AI based techniques for network-based intrusion detection system: a review

Y Gala, N Vanjari, D Doshi… - 2023 10th International …, 2023 - ieeexplore.ieee.org
The internet has unlocked a whole new universe. It has no bounds and provides individuals
with tremendous economic prospects all throughout the world. People can live better lives …

A Survey of Deep Learning Technologies for Intrusion Detection in Internet of Things

H Liao, MZ Murah, MK Hasan, AHM Aman… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is transforming how we live and work, and its applications are
widespread, spanning smart homes, industrial monitoring, smart cities, healthcare …

Deep learning model transposition for network intrusion detection systems

J Figueiredo, C Serrão, AM de Almeida - Electronics, 2023 - mdpi.com
Companies seek to promote a swift digitalization of their business processes and new
disruptive features to gain an advantage over their competitors. This often results in a wider …

Deep Learning Algorithms Used in Intrusion Detection Systems--A Review

R Kimanzi, P Kimanga, D Cherori… - arXiv preprint arXiv …, 2024 - arxiv.org
The increase in network attacks has necessitated the development of robust and efficient
intrusion detection systems (IDS) capable of identifying malicious activities in real-time. In …

Lkd-stnn: A lightweight malicious traffic detection method for internet of things based on knowledge distillation

S Zhu, X Xu, J Zhao, F Xiao - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The purpose of malicious traffic detection and identification in the Internet of Things (IoT) is
to detect the intrusion of malicious traffic within the IoT network into IoT devices. Detection …

Traffic flow prediction: A 3D adaptive multi‐module joint modeling approach integrating spatial‐temporal patterns to capture global features

Z Ul Abideen, X Sun, C Sun - Journal of Forecasting, 2024 - Wiley Online Library
The challenges in citywide traffic flow are intricate, encompassing various factors like
temporal and spatial dependencies, holidays, and weather. Despite the complexity, there …

A Federated Network Intrusion Detection System with Multi-Branch Network and Vertical Blocking Aggregation

Y Wang, W Zheng, Z Liu, J Wang, H Shi, M Gu, Y Di - Electronics, 2023 - mdpi.com
The rapid development of cloud–fog–edge computing and mobile devices has led to
massive amounts of data being generated. Also, artificial intelligence technology, like …

An interpretable intrusion detection method based on few-shot learning in cloud-ground interconnection

Y Zhang, G Li, Q Duan, J Wu - Physical Communication, 2022 - Elsevier
An enterprise's private cloud may be attacked by attackers when communicating with the
public cloud. Although traffic detection methods based on deep learning have been widely …

A Review of the Duality of Adversarial Learning in Network Intrusion: Attacks and Countermeasures

S Saini, A Chennamaneni, B Sawyerr - arXiv preprint arXiv:2412.13880, 2024 - arxiv.org
Deep learning solutions are instrumental in cybersecurity, harnessing their ability to analyze
vast datasets, identify complex patterns, and detect anomalies. However, malevolent actors …

Anomaly Based Intrusion Detection System: A Deep Learning Approach

S Tossou, M Qorib, T Kacem - 2023 International Symposium …, 2023 - ieeexplore.ieee.org
In recent years, computer networks have seen a considerable proliferation in terms of
performance and total traffic volume. At the same time, cyber attacks have been on the rise …