Zero-day attack detection: a systematic literature review

R Ahmad, I Alsmadi, W Alhamdani… - Artificial Intelligence …, 2023 - Springer
With the continuous increase in cyberattacks over the past few decades, the quest to
develop a comprehensive, robust, and effective intrusion detection system (IDS) in the …

AI based techniques for network-based intrusion detection system: a review

Y Gala, N Vanjari, D Doshi… - 2023 10th International …, 2023 - ieeexplore.ieee.org
The internet has unlocked a whole new universe. It has no bounds and provides individuals
with tremendous economic prospects all throughout the world. People can live better lives …

Feature selection using a combination of ant colony optimization and random forest algorithms applied to isolation forest based intrusion detection system

O Lifandali, N Abghour, Z Chiba - Procedia Computer Science, 2023 - Elsevier
For businesses to operate effectively, networks and computer systems have become crucial
instruments. They are now used in all professional fields, including the military, universities …

CBSeq: A Channel-level Behavior Sequence For Encrypted Malware Traffic Detection

S Cui, C Dong, M Shen, Y Liu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Machine learning and neural networks have become increasingly popular solutions for
encrypted malware traffic detection. They mine and learn complex traffic patterns, enabling …

An intrusion detection system for zero-day attacks to reduce false positive rates

P Pitre, A Gandhi, V Konde, R Adhao… - … for Advancement in …, 2022 - ieeexplore.ieee.org
The Intrusion Detection System (IDS)-is one that monitors network traffic to issue alerts about
any suspicious activity on the network. Conventionally, there are two types of IDSs-Signature …

Anomaly Detection Based on Isolation Mechanisms: A Survey

Y Cao, H Xiang, H Zhang, Y Zhu, KM Ting - arXiv preprint arXiv …, 2024 - arxiv.org
Anomaly detection is a longstanding and active research area that has many applications in
domains such as finance, security, and manufacturing. However, the efficiency and …

A Suricata and Machine Learning Based Hybrid Network Intrusion Detection System

S Ouiazzane, M Addou, F Barramou - Advances in Information …, 2022 - Springer
The objective of this paper is to propose a hybrid model of Network Intrusion Detection
System (NIDS) based on the use of two types of IDS: Signature-based NIDS (SNIDS) and …

[HTML][HTML] TTANAD: Test-Time Augmentation for Network Anomaly Detection

S Cohen, N Goldshlager, B Shapira, L Rokach - Entropy, 2023 - mdpi.com
Machine learning-based Network Intrusion Detection Systems (NIDS) are designed to
protect networks by identifying anomalous behaviors or improper uses. In recent years …

Importance of machine learning techniques to improve the open source intrusion detection systems

FA Vadhil, MF Nanne, ML Salihi - Indonesian Journal of …, 2021 - section.iaesonline.com
Nowadays, it became difficult to ensure data security because of the rapid development of
information technology according to the Vs of Big Data. To secure a network against …

Verification based scheme to restrict iot attacks

B Kaur, S Dadkhah, P Xiong, S Iqbal, S Ray… - Proceedings of the …, 2021 - dl.acm.org
In recent years, with the increased usage of the Internet of Things (IoT) devices, cyber-
attacks have become a serious threat over the Internet. These devices have low memory …