A review of recent approaches on wrapper feature selection for intrusion detection

J Maldonado, MC Riff, B Neveu - Expert Systems with Applications, 2022 - Elsevier
In this paper, we present a review of recent advances in wrapper feature selection
techniques for attack detection and classification, applied in intrusion detection area. Due to …

A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions

H Ahmetoglu, R Das - Internet of Things, 2022 - Elsevier
Rapid developments in network technologies and the amount and scope of data transferred
on networks are increasing day by day. Depending on this situation, the density and …

[HTML][HTML] A hybrid CNN+ LSTM-based intrusion detection system for industrial IoT networks

HC Altunay, Z Albayrak - … Science and Technology, an International Journal, 2023 - Elsevier
Abstract The Internet of Things (IoT) ecosystem has proliferated based on the use of the
internet and cloud-based technologies in the industrial area. IoT technology used in the …

Machine learning methods for cyber security intrusion detection: Datasets and comparative study

IF Kilincer, F Ertam, A Sengur - Computer Networks, 2021 - Elsevier
The increase in internet usage brings security problems with it. Malicious software can affect
the operation of the systems and disrupt data confidentiality due to the security gaps in the …

Cyber security intrusion detection for agriculture 4.0: Machine learning-based solutions, datasets, and future directions

MA Ferrag, L Shu, O Friha… - IEEE/CAA Journal of …, 2021 - ieeexplore.ieee.org
In this paper, we review and analyze intrusion detection systems for Agriculture 4.0 cyber
security. Specifically, we present cyber security threats and evaluation metrics used in the …

An advanced intrusion detection system for IIoT based on GA and tree based algorithms

SM Kasongo - IEEE Access, 2021 - ieeexplore.ieee.org
The evolution of the Internet and cloud-based technologies have empowered several
organizations with the capacity to implement large-scale Internet of Things (IoT)-based …

Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms

V de Miranda Rios, PRM Inácio, D Magoni… - Computer Networks, 2021 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks are still among the most dangerous
attacks on the Internet. With the advance of methods for detecting and mitigating these …

SAAE-DNN: Deep learning method on intrusion detection

C Tang, N Luktarhan, Y Zhao - Symmetry, 2020 - mdpi.com
Intrusion detection system (IDS) plays a significant role in preventing network attacks and
plays a vital role in the field of national security. At present, the existing intrusion detection …

On IoT intrusion detection based on data augmentation for enhancing learning on unbalanced samples

Y Zhang, Q Liu - Future Generation Computer Systems, 2022 - Elsevier
Internet of things (IoT) security is a prerequisite for the rapid development of the IoT to
enhance human well-being. Machine learning-based intrusion detection systems (IDS) have …

An improved design for a cloud intrusion detection system using hybrid features selection approach with ML classifier

M Bakro, RR Kumar, A Alabrah, Z Ashraf… - IEEE …, 2023 - ieeexplore.ieee.org
The focus of cloud computing nowadays has been reshaping the digital epoch, in which
clients now face serious concerns about the security and privacy of their data hosted in the …