An isolation forest learning based outlier detection approach for effectively classifying cyber anomalies

RC Ripan, IH Sarker, MM Anwar, MH Furhad… - … Intelligent Systems: 20th …, 2021 - Springer
Cybersecurity has recently gained considerable interest in today's security issues because
of the popularity of the Internet-of-Things (IoT), the considerable growth of mobile networks …

Effectively predicting cyber‐attacks through isolation forest learning‐based outlier detection

RC Ripan, MM Islam, H Alqahtani… - Security and …, 2022 - Wiley Online Library
Due to the popularity of Internet of Things devices, the exponential progress of computer
networks, and a plethora of associated applications, cybersecurity has recently attracted …

Machine learning techniques for anomaly-based detection system on CSE-CIC-IDS2018 dataset

A Elhanashi, K Gasmi, A Begni, P Dini, Q Zheng… - … on Applications in …, 2022 - Springer
Anomaly-based detection is a novel form of an intrusion detection system, which has
become the focus of many researchers for cybersecurity systems. Data manages most …

Fusion-based anomaly detection system using modified isolation forest for internet of things

O AbuAlghanam, H Alazzam, E Alhenawi… - Journal of Ambient …, 2023 - Springer
In recent years, advanced threat and zero day attacks are increasing significantly, but the
traditional network intrusion detection system based on feature filtering or based on a well …

An efficient mixed attribute outlier detection method for identifying network intrusions

JR Beulah, DS Punithavathani - International Journal of Information …, 2020 - igi-global.com
Intrusion detection systems (IDS) play a vital role in protecting information systems from
intruders. Anomaly-based IDS has established its effectiveness in identifying new and …

Camlpad: Cybersecurity autonomous machine learning platform for anomaly detection

A Hariharan, A Gupta, T Pal - … : Proceedings of the 2020 Future of …, 2020 - Springer
As machine learning and cybersecurity continue to explode in the context of the digital
ecosystem, the complexity of cybersecurity data combined with complicated and evasive …

Anomaly detection in cybersecurity datasets via cooperative co-evolution-based feature selection

ANMB Rashid, M Ahmed, LF Sikos… - ACM Transactions on …, 2022 - dl.acm.org
Anomaly detection from Big Cybersecurity Datasets is very important; however, this is a very
challenging and computationally expensive task. Feature selection (FS) is an approach to …

Outlier detection with optimal hybrid deep learning enabled intrusion detection system for ubiquitous and smart environment

M Ragab, MFS Sabir - Sustainable Energy Technologies and Assessments, 2022 - Elsevier
Ubiquitous system returns to making pervasive computing in daily lives, the objects of smart
environment becomes intelligent and interconnect without anyone being conscious of the …

Intelligent outlier detection with optimal deep reinforcement learning model for intrusion detection

S Priya, K PradeepMohankumar - 2021 4th International …, 2021 - ieeexplore.ieee.org
Intrusion detection system (IDS) acts as an essential part to detect malicious activity in the
cyber domain. Earlier works on IDS are mainly based on statistical, machine learning (ML) …

Improving the Efficiency of Genetic-Based Incremental Local Outlier Factor Algorithm for Network Intrusion Detection

O Alghushairy, R Alsini, X Ma, T Soule - … from ICAI'20 and ACC'20, 2021 - Springer
In the era of big data, outlier detection has become an important task for many applications,
such as the network intrusion detection system. Data streams are a unique type of big data …