A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions

A Thakkar, R Lohiya - Artificial Intelligence Review, 2022 - Springer
With the increase in the usage of the Internet, a large amount of information is exchanged
between different communicating devices. The data should be communicated securely …

Intrusion detection system: A comprehensive review

HJ Liao, CHR Lin, YC Lin, KY Tung - Journal of Network and Computer …, 2013 - Elsevier
With the increasing amount of network throughput and security threat, the study of intrusion
detection systems (IDSs) has received a lot of attention throughout the computer science …

Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: Survey and future challenges

S Pundir, M Wazid, DP Singh, AK Das… - IEEE …, 2019 - ieeexplore.ieee.org
As we all know that the technology is projected to be next to humans very soon because of
its holistic growth. Now-a-days, we see a lot of applications that are making our lives …

WSN‐DS: a dataset for intrusion detection systems in wireless sensor networks

I Almomani, B Al-Kasasbeh, M Al-Akhras - Journal of Sensors, 2016 - Wiley Online Library
Wireless Sensor Networks (WSN) have become increasingly one of the hottest research
areas in computer science due to their wide range of applications including critical military …

Performance evaluation of supervised machine learning algorithms for intrusion detection

MC Belavagi, B Muniyal - Procedia Computer Science, 2016 - Elsevier
Intrusion detection system plays an important role in network security. Intrusion detection
model is a predictive model used to predict the network data traffic as normal or intrusion …

A taxonomy of network threats and the effect of current datasets on intrusion detection systems

H Hindy, D Brosset, E Bayne, AK Seeam… - IEEE …, 2020 - ieeexplore.ieee.org
As the world moves towards being increasingly dependent on computers and automation,
building secure applications, systems and networks are some of the main challenges faced …

Optimized sugeno fuzzy clustering algorithm for wireless sensor networks

M Shokouhifar, A Jalali - Engineering applications of artificial intelligence, 2017 - Elsevier
Clustering is the most common approach to achieve energy efficiency in wireless sensor
networks. The existing clustering techniques exhibit some drawbacks which limit their usage …

On the vital areas of intrusion detection systems in wireless sensor networks

A Abduvaliyev, ASK Pathan, J Zhou… - … Surveys & Tutorials, 2013 - ieeexplore.ieee.org
This paper surveys recently proposed works on Intrusion Detection Systems (IDS) in WSNs,
and presents a comprehensive classification of various IDS approaches according to their …

A lightweight anomaly detection technique for low-resource IoT devices: A game-theoretic methodology

H Sedjelmaci, SM Senouci… - 2016 IEEE international …, 2016 - ieeexplore.ieee.org
In the Internet of Things (IoT), resources' constrained tiny sensors and devices could be
connected to unreliable and untrusted networks. Nevertheless, securing IoT technology is …

Denial of service defence for resource availability in wireless sensor networks

OA Osanaiye, AS Alfa, GP Hancke - IEEE Access, 2018 - ieeexplore.ieee.org
Wireless sensor networks (WSN) over the years have become one of the most promising
networking solutions with exciting new applications for the near future. Its deployment has …