learning in network intrusion detection systems

E Alhajjar, P Maxwell, N Bastian - Expert Systems with Applications, 2021 - Elsevier
Adversarial examples are inputs to a machine learning system intentionally crafted by an
attacker to fool the model into producing an incorrect output. These examples have achieved …

Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark

N Marir, H Wang, G Feng, B Li, M Jia - IEEE Access, 2018 - ieeexplore.ieee.org
The emergence of Internet connectivity has led to a significant increase in the volume and
complexity of cyber attacks. Abnormal behavior detection systems are valuable tools for …

A survey on big data for network traffic monitoring and analysis

A D'Alconzo, I Drago, A Morichetta… - … on Network and …, 2019 - ieeexplore.ieee.org
Network Traffic Monitoring and Analysis (NTMA) represents a key component for network
management, especially to guarantee the correct operation of large-scale networks such as …

A survey of neural networks usage for intrusion detection systems

A Drewek-Ossowicka, M Pietrołaj… - Journal of Ambient …, 2021 - Springer
In recent years, advancements in the field of the artificial intelligence (AI) gained a huge
momentum due to the worldwide appliance of this technology by the industry. One of the …

A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection

YA Ahmed, B Koçer, S Huda, BAS Al-rimy… - Journal of Network and …, 2020 - Elsevier
Ransomware is a special type of malicious software that encrypts the user's assets and
makes it unavailable to the users until a ransom is paid to the ransomware author. Such …

Transfer learning for detecting unknown network attacks

J Zhao, S Shetty, JW Pan, C Kamhoua… - EURASIP Journal on …, 2019 - Springer
Network attacks are serious concerns in today's increasingly interconnected society. Recent
studies have applied conventional machine learning to network attack detection by learning …