[HTML][HTML] A survey on feature selection techniques based on filtering methods for cyber attack detection
Y Lyu, Y Feng, K Sakurai - Information, 2023 - mdpi.com
Cyber attack detection technology plays a vital role today, since cyber attacks have been
causing great harm and loss to organizations and individuals. Feature selection is a …
causing great harm and loss to organizations and individuals. Feature selection is a …
Design and development of RNN anomaly detection model for IoT networks
I Ullah, QH Mahmoud - IEEE Access, 2022 - ieeexplore.ieee.org
Cybersecurity is important today because of the increasing growth of the Internet of Things
(IoT), which has resulted in a variety of attacks on computer systems and networks. Cyber …
(IoT), which has resulted in a variety of attacks on computer systems and networks. Cyber …
Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier
In this study, an intrusion detection system (IDS) has been proposed to detect malicious in
computer networks. The proposed system is studied on the CICIDS2017 dataset, which is …
computer networks. The proposed system is studied on the CICIDS2017 dataset, which is …
[HTML][HTML] Feature selection and ensemble-based intrusion detection system: an efficient and comprehensive approach
E Jaw, X Wang - Symmetry, 2021 - mdpi.com
The emergence of ground-breaking technologies such as artificial intelligence, cloud
computing, big data powered by the Internet, and its highly valued real-world applications …
computing, big data powered by the Internet, and its highly valued real-world applications …
A survey on the development of self-organizing maps for unsupervised intrusion detection
X Qu, L Yang, K Guo, L Ma, M Sun, M Ke… - Mobile networks and …, 2021 - Springer
This paper describes a focused literature survey of self-organizing maps (SOM) in support of
intrusion detection. Specifically, the SOM architecture can be divided into two categories, ie …
intrusion detection. Specifically, the SOM architecture can be divided into two categories, ie …
[HTML][HTML] A two-level flow-based anomalous activity detection system for IoT networks
I Ullah, QH Mahmoud - Electronics, 2020 - mdpi.com
The significant increase of the Internet of Things (IoT) devices in smart homes and other
smart infrastructure, and the recent attacks on these IoT devices, are motivating factors to …
smart infrastructure, and the recent attacks on these IoT devices, are motivating factors to …
A framework for anomaly detection in IoT networks using conditional generative adversarial networks
I Ullah, QH Mahmoud - IEEE Access, 2021 - ieeexplore.ieee.org
While anomaly detection and the related concept of intrusion detection are widely studied,
detecting anomalies in new operating behavior in environments such as the Internet of …
detecting anomalies in new operating behavior in environments such as the Internet of …
[HTML][HTML] Optimizing filter-based feature selection method flow for intrusion detection system
MA Siddiqi, W Pak - Electronics, 2020 - mdpi.com
In recent times, with the advancement in technology and revolution in digital information,
networks generate massive amounts of data. Due to the massive and rapid transmission of …
networks generate massive amounts of data. Due to the massive and rapid transmission of …
A technique for generating a botnet dataset for anomalous activity detection in IoT networks
I Ullah, QH Mahmoud - 2020 IEEE International Conference on …, 2020 - ieeexplore.ieee.org
In recent times, the number of Internet of Things (IoT) devices and the applications
developed for these devices has increased; as a result, these IoT devices are targeted by …
developed for these devices has increased; as a result, these IoT devices are targeted by …
[HTML][HTML] Towards a hybrid deep learning model for anomalous activities detection in internet of things networks
The tremendous number of Internet of Things (IoT) applications, with their ubiquity, has
provided us with unprecedented productivity and simplified our daily life. At the same time …
provided us with unprecedented productivity and simplified our daily life. At the same time …