Machine learning approach to ids: A comprehensive review

M Dua - 2019 3rd International conference on Electronics …, 2019 - ieeexplore.ieee.org
Due to the very fast growth of computer networks, Internet emerges as an important tool to
obtain the desired information. As the data transferred using networks is rapidly increasing …

Hybrid model for improving the classification effectiveness of network intrusion detection

V Dutta, M Choraś, R Kozik, M Pawlicki - 13th International Conference on …, 2021 - Springer
Recently developed machine learning techniques, with emphasis on deep learning, are
finding their successful implementations in detection and classification of anomalies at both …

IDERES: Intrusion detection and response system using machine learning and attack graphs

JR Rose, M Swann, KP Grammatikakis, I Koufos… - Journal of Systems …, 2022 - Elsevier
The rapid increase in the use of IoT devices brings many benefits to the digital society,
ranging from improved efficiency to higher productivity. However, the limited resources and …

[HTML][HTML] A systematic literature review of methods and datasets for anomaly-based network intrusion detection

Z Yang, X Liu, T Li, D Wu, J Wang, Y Zhao, H Han - Computers & Security, 2022 - Elsevier
As network techniques rapidly evolve, attacks are becoming increasingly sophisticated and
threatening. Network intrusion detection has been widely accepted as an effective method to …

Computer network intrusion detection using various classifiers and ensemble learning

AH Mirza - 2018 26th Signal processing and communications …, 2018 - ieeexplore.ieee.org
In this paper, we execute anomaly detection over the computer networks using various
machine learning algorithms. We then combine these algorithms to boost the overall …

[图书][B] Benchmarks for evaluating anomaly-based intrusion detection solutions

NJ Miller - 2018 - search.proquest.com
Abstract Anomaly-based Intrusion Detection Systems are critical components of modern
security systems. They often rely on Machine Learning (ML) to detect potential attacks and …

LSTM for anomaly-based network intrusion detection

SA Althubiti, EM Jones, K Roy - 2018 28th International …, 2018 - ieeexplore.ieee.org
Due to the massive amount of the network traffic, attackers have a great chance to cause a
huge damage to the network system or its users. Intrusion detection plays an important role …

Analysis of anomaly detection approaches performed through deep learning methods in SCADA systems

HC Altunay, Z Albayrak, AN Özalp… - 2021 3rd International …, 2021 - ieeexplore.ieee.org
Supervisory control and data acquisition (SCADA) systems are used with monitoring and
control purposes for the process not to fail in industrial control systems. Today, the increase …

Exploring the Use of Data-Driven Approaches for Anomaly Detection in the Internet of Things (IoT) Environment

E Achiluzzi, M Li, MFA Georgy, R Kashef - arXiv preprint arXiv:2301.00134, 2022 - arxiv.org
The Internet of Things (IoT) is a system that connects physical computing devices, sensors,
software, and other technologies. Data can be collected, transferred, and exchanged with …

A detailed analysis of the cicids2017 data set

I Sharafaldin, A Habibi Lashkari… - … Systems Security and …, 2019 - Springer
The likelihood of suffering damage from an attack is obvious with the exponential growth in
the size of computer networks and the internet. Meanwhile, intrusion detection systems …