[HTML][HTML] A survey on feature selection techniques based on filtering methods for cyber attack detection

Y Lyu, Y Feng, K Sakurai - Information, 2023 - mdpi.com
Cyber attack detection technology plays a vital role today, since cyber attacks have been
causing great harm and loss to organizations and individuals. Feature selection is a …

Design and development of RNN anomaly detection model for IoT networks

I Ullah, QH Mahmoud - IEEE Access, 2022 - ieeexplore.ieee.org
Cybersecurity is important today because of the increasing growth of the Internet of Things
(IoT), which has resulted in a variety of attacks on computer systems and networks. Cyber …

Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier

S Ustebay, Z Turgut, MA Aydin - … on big data, deep learning and …, 2018 - ieeexplore.ieee.org
In this study, an intrusion detection system (IDS) has been proposed to detect malicious in
computer networks. The proposed system is studied on the CICIDS2017 dataset, which is …

[HTML][HTML] Feature selection and ensemble-based intrusion detection system: an efficient and comprehensive approach

E Jaw, X Wang - Symmetry, 2021 - mdpi.com
The emergence of ground-breaking technologies such as artificial intelligence, cloud
computing, big data powered by the Internet, and its highly valued real-world applications …

A survey on the development of self-organizing maps for unsupervised intrusion detection

X Qu, L Yang, K Guo, L Ma, M Sun, M Ke… - Mobile networks and …, 2021 - Springer
This paper describes a focused literature survey of self-organizing maps (SOM) in support of
intrusion detection. Specifically, the SOM architecture can be divided into two categories, ie …

[HTML][HTML] A two-level flow-based anomalous activity detection system for IoT networks

I Ullah, QH Mahmoud - Electronics, 2020 - mdpi.com
The significant increase of the Internet of Things (IoT) devices in smart homes and other
smart infrastructure, and the recent attacks on these IoT devices, are motivating factors to …

A framework for anomaly detection in IoT networks using conditional generative adversarial networks

I Ullah, QH Mahmoud - IEEE Access, 2021 - ieeexplore.ieee.org
While anomaly detection and the related concept of intrusion detection are widely studied,
detecting anomalies in new operating behavior in environments such as the Internet of …

[HTML][HTML] Optimizing filter-based feature selection method flow for intrusion detection system

MA Siddiqi, W Pak - Electronics, 2020 - mdpi.com
In recent times, with the advancement in technology and revolution in digital information,
networks generate massive amounts of data. Due to the massive and rapid transmission of …

A technique for generating a botnet dataset for anomalous activity detection in IoT networks

I Ullah, QH Mahmoud - 2020 IEEE International Conference on …, 2020 - ieeexplore.ieee.org
In recent times, the number of Internet of Things (IoT) devices and the applications
developed for these devices has increased; as a result, these IoT devices are targeted by …

[HTML][HTML] Towards a hybrid deep learning model for anomalous activities detection in internet of things networks

I Ullah, A Ullah, M Sajjad - IoT, 2021 - mdpi.com
The tremendous number of Internet of Things (IoT) applications, with their ubiquity, has
provided us with unprecedented productivity and simplified our daily life. At the same time …