A survey on data-driven network intrusion detection

D Chou, M Jiang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Data-driven network intrusion detection (NID) has a tendency towards minority attack
classes compared to normal traffic. Many datasets are collected in simulated environments …

An effective intrusion detection approach using SVM with naïve Bayes feature embedding

J Gu, S Lu - Computers & Security, 2021 - Elsevier
Network security has become increasingly important in recent decades, while intrusion
detection system plays a critical role in protecting it. Various machine learning techniques …

Cyber security intrusion detection for agriculture 4.0: Machine learning-based solutions, datasets, and future directions

MA Ferrag, L Shu, O Friha… - IEEE/CAA Journal of …, 2021 - ieeexplore.ieee.org
In this paper, we review and analyze intrusion detection systems for Agriculture 4.0 cyber
security. Specifically, we present cyber security threats and evaluation metrics used in the …

Genetic convolutional neural network for intrusion detection systems

MT Nguyen, K Kim - Future Generation Computer Systems, 2020 - Elsevier
Intrusion detection is the identification of unauthorized access of a computer network. This
paper proposes a novel algorithm for a network intrusion detection system (NIDS) using an …

Cyber intrusion detection system based on a multiobjective binary bat algorithm for feature selection and enhanced bat algorithm for parameter optimization in neural …

WAHM Ghanem, SAA Ghaleb, A Jantan… - IEEE …, 2022 - ieeexplore.ieee.org
The staggering development of cyber threats has propelled experts, professionals and
specialists in the field of security into the development of more dependable protection …

Z-ACM: An approximate calculation method of Z-numbers for large data sets based on kernel density estimation and its application in decision-making

R Zhu, Q Liu, C Huang, B Kang - Information Sciences, 2022 - Elsevier
The concept of a Z-number has obtained plenty of interest for its ability to represent
uncertain and partially reliable information. Z-numbers are also widely used in decision …

A network surveillance approach using machine learning based control charts

A Yeganeh, N Chukhrova, A Johannssen… - Expert Systems with …, 2023 - Elsevier
Network surveillance, ie, the detection of anomalous behaviour in communications in a
network, has become an important issue in recent years. In this field, techniques of statistical …

An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons

WAHM Ghanem, A Jantan, SAA Ghaleb… - IEEE Access, 2020 - ieeexplore.ieee.org
One of the most persistent challenges concerning network security is to build a model
capable of detecting intrusions in network systems. The issue has been extensively …

PCA-based Hotelling's T2 chart with fast minimum covariance determinant (FMCD) estimator and kernel density estimation (KDE) for network intrusion detection

M Mashuri, M Ahsan, MH Lee, DD Prastyo - Computers & Industrial …, 2021 - Elsevier
In this work, the combination between the Principal Component Analysis (PCA) and the
Hotelling's T 2 chart is proposed to solve problems caused by the many highly correlated …

[PDF][PDF] Meticulous elephant herding optimization based protocol for detecting intrusions in cognitive radio ad hoc networks

J Ramkumar, R Vadivel - Int. J. Emerg. Trends Eng. Res, 2020 - researchgate.net
Currently, Identification and detection of intrusions in ad-hoc network is a demanding and
significant task. Numerous methodologies have been proposed for detecting the intrusions …