Machine learning for anomaly detection: A systematic review

AB Nassif, MA Talib, Q Nasir, FM Dakalbab - Ieee Access, 2021 - ieeexplore.ieee.org
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …

From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods

A Nisioti, A Mylonas, PD Yoo… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last five years there has been an increase in the frequency and diversity of network
attacks. This holds true, as more and more organizations admit compromises on a daily …

Firefly algorithm based feature selection for network intrusion detection

B Selvakumar, K Muneeswaran - Computers & Security, 2019 - Elsevier
Network intrusion detection is the process of identifying malicious activity in a network by
analyzing the network traffic behavior. Data mining techniques are widely used in Intrusion …

Big data analytics framework for peer-to-peer botnet detection using random forests

K Singh, SC Guntuku, A Thakur, C Hota - Information Sciences, 2014 - Elsevier
Network traffic monitoring and analysis-related research has struggled to scale for massive
amounts of data in real time. Some of the vertical scaling solutions provide good …

Feature selection and ensemble-based intrusion detection system: an efficient and comprehensive approach

E Jaw, X Wang - Symmetry, 2021 - mdpi.com
The emergence of ground-breaking technologies such as artificial intelligence, cloud
computing, big data powered by the Internet, and its highly valued real-world applications …

A survey of distance and similarity measures used within network intrusion anomaly detection

DJ Weller-Fahy, BJ Borghetti… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Anomaly detection (AD) use within the network intrusion detection field of research, or
network intrusion AD (NIAD), is dependent on the proper use of similarity and distance …

Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues

I Corona, G Giacinto, F Roli - Information sciences, 2013 - Elsevier
Intrusion Detection Systems (IDSs) are one of the key components for securing computing
infrastructures. Their objective is to protect against attempts to violate defense mechanisms …

En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment

S Garg, K Kaur, S Batra, GS Aujla, G Morgan… - Journal of Parallel and …, 2020 - Elsevier
With an exponential increase in the usage of different types of services and applications in
cloud computing environment, the identification of malicious behavior of different nodes …

[PDF][PDF] Towards Generating Real-life Datasets for Network Intrusion Detection.

MH Bhuyan, DK Bhattacharyya, JK Kalita - Int. J. Netw. Secur., 2015 - ijns.jalaxy.com.tw
With exponential growth in the number of computer applications and the sizes of networks,
the potential damage that can be caused by attacks launched over the Internet keeps …

Ensemble based collaborative and distributed intrusion detection systems: A survey

G Folino, P Sabatino - Journal of Network and Computer Applications, 2016 - Elsevier
Modern network intrusion detection systems must be able to handle large and fast changing
data, often also taking into account real-time requirements. Ensemble-based data mining …