A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions

A Thakkar, R Lohiya - Artificial Intelligence Review, 2022 - Springer
With the increase in the usage of the Internet, a large amount of information is exchanged
between different communicating devices. The data should be communicated securely …

A holistic review of network anomaly detection systems: A comprehensive survey

N Moustafa, J Hu, J Slay - Journal of Network and Computer Applications, 2019 - Elsevier
Abstract Network Anomaly Detection Systems (NADSs) are gaining a more important role in
most network defense systems for detecting and preventing potential threats. The paper …

Machine learning methods for cyber security intrusion detection: Datasets and comparative study

IF Kilincer, F Ertam, A Sengur - Computer Networks, 2021 - Elsevier
The increase in internet usage brings security problems with it. Malicious software can affect
the operation of the systems and disrupt data confidentiality due to the security gaps in the …

Protocol-based deep intrusion detection for dos and ddos attacks using unsw-nb15 and bot-iot data-sets

M Zeeshan, Q Riaz, MA Bilal, MK Shahzad… - IEEE …, 2021 - ieeexplore.ieee.org
Since its inception, the Internet of Things (IoT) has witnessed mushroom growth as a
breakthrough technology. In a nutshell, IoT is the integration of devices and data such that …

Chained anomaly detection models for federated learning: An intrusion detection case study

D Preuveneers, V Rimmer, I Tsingenopoulos… - Applied Sciences, 2018 - mdpi.com
The adoption of machine learning and deep learning is on the rise in the cybersecurity
domain where these AI methods help strengthen traditional system monitoring and threat …

A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection

V Hajisalem, S Babaie - Computer Networks, 2018 - Elsevier
Due to the widespread use of the internet, computer systems are prone to information theft
that has led to the emergence of Intrusion Detection Systems (IDSs). Various approaches …

From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions

S Anwar, J Mohamad Zain, MF Zolkipli, Z Inayat… - algorithms, 2017 - mdpi.com
In the past few decades, the rise in attacks on communication devices in networks has
resulted in a reduction of network functionality, throughput, and performance. To detect and …

Intrusion response systems for cyber-physical systems: A comprehensive survey

M Bashendy, A Tantawy, A Erradi - Computers & Security, 2023 - Elsevier
Abstract Cyberattacks on Cyber-Physical Systems (CPS) are on the rise due to CPS
increased networked connectivity and may cause costly environmental hazards as well as …

Multi-attribute decision-making for intrusion detection systems: A systematic review

A Alamleh, OS Albahri, AA Zaidan… - … Journal of Information …, 2023 - World Scientific
Intrusion detection systems (IDSs) employ sophisticated security techniques to detect
malicious activities on hosts and/or networks. IDSs have been utilized to ensure the security …

Network forensics: Review, taxonomy, and open challenges

S Khan, A Gani, AWA Wahab, M Shiraz… - Journal of Network and …, 2016 - Elsevier
In recent years, a number of network forensics techniques have been proposed to
investigate the increasing number of cybercrimes. Network forensics techniques assist in …