A survey on data-driven network intrusion detection

D Chou, M Jiang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Data-driven network intrusion detection (NID) has a tendency towards minority attack
classes compared to normal traffic. Many datasets are collected in simulated environments …

Intelligent techniques for detecting network attacks: review and research directions

M Aljabri, SS Aljameel, RMA Mohammad, SH Almotiri… - Sensors, 2021 - mdpi.com
The significant growth in the use of the Internet and the rapid development of network
technologies are associated with an increased risk of network attacks. Network attacks refer …

Cyber security intrusion detection for agriculture 4.0: Machine learning-based solutions, datasets, and future directions

MA Ferrag, L Shu, O Friha… - IEEE/CAA Journal of …, 2021 - ieeexplore.ieee.org
In this paper, we review and analyze intrusion detection systems for Agriculture 4.0 cyber
security. Specifically, we present cyber security threats and evaluation metrics used in the …

Security threats, defense mechanisms, challenges, and future directions in cloud computing

S El Kafhali, I El Mir, M Hanini - Archives of Computational Methods in …, 2022 - Springer
Several new technologies such as the smart cities, the Internet of Things (IoT), and 5G
Internet need services offered by cloud computing for processing and storing more …

Secure cloud infrastructure: A survey on issues, current solutions, and open challenges

Y Alghofaili, A Albattah, N Alrajeh, MA Rassam… - Applied Sciences, 2021 - mdpi.com
Cloud computing is currently becoming a well-known buzzword in which business titans,
such as Microsoft, Amazon, and Google, among others, are at the forefront in developing …

Apply machine learning techniques to detect malicious network traffic in cloud computing

A Alshammari, A Aldribi - Journal of Big Data, 2021 - Springer
Computer networks target several kinds of attacks every hour and day; they evolved to make
significant risks. They pass new attacks and trends; these attacks target every open port …

Chronological salp swarm algorithm based deep belief network for intrusion detection in cloud using fuzzy entropy

L Karuppusamy, J Ravi, M Dabbu… - … Journal of Numerical …, 2022 - Wiley Online Library
Cloud computing is susceptible to the existing information technology attacks, as it extends
and uses the traditional operating system, information technology infrastructure, and …

Advancing network security in industrial IoT: a deep dive into AI-enabled intrusion detection systems

M Shahin, M Maghanaki, A Hosseinzadeh… - Advanced Engineering …, 2024 - Elsevier
The increasing use of Industrial Internet of Things (IIoT) devices has heightened concerns
about cybersecurity threats, particularly botnet attacks. Traditional internet communication …

iNIDS: SWOT Analysis and TOWS Inferences of State-of-the-Art NIDS solutions for the development of Intelligent Network Intrusion Detection System

J Verma, A Bhandari, G Singh - Computer Communications, 2022 - Elsevier
Introduction: The growth of ubiquitous networked devices and the proliferation of
geographically dispersed 'Internet of Thing'devices have exponentially increased network …

A comprehensive study of cloud forensics

P Purnaye, V Kulkarni - Archives of Computational Methods in …, 2022 - Springer
Cloud Computing has many facets to it which makes it diverse. Investigation of a cyber-crime
that involves the cloud as a subject, object, or as an environment, is cloud forensics …