Survey of intrusion detection systems: techniques, datasets and challenges

A Khraisat, I Gondal, P Vamplew, J Kamruzzaman - Cybersecurity, 2019 - Springer
Cyber-attacks are becoming more sophisticated and thereby presenting increasing
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …

A survey of machine and deep learning methods for internet of things (IoT) security

MA Al-Garadi, A Mohamed, AK Al-Ali… - … surveys & tutorials, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) integrates billions of smart devices that can communicate with
one another with minimal human intervention. IoT is one of the fastest developing fields in …

Enhanced network anomaly detection based on deep neural networks

S Naseer, Y Saleem, S Khalid, MK Bashir, J Han… - IEEE …, 2018 - ieeexplore.ieee.org
Due to the monumental growth of Internet applications in the last decade, the need for
security of information network has increased manifolds. As a primary defense of network …

1D CNN based network intrusion detection with normalization on imbalanced data

M Azizjon, A Jumabek, W Kim - 2020 international conference …, 2020 - ieeexplore.ieee.org
Intrusion detection system (IDS) plays an essential role in computer networks protecting
computing resources and data from outside attacks. Recent IDS faces challenges improving …

Fuzziness based semi-supervised learning approach for intrusion detection system

RAR Ashfaq, XZ Wang, JZ Huang, H Abbas, YL He - Information sciences, 2017 - Elsevier
Countering cyber threats, especially attack detection, is a challenging area of research in the
field of information assurance. Intruders use polymorphic mechanisms to masquerade the …

From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods

A Nisioti, A Mylonas, PD Yoo… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last five years there has been an increase in the frequency and diversity of network
attacks. This holds true, as more and more organizations admit compromises on a daily …

Toward developing efficient Conv-AE-based intrusion detection system using heterogeneous dataset

MA Khan, J Kim - Electronics, 2020 - mdpi.com
Recently, due to the rapid development and remarkable result of deep learning (DL) and
machine learning (ML) approaches in various domains for several long-standing artificial …

Data preprocessing for anomaly based network intrusion detection: A review

JJ Davis, AJ Clark - computers & security, 2011 - Elsevier
Data preprocessing is widely recognized as an important stage in anomaly detection. This
paper reviews the data preprocessing techniques used by anomaly-based network intrusion …

Applying long short-term memory recurrent neural networks to intrusion detection

RC Staudemeyer - South African Computer Journal, 2015 - journals.co.za
We claim that modelling network traffic as a time series with a supervised learning approach,
using known genuine and malicious behaviour, improves intrusion detection. To …

Machine and deep learning for iot security and privacy: applications, challenges, and future directions

S Bharati, P Podder - Security and communication networks, 2022 - Wiley Online Library
The integration of the Internet of Things (IoT) connects a number of intelligent devices with
minimum human interference that can interact with one another. IoT is rapidly emerging in …