Supervised feature selection techniques in network intrusion detection: A critical review

M Di Mauro, G Galatro, G Fortino, A Liotta - Engineering Applications of …, 2021 - Elsevier
Abstract Machine Learning (ML) techniques are becoming an invaluable support for network
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …

The Android malware detection systems between hope and reality

K Bakour, HM Ünver, R Ghanem - SN applied sciences, 2019 - Springer
The widespread use of Android-based smartphones made it an important target for
malicious applications' developers. So, a large number of frameworks have been proposed …

Intelligent intrusion detection system using clustered self organized map

M Almi'ani, AA Ghazleh, A Al-Rahayfeh… - … on software defined …, 2018 - ieeexplore.ieee.org
The impact of information security breaching becomes bigger and complicated to ignore
every day. New and more sophisticated attacks are emerging and developed; requiring the …

Empirical enhancement of intrusion detection systems: a comprehensive approach with genetic algorithm-based hyperparameter tuning and hybrid feature selection

H Bakır, Ö Ceviz - Arabian Journal for Science and Engineering, 2024 - Springer
Abstract Machine learning-based IDSs have demonstrated promising outcomes in
identifying and mitigating security threats within IoT networks. However, the efficacy of such …

A migration-based cuttlefish algorithm with short-term memory for optimization problems

MS Al Daweri, S Abdullah, KAZ Ariffin - IEEE Access, 2020 - ieeexplore.ieee.org
Cuttlefish algorithm (CFA) is a metaheuristic bio-inspired algorithm that mimics the color-
changing behavior by the cuttlefish. It is produced by light reflected from different layers of …

Swift Detection of XSS Attacks: Enhancing XSS Attack Detection by Leveraging Hybrid Semantic Embeddings and AI Techniques

R Bakır, H Bakır - Arabian Journal for Science and Engineering, 2024 - Springer
Abstract Cross-Site Scripting (XSS) attacks continue to be a significant threat to web
application security, necessitating robust detection mechanisms to safeguard user data and …

Intrusion detection system based on improved abc algorithm with tabu search

T Gu, H Chen, L Chang, L Li - IEEJ Transactions on Electrical …, 2019 - Wiley Online Library
An intrusion detection system (IDS) plays an important role in cyber security to detect
network attacks. To improve the effectiveness of IDS, a new intrusion detection approach …

Cascaded hybrid intrusion detection model based on SOM and RBF neural networks

M Almiani, A AbuGhazleh… - Concurrency and …, 2020 - Wiley Online Library
Cybercriminal activities over computer network systems are considered one of the
preponderant issues that humanity will face in the coming two decades. The development …

Convolutional neural network models using metaheuristic based feature selection method for intrusion detection Saldırı tespiti için metasezgisel tabanlı özellik seçim …

M Salati, İ ASKERBEYLİ… - Journal of the Faculty of …, 2024 - avesis.ankara.edu.tr
This paper proposes a novel approach for intrusion detection using a metaheuristic-based
feature selection method combined with convolutional neural networks (CNNs). The feature …

A Perspective for Intrusion Detection & Prevention in Cloud Environment

S Rani - International Journal of Advanced Networking and …, 2021 - search.proquest.com
The cloud environment is used in all sectors that provide different services to the users. The
assistance provided by the cloud environment in different sectors such as business …