Deep learning-based intrusion detection systems: a systematic review

J Lansky, S Ali, M Mohammadi, MK Majeed… - IEEE …, 2021 - ieeexplore.ieee.org
Nowadays, the ever-increasing complication and severity of security attacks on computer
networks have inspired security researchers to incorporate different machine learning …

Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review

SW Lee, M Mohammadi, S Rashidi… - Journal of Network and …, 2021 - Elsevier
Providing a high-performance Intrusion Detection System (IDS) can be very effective in
controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative …

[HTML][HTML] Survey on intrusion detection systems based on machine learning techniques for the protection of critical infrastructure

A Pinto, LC Herrera, Y Donoso, JA Gutierrez - Sensors, 2023 - mdpi.com
Industrial control systems (ICSs), supervisory control and data acquisition (SCADA) systems,
and distributed control systems (DCSs) are fundamental components of critical infrastructure …

[HTML][HTML] Anomaly detection optimization using big data and deep learning to reduce false-positive

K Al Jallad, M Aljnidi, MS Desouki - Journal of Big Data, 2020 - Springer
Abstract Anomaly-based Intrusion Detection System (IDS) has been a hot research topic
because of its ability to detect new threats rather than only memorized signatures threats of …

iNIDS: SWOT Analysis and TOWS Inferences of State-of-the-Art NIDS solutions for the development of Intelligent Network Intrusion Detection System

J Verma, A Bhandari, G Singh - Computer Communications, 2022 - Elsevier
Introduction: The growth of ubiquitous networked devices and the proliferation of
geographically dispersed 'Internet of Thing'devices have exponentially increased network …

GOAMLP: Network intrusion detection with multilayer perceptron and grasshopper optimization algorithm

S Moghanian, FB Saravi, G Javidi, EO Sheybani - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, an intrusion detection system is introduced that uses data mining and machine
learning concepts to detect network intrusion patterns. In the proposed method, an artificial …

Named entity recognition for extracting concept in ontology building on Indonesian language using end-to-end bidirectional long short term memory

J Santoso, EI Setiawan, CN Purwanto… - Expert Systems with …, 2021 - Elsevier
Abstract Information Extraction has been widely used to extract information from text. Named
Entity Recognition (NER) is one of the primary tasks of Information Extraction to extract …

Emergent deep learning for anomaly detection in internet of everything

Y Djenouri, D Djenouri, A Belhadi… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
This research presents a new generic deep learning (DL) framework for anomaly detection
in the Internet of Everything (IoE). It combines decomposition methods, deep neural …

Hybrid Whale Tabu algorithm optimized convolutional neural network architecture for intrusion detection in big data

A Ponmalar, V Dhanakoti - Concurrency and computation …, 2022 - Wiley Online Library
The rate of internet traffic in the digital world has expanded fast due to technological
improvement. Because of the large number of internet users, there is a large volume of …

[HTML][HTML] An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron

M Alazab, RA Khurma, PA Castillo, B Abu-Salih… - Egyptian Informatics …, 2024 - Elsevier
This paper proposes an Intrusion Detection System (IDS) employing the Harris Hawks
Optimization algorithm (HHO) to optimize Multilayer Perceptron learning by optimizing bias …