Towards the development of a cloud computing intrusion detection framework using an ensemble hybrid feature selection approach

NO Ogwara, K Petrova, ML Yang - Journal of Computer …, 2022 - Wiley Online Library
Attacks on cloud computing (CC) services and infrastructure have raised concerns about the
efficacy of data protection mechanisms in this environment. The framework developed in this …

Network Intrusion Detection: An IoT and Non IoT-Related Survey

SA Abdulkareem, CH Foh, M Shojafar, F Carrez… - IEEE …, 2024 - ieeexplore.ieee.org
The proliferation of the Internet of Things (IoT) is occurring swiftly and is all-encompassing.
The cyber attack on Dyn in 2016 brought to light the notable susceptibilities of intelligent …

SUKRY: suricata IDS with enhanced kNN algorithm on raspberry Pi for classifying IoT botnet attacks

I Syamsuddin, OM Barukab - electronics, 2022 - mdpi.com
The focus of this research is the application of the k-Nearest Neighbor algorithm in terms of
classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages …

Establishing the contaminating effect of metadata feature inclusion in machine-learned network intrusion detection models

L D'hooge, M Verkerken, B Volckaert, T Wauters… - … on Detection of …, 2022 - Springer
Modern datasets in intrusion detection are designed to be evaluated by machine learning
techniques and often contain metadata features which ought to be removed prior to training …

Customer churn prediction in telecommunications industry based on data mining

LF Khalid, AM Abdulazeez… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Nowadays, many businesses and organizations have begun to collect data on their future
and current customers to evaluate churning rate and prevent the loss of potential customers …

Intrusion detection in cluster‐based wireless sensor networks: Current issues, opportunities and future research directions

A John, IFB Isnin… - IET Wireless Sensor …, 2024 - Wiley Online Library
Wireless sensor network (WSN) cluster‐based architecture is a system designed to control
and monitor specific events or phenomena remotely, and one of the important concerns that …

Detecting Network Intrusion in Cloud Environment Through Ensemble Learning and Feature Selection Approach

M Khan, M Haroon - SN Computer Science, 2023 - Springer
The use of the Internet is enhanced drastically in the current era, which connects multiple
computers in a network and a group of devices. In addition, every sector uses the Internet to …

Intrusion traffic detection and classification based on unsupervised learning

Z Zhong, C Xie, X Tang - IEEE Access, 2024 - ieeexplore.ieee.org
To solve the problem that the existing intrusion traffic detection models generally adopt
machine learning algorithm and supervised deep learning algorithm, and the classification …

Machine learning algorithm of intrusion detection system

RM Abdullah, AM Abdulazeez… - Asian Journal of …, 2021 - asian.openbookpublished.com
Web of thing (WoT) is a gifted answer for interface and access each gadget through the web.
Consistently the gadget includes increments with huge variety fit as a fiddle, size, use and …

A Performance Analysis of Machine Learning Models for Attack Prediction using Different Feature Selection Techniques

Z Amin, A Kabir - 2022 IEEE/ACIS 7th International Conference …, 2022 - ieeexplore.ieee.org
The cyber assault has emerged as a serious digital threat. Day after day, hackers inflict
severe financial harm on nations and people alike. As a result, threat detection has become …