Overcoming the challenges of data lack, leakage, and dimensionality in intrusion detection systems: a comprehensive review

MA Bouke, A Abdullah, NI Udzir… - Journal of Communication …, 2024 - jcis.sbrt.org.br
Abstract The Internet of Things (IoT) and cloud computing are rapidly gaining momentum as
decentralized internet-based technologies and have led to an increase in information in …

TrIDS: an intelligent behavioural trust based IDS for smart healthcare system

A Singh, K Chatterjee, SC Satapathy - Cluster Computing, 2023 - Springer
Abstract The Medical Cyber-Physical Systems (MCPS) are composed of several medical
devices and low-cost sensors for real-time diagnosis, monitoring, and decision-making …

[HTML][HTML] Extraction of Minimal Set of Traffic Features Using Ensemble of Classifiers and Rank Aggregation for Network Intrusion Detection Systems

J Krupski, M Iwanowski, W Graniszewski - Applied Sciences, 2024 - mdpi.com
Network traffic classification models, an essential part of intrusion detection systems, need to
be as simple as possible due to the high speed of network transmission. One of the fastest …

Robust machine learning based Intrusion detection system using simple statistical techniques in feature selection

S Kaushik, A Bhardwaj, A Almogren, S Bharany… - Scientific Reports, 2025 - nature.com
There are serious security issues with the quick growth of IoT devices, which are
increasingly essential to Industry 4.0. These gadgets frequently function in challenging …

Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems

MA Bouke, A Abdullah, K Cengiz, S Akleylek - PeerJ Computer Science, 2024 - peerj.com
This article presents an evaluation of BukaGini, a stability-aware Gini index feature selection
algorithm designed to enhance model performance in machine learning applications …

Fss-part: Feature grouping subset model for predicting network attacks

R Shanker, V Madaan, P Agrawal - SN Computer Science, 2023 - Springer
To determine the ideal functions for intrusion detection systems (IDS), the selection or
reduction of features is a complex process. Unnecessary features in the dataset will increase …

An efficient feature selection and classification approach for an intrusion detection system using Optimal Neural Network

S Gokul Pran, S Raja - Journal of Intelligent & Fuzzy Systems, 2023 - content.iospress.com
Network flaws are used by hackers to get access to private systems and data. This data and
system access may be extremely destructive with losses. Therefore, this network intrusions …

A study of feature selection methods for android malware detection

D Kshirsagar, P Agrawal - Journal of Information and Optimization …, 2022 - Taylor & Francis
Feature Selection (FS) provides a vital role in the android malware detection system. The
researchers have presented FS methods and tested them on benchmark datasets, including …

[HTML][HTML] Hack me if you can: Aggregating autoencoders for countering persistent access threats within highly imbalanced data

S Benabderrahmane, N Hoang, P Valtchev… - Future Generation …, 2024 - Elsevier
Abstract Advanced Persistent Threats (APTs) are sophisticated, targeted cyberattacks
designed to gain unauthorized access to systems and remain undetected for extended …

Towards Efficient Machine Learning Method for IoT DDoS Attack Detection

P Modi - arXiv preprint arXiv:2408.10267, 2024 - arxiv.org
With the rise in the number of IoT devices and its users, security in IoT has become a big
concern to ensure the protection from harmful security attacks. In the recent years, different …