Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process

B Molina-Coronado, U Mori… - … on Network and …, 2020 - ieeexplore.ieee.org
The identification of network attacks which target information and communication systems
has been a focus of the research community for years. Network intrusion detection is a …

A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions

O Alkadi, N Moustafa, B Turnbull - IEEE Access, 2020 - ieeexplore.ieee.org
This paper reviews the background and related studies in the areas of cloud systems,
intrusion detection and blockchain applications against cyber attacks. This work aims to …

A survey of deep learning-based network anomaly detection

D Kwon, H Kim, J Kim, SC Suh, I Kim, KJ Kim - Cluster Computing, 2019 - Springer
A great deal of attention has been given to deep learning over the past several years, and
new deep learning techniques are emerging with improved functionality. Many computer …

Machine learning in network anomaly detection: A survey

S Wang, JF Balarezo, S Kandeepan… - IEEE …, 2021 - ieeexplore.ieee.org
Anomalies could be the threats to the network that have ever/never happened. To protect
networks against malicious access is always challenging even though it has been studied …

Network anomaly detection using deep learning techniques

MK Hooshmand, D Hosahalli - CAAI Transactions on …, 2022 - Wiley Online Library
Convolutional neural networks (CNNs) are the specific architecture of feed‐forward artificial
neural networks. It is the de‐facto standard for various operations in machine learning and …

SDN-enabled hybrid DL-driven framework for the detection of emerging cyber threats in IoT

D Javeed, T Gao, MT Khan - Electronics, 2021 - mdpi.com
The Internet of Things (IoT) has proven to be a billion-dollar industry. Despite offering
numerous benefits, the prevalent nature of IoT makes it vulnerable and a possible target for …

An empirical study on network anomaly detection using convolutional neural networks

D Kwon, K Natarajan, SC Suh, H Kim… - 2018 IEEE 38th …, 2018 - ieeexplore.ieee.org
Deep learning has been widely applied to network anomaly detection to improve
performance. In our past research, we empirically evaluated a set of deep learning models …

A software deep packet inspection system for network traffic analysis and anomaly detection

W Song, M Beshley, K Przystupa, H Beshley, O Kochan… - Sensors, 2020 - mdpi.com
In this paper, to solve the problem of detecting network anomalies, a method of forming a set
of informative features formalizing the normal and anomalous behavior of the system on the …

A systematic review of defensive and offensive cybersecurity with machine learning

ID Aiyanyo, H Samuel, H Lim - Applied Sciences, 2020 - mdpi.com
This is a systematic review of over one hundred research papers about machine learning
methods applied to defensive and offensive cybersecurity. In contrast to previous reviews …

Hybrid intrusion detection system using machine learning techniques in cloud computing environments

I Aljamal, A Tekeoğlu, K Bekiroglu… - 2019 IEEE 17th …, 2019 - ieeexplore.ieee.org
Intrusion detection is one essential tool towards building secure and trustworthy Cloud
computing environment, given the ubiquitous presence of cyber attacks that proliferate …