STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment

S Al, M Dener - Computers & Security, 2021 - Elsevier
The ability to process large amounts of data in real time using big data analytics tools brings
many advantages that can be used in intrusion detection systems. Deep learning …

Practical autoencoder based anomaly detection by using vector reconstruction error

H Torabi, SL Mirtaheri, S Greco - Cybersecurity, 2023 - Springer
Nowadays, cloud computing provides easy access to a set of variable and configurable
computing resources based on user demand through the network. Cloud computing …

[HTML][HTML] An effective technique for detecting minority attacks in NIDS using deep learning and sampling approach

R Harini, N Maheswari, S Ganapathy… - Alexandria Engineering …, 2023 - Elsevier
Anomaly-based intrusion detection system have been consistently used in business
organizations and military to detect a breach in network by identifying any activity that …

Implementation of Intrusion detection and prevention with Deep Learning in Cloud Computing

D Srilatha, N Thillaiarasu - Journal of Information Technology …, 2023 - jitm.ut.ac.ir
An administrator is employed to identify network security breaches in their organizations by
using a Network Intrusion Detection and Prevention System (NIDPS), which is presented in …

[PDF][PDF] Intrusion Detection System with Customized Machine Learning Techniques for NSL-KDD Dataset.

M Zakariah, SA AlQahtani, AM Alawwad… - … , Materials & Continua, 2023 - cdn.techscience.cn
Modern networks are at risk from a variety of threats as a result of the enormous growth in
internet-based traffic. By consuming time and resources, intrusive traffic hampers the …

Intrusion detection in cluster‐based wireless sensor networks: Current issues, opportunities and future research directions

A John, IFB Isnin… - IET Wireless Sensor …, 2024 - Wiley Online Library
Wireless sensor network (WSN) cluster‐based architecture is a system designed to control
and monitor specific events or phenomena remotely, and one of the important concerns that …

Harris hawk optimization trained artificial neural network for anomaly based intrusion detection system

L Narengbam, S Dey - Concurrency and Computation: Practice …, 2023 - Wiley Online Library
An integral part of security infrastructure is detecting and identifying malicious attacks
commonly found in network environments. Despite its effectiveness at identifying anomalous …

Anomaly-based intrusion detection system using Harris Hawks optimisation with a sigmoid neuron network

L Narengbam, S Dey - International Journal of Information …, 2024 - inderscienceonline.com
This study introduces an innovative approach, merging Harris Hawks optimisation (HHO)
with a sigmoid neuron network (SN), to enhance anomaly-based intrusion detection systems …

DDoS Attacks in Traffic Flow Streams Using Ensemble Classifiers

DS Eswari, PV Lakshmi - Computación y Sistemas, 2024 - cys.cic.ipn.mx
The failure of internet networking systems, which can happen in various methods, may
negatively impact contemporary information and communication technologies. In these …

Combating Network Intrusions using Machine Learning Techniques with Multilevel Feature Selection Method

TC Olayinka, CC Ugwu, OJ Okhuoya… - 2022 IEEE Nigeria …, 2022 - ieeexplore.ieee.org
The heavy dependency on the internet, as well as other emerging technologies for access,
storage, and sharing of information, has triggered a proportional increase in cyberattacks …