Comparative analysis of intrusion detection systems and machine learning based model analysis through decision tree

Z Azam, MM Islam, MN Huda - IEEE Access, 2023 - ieeexplore.ieee.org
Cyber-attacks pose increasing challenges in precisely detecting intrusions, risking data
confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a …

A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer

H Alazzam, A Sharieh, KE Sabri - Expert systems with applications, 2020 - Elsevier
Feature selection plays a vital role in building machine learning models. Irrelevant features
in data affect the accuracy of the model and increase the training time needed to build the …

Using pattern-of-life as contextual information for anomaly-based intrusion detection systems

FJ Aparicio-Navarro, KG Kyriakopoulos, Y Gong… - IEEE …, 2017 - ieeexplore.ieee.org
As the complexity of cyber-attacks keeps increasing, new robust detection mechanisms
need to be developed. The next generation of Intrusion Detection Systems (IDSs) should be …

Enhancing the accuracy of intrusion detection systems by reducing the rates of false positives and false negatives through multi-objective optimization

F Hachmi, K Boujenfa, M Limam - Journal of Network and Systems …, 2019 - Springer
Intrusion detection systems (IDSs) are the fundamental parts of any network security
infrastructure given their role as layers of defense against hackers. However, IDSs generate …

BRL-ETDM: Bayesian reinforcement learning-based explainable threat detection model for industry 5.0 network

AK Dey, GP Gupta, SP Sahu - Cluster Computing, 2024 - Springer
To enhance the universal adaptability of the Real-Time deployment of Industry 5.0, various
machine learning-based cyber threat detection models are given in the literature. Most of the …

Using the pattern-of-life in networks to improve the effectiveness of intrusion detection systems

FJ Aparicio-Navarro, JA Chambers… - 2017 IEEE …, 2017 - ieeexplore.ieee.org
As the complexity of cyber-attacks keeps increasing, new and more robust detection
mechanisms need to be developed. The next generation of Intrusion Detection Systems …

An Efficient Cyber Assault Detection System using Feature Optimization for IoT-based Cyberspace

AK Dey, GP Gupta, SP Sahu - Procedia Computer Science, 2024 - Elsevier
With the exponential growth in connected smart devices that interchange sensitive, crucial,
and personal data over the Internet of Things (IoT)-based cyberspace, IoT becomes …

Creditability-based weighted voting for reducing false positives and negatives in intrusion detection

YD Lin, YC Lai, CY Ho, WH Tai - Computers & security, 2013 - Elsevier
False positives (FPs) and false negatives (FNs) happen in every Intrusion Detection System
(IDS). How often they occur is regarded as a measurement of the accuracy of the system …

Anomaly-based network IDS false alarm filter using cluster-based alarm classification approach

QS Qassim, AM Zin, MJA Aziz - International Journal of …, 2017 - inderscienceonline.com
Anomaly-based network intrusion detection systems (A-NIDS) are an important and
essential defence mechanism against network attacks. However, they generate a high …

Adding contextual information to intrusion detection systems using fuzzy cognitive maps

FJ Aparicio-Navarro, KG Kyriakopoulos… - … cognitive methods in …, 2016 - ieeexplore.ieee.org
In the last few years there has been considerable increase in the efficiency of Intrusion
Detection Systems (IDSs). However, networks are still the victim of attacks. As the complexity …