Network intrusion detection system: A systematic study of machine learning and deep learning approaches

Z Ahmad, A Shahid Khan, C Wai Shiang… - Transactions on …, 2021 - Wiley Online Library
The rapid advances in the internet and communication fields have resulted in a huge
increase in the network size and the corresponding data. As a result, many novel attacks are …

A comprehensive systematic literature review on intrusion detection systems

M Ozkan-Okay, R Samet, Ö Aslan, D Gupta - IEEE Access, 2021 - ieeexplore.ieee.org
Effectively detecting intrusions in the computer networks still remains problematic. This is
because cyber attackers are changing packet contents to disguise the intrusion detection …

Network attacks: Taxonomy, tools and systems

N Hoque, MH Bhuyan, RC Baishya… - Journal of Network and …, 2014 - Elsevier
To prevent and defend networks from the occurrence of attacks, it is highly essential that we
have a broad knowledge of existing tools and systems available in the public domain. Based …

[HTML][HTML] Effective intrusion detection system to secure data in cloud using machine learning

A Aldallal, F Alisa - Symmetry, 2021 - mdpi.com
When adopting cloud computing, cybersecurity needs to be applied to detect and protect
against malicious intruders to improve the organization's capability against cyberattacks …

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

S Hajj, R El Sibai, J Bou Abdo… - Transactions on …, 2021 - Wiley Online Library
With the Internet's unprecedented growth and nations' reliance on computer networks, new
cyber‐attacks are created every day as means for achieving financial gain, imposing …

Comparative analysis of intrusion detection systems and machine learning based model analysis through decision tree

Z Azam, MM Islam, MN Huda - IEEE Access, 2023 - ieeexplore.ieee.org
Cyber-attacks pose increasing challenges in precisely detecting intrusions, risking data
confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a …

[HTML][HTML] Network intrusion detection with a hashing based apriori algorithm using Hadoop MapReduce

NA Azeez, TJ Ayemobola, S Misra, R Maskeliūnas… - Computers, 2019 - mdpi.com
Ubiquitous nature of Internet services across the globe has undoubtedly expanded the
strategies and operational mode being used by cybercriminals to perpetrate their unlawful …

[PDF][PDF] A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System.

S Pan, TH Morris, U Adhikari - Int. J. Netw. Secur., 2015 - ijns.jalaxy.com.tw
The emergence of high-speed networks in electric power systems creates a tight interaction
of cyber infrastructure with the physical infrastructure and makes the power system …

Umvd-fsl: Unseen malware variants detection using few-shot learning

C Rong, G Gou, C Hou, Z Li, G Xiong… - 2021 international joint …, 2021 - ieeexplore.ieee.org
As the tool for launching cyber attacks, the ever-increasing malware variants pose a
significant threat to the interconnected network community. The detection methods based on …

[PDF][PDF] Dynamic Ant Colony System with Three Level Update Feature Selection for Intrusion Detection.

HM Rais, T Mehmood - Int. J. Netw. Secur., 2018 - researchgate.net
The current era is known as the age of digital information and general medium of access to
this information is computer networks. The uses of network technology also make …