Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset

ZK Maseer, R Yusof, N Bahaman, SA Mostafa… - IEEE …, 2021 - ieeexplore.ieee.org
An intrusion detection system (IDS) is an important protection instrument for detecting
complex network attacks. Various machine learning (ML) or deep learning (DL) algorithms …

Machine learning approaches to IoT security: A systematic literature review

R Ahmad, I Alsmadi - Internet of Things, 2021 - Elsevier
With the continuous expansion and evolution of IoT applications, attacks on those IoT
applications continue to grow rapidly. In this systematic literature review (SLR) paper, our …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset

Y Yin, J Jang-Jaccard, W Xu, A Singh, J Zhu… - Journal of Big Data, 2023 - Springer
The effectiveness of machine learning models can be significantly averse to redundant and
irrelevant features present in the large dataset which can cause drastic performance …

Machine-learning-based DDoS attack detection using mutual information and random forest feature importance method

M Alduailij, QW Khan, M Tahir, M Sardaraz, M Alduailij… - Symmetry, 2022 - mdpi.com
Cloud computing facilitates the users with on-demand services over the Internet. The
services are accessible from anywhere at any time. Despite the valuable services, the …

A new ensemble-based intrusion detection system for internet of things

A Abbas, MA Khan, S Latif, M Ajaz, AA Shah… - Arabian Journal for …, 2022 - Springer
The domain of Internet of Things (IoT) has witnessed immense adaptability over the last few
years by drastically transforming human lives to automate their ordinary daily tasks. This is …

A flow-based anomaly detection approach with feature selection method against ddos attacks in sdns

MS El Sayed, NA Le-Khac, MA Azer… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Software Defined Networking (SDN) is an emerging network platform, which facilitates
centralised network management. The SDN enables the network operators to manage the …

Troubleshooting an intrusion detection dataset: the CICIDS2017 case study

G Engelen, V Rimmer, W Joosen - 2021 IEEE Security and …, 2021 - ieeexplore.ieee.org
Numerous studies have demonstrated the effectiveness of machine learning techniques in
application to network intrusion detection. And yet, the adoption of machine learning for …

GAN augmentation to deal with imbalance in imaging-based intrusion detection

G Andresini, A Appice, L De Rose, D Malerba - Future Generation …, 2021 - Elsevier
Nowadays attacks on computer networks continue to advance at a rate outpacing cyber
defenders' ability to write new attack signatures. This paper illustrates a deep learning …

Semi-supervised spatiotemporal deep learning for intrusions detection in IoT networks

M Abdel-Basset, H Hawash… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The rapid growth of the Internet of Things (IoT) technologies has generated a huge amount
of traffic that can be exploited for detecting intrusions through IoT networks. Despite the great …