Machine learning approach to ids: A comprehensive review
M Dua - 2019 3rd International conference on Electronics …, 2019 - ieeexplore.ieee.org
Due to the very fast growth of computer networks, Internet emerges as an important tool to
obtain the desired information. As the data transferred using networks is rapidly increasing …
obtain the desired information. As the data transferred using networks is rapidly increasing …
Hybrid model for improving the classification effectiveness of network intrusion detection
Recently developed machine learning techniques, with emphasis on deep learning, are
finding their successful implementations in detection and classification of anomalies at both …
finding their successful implementations in detection and classification of anomalies at both …
IDERES: Intrusion detection and response system using machine learning and attack graphs
JR Rose, M Swann, KP Grammatikakis, I Koufos… - Journal of Systems …, 2022 - Elsevier
The rapid increase in the use of IoT devices brings many benefits to the digital society,
ranging from improved efficiency to higher productivity. However, the limited resources and …
ranging from improved efficiency to higher productivity. However, the limited resources and …
[HTML][HTML] A systematic literature review of methods and datasets for anomaly-based network intrusion detection
As network techniques rapidly evolve, attacks are becoming increasingly sophisticated and
threatening. Network intrusion detection has been widely accepted as an effective method to …
threatening. Network intrusion detection has been widely accepted as an effective method to …
Computer network intrusion detection using various classifiers and ensemble learning
AH Mirza - 2018 26th Signal processing and communications …, 2018 - ieeexplore.ieee.org
In this paper, we execute anomaly detection over the computer networks using various
machine learning algorithms. We then combine these algorithms to boost the overall …
machine learning algorithms. We then combine these algorithms to boost the overall …
[图书][B] Benchmarks for evaluating anomaly-based intrusion detection solutions
NJ Miller - 2018 - search.proquest.com
Abstract Anomaly-based Intrusion Detection Systems are critical components of modern
security systems. They often rely on Machine Learning (ML) to detect potential attacks and …
security systems. They often rely on Machine Learning (ML) to detect potential attacks and …
LSTM for anomaly-based network intrusion detection
SA Althubiti, EM Jones, K Roy - 2018 28th International …, 2018 - ieeexplore.ieee.org
Due to the massive amount of the network traffic, attackers have a great chance to cause a
huge damage to the network system or its users. Intrusion detection plays an important role …
huge damage to the network system or its users. Intrusion detection plays an important role …
Analysis of anomaly detection approaches performed through deep learning methods in SCADA systems
Supervisory control and data acquisition (SCADA) systems are used with monitoring and
control purposes for the process not to fail in industrial control systems. Today, the increase …
control purposes for the process not to fail in industrial control systems. Today, the increase …
Exploring the Use of Data-Driven Approaches for Anomaly Detection in the Internet of Things (IoT) Environment
The Internet of Things (IoT) is a system that connects physical computing devices, sensors,
software, and other technologies. Data can be collected, transferred, and exchanged with …
software, and other technologies. Data can be collected, transferred, and exchanged with …
A detailed analysis of the cicids2017 data set
I Sharafaldin, A Habibi Lashkari… - … Systems Security and …, 2019 - Springer
The likelihood of suffering damage from an attack is obvious with the exponential growth in
the size of computer networks and the internet. Meanwhile, intrusion detection systems …
the size of computer networks and the internet. Meanwhile, intrusion detection systems …