A review of the advancement in intrusion detection datasets

A Thakkar, R Lohiya - Procedia Computer Science, 2020 - Elsevier
The research in the field of Cyber Security has raised the need to address the issue of
cybercrimes that have caused the requisition of the intellectual properties such as break …

Botnet in DDoS attacks: trends and challenges

N Hoque, DK Bhattacharyya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …

[HTML][HTML] Effective intrusion detection system using XGBoost

SS Dhaliwal, AA Nahid, R Abbas - Information, 2018 - mdpi.com
As the world is on the verge of venturing into fifth-generation communication technology and
embracing concepts such as virtualization and cloudification, the most crucial aspect …

A double-layered hybrid approach for network intrusion detection system using combined naive bayes and SVM

T Wisanwanichthan, M Thammawichai - IEEE Access, 2021 - ieeexplore.ieee.org
A pattern matching method (signature-based) is widely used in basic network intrusion
detection systems (IDS). A more robust method is to use a machine learning classifier to …

Attack classification using feature selection techniques: a comparative study

A Thakkar, R Lohiya - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
The goal of securing a network is to protect the information flowing through the network and
to ensure the security of intellectual as well as sensitive data for the underlying application …

Data mining techniques in intrusion detection systems: A systematic literature review

F Salo, M Injadat, AB Nassif, A Shami, A Essex - IEEE Access, 2018 - ieeexplore.ieee.org
The continued ability to detect malicious network intrusions has become an exercise in
scalability, in which data mining techniques are playing an increasingly important role. We …

Network intrusion detection system using J48 Decision Tree

S Sahu, BM Mehtre - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
As the number of cyber attacks have increased, detecting the intrusion in networks become
a very tough job. For network intrusion detection system (NIDS), many data mining and …

[HTML][HTML] Effective approach toward Intrusion Detection System using data mining techniques

GV Nadiammai, M Hemalatha - Egyptian Informatics Journal, 2014 - Elsevier
With the tremendous growth of the usage of computers over network and development in
application running on various platform captures the attention toward network security. This …

Bibliographical review on cyber attacks from a control oriented perspective

HS Sánchez, D Rotondo, T Escobet, V Puig… - Annual Reviews in …, 2019 - Elsevier
This paper presents a bibliographical review of definitions, classifications and applications
concerning cyber attacks in networked control systems (NCSs) and cyber-physical systems …

Design an intrusion detection system based on feature selection using ML algorithms

S Venkatesan - Mathematical Statistician and Engineering Applications, 2023 - philstat.org
With the development of the Internet and Technology, cyber-attacks are growing rapidly thus
cyber security is an important aspect which needs to be given attention. There are several …