On the feasibility of deep learning in sensor network intrusion detection

S Otoum, B Kantarci, HT Mouftah - IEEE Networking Letters, 2019 - ieeexplore.ieee.org
In this letter, we present a comprehensive analysis of the use of machine and deep learning
(DL) solutions for IDS systems in wireless sensor networks (WSNs). To accomplish this, we …

Toward an online anomaly intrusion detection system based on deep learning

K Alrawashdeh, C Purdy - 2016 15th IEEE international …, 2016 - ieeexplore.ieee.org
In the past twenty years, progress in intrusion detection has been steady but slow. The
biggest challenge is to detect new attacks in real time. In this work, a deep learning …

An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods

M Alkasassbeh - arXiv preprint arXiv:1712.09623, 2017 - arxiv.org
Despite the great developments in information technology, particularly the Internet, computer
networks, global information exchange, and its positive impact in all areas of daily life, it has …

XGBoost regression classifier (XRC) model for cyber attack detection and classification using inception V4

KMK Raghunath, VV Kumar… - Journal of Web …, 2022 - ieeexplore.ieee.org
Massive reliance on practical systems has resulted in several security concerns. The ability
to identify anomalies is a critical safety feature enabled by anomaly diagnostic techniques …

[PDF][PDF] Review of IDS development methods in machine learning

AA Aburomman, MBI Reaz - International Journal of Electrical and …, 2016 - core.ac.uk
Due to the rapid advancement of knowledge and technologies, the problem of decision
making is getting more sophisticated to address, therefore the inventing of new methods to …

Trust in intrusion detection systems: an investigation of performance analysis for machine learning and deep learning models

B Mahbooba, R Sahal, W Alosaimi, M Serrano - Complexity, 2021 - Wiley Online Library
To design and develop AI‐based cybersecurity systems (eg, intrusion detection system
(IDS)), users can justifiably trust, one needs to evaluate the impact of trust using machine …

Detection of ssh brute force attacks using aggregated netflow data

MM Najafabadi, TM Khoshgoftaar… - 2015 IEEE 14th …, 2015 - ieeexplore.ieee.org
The SSH Brute force attack is one of the most prevalent attacks in computer networks. These
attacks aim to gain ineligible access to users' accounts by trying plenty of different password …

An analysis of random forest algorithm based network intrusion detection system

YY Aung, MM Min - 2017 18th IEEE/ACIS International …, 2017 - ieeexplore.ieee.org
In the world today, the security of the computer system is of great importance, And in the last
few years, there have seen an affected growth in the amount of intrusions that intrusion …

Performance analysis of cryptographic algorithms for selecting better utilization on resource constraint devices

ME Haque, SM Zobaed, MU Islam… - 2018 21st International …, 2018 - ieeexplore.ieee.org
In this paper, we provide a comprehensive performance evaluation of popular symmetric
and asymmetric key encryption algorithms to selecting better utilization on resource …

Combating TCP port scan attacks using sequential neural networks

B Hartpence, A Kwasinski - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
Port scans are a persistent problem on contemporary communication networks. Typically
used as an attack reconnaissance tool, they can also create problems with application …