A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions
With the increase in the usage of the Internet, a large amount of information is exchanged
between different communicating devices. The data should be communicated securely …
between different communicating devices. The data should be communicated securely …
Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges
G Kocher, G Kumar - Soft Computing, 2021 - Springer
Deep learning (DL) is gaining significant prevalence in every field of study due to its
domination in training large data sets. However, several applications are utilizing machine …
domination in training large data sets. However, several applications are utilizing machine …
A multi-objective optimization algorithm for feature selection problems
B Abdollahzadeh, FS Gharehchopogh - Engineering with Computers, 2022 - Springer
Feature selection (FS) is a critical step in data mining, and machine learning algorithms play
a crucial role in algorithms performance. It reduces the processing time and accuracy of the …
a crucial role in algorithms performance. It reduces the processing time and accuracy of the …
A feature selection based on the farmland fertility algorithm for improved intrusion detection systems
TS Naseri, FS Gharehchopogh - Journal of Network and Systems …, 2022 - Springer
The development and expansion of the Internet and cyberspace have increased computer
systems attacks; therefore, Intrusion Detection Systems (IDSs) are needed more than ever …
systems attacks; therefore, Intrusion Detection Systems (IDSs) are needed more than ever …
The monarch butterfly optimization algorithm for solving feature selection problems
M Alweshah, SA Khalaileh, BB Gupta… - Neural Computing and …, 2022 - Springer
Feature selection (FS) is considered to be a hard optimization problem in data mining and
some artificial intelligence fields. It is a process where rather than studying all of the features …
some artificial intelligence fields. It is a process where rather than studying all of the features …
An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection
Traditional ML based IDS cannot handle high-speed and ever-evolving attacks.
Furthermore, these traditional IDS face several common challenges, such as processing …
Furthermore, these traditional IDS face several common challenges, such as processing …
An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset
Intrusion detection system (IDS) has been developed to protect the resources in the network
from different types of threats. Existing IDS methods can be classified as either anomaly …
from different types of threats. Existing IDS methods can be classified as either anomaly …
A survey of intrusion detection on industrial control systems
Y Hu, A Yang, H Li, Y Sun… - International Journal of …, 2018 - journals.sagepub.com
The modern industrial control systems now exhibit an increasing connectivity to the
corporate Internet technology networks so as to make full use of the rich resource on the …
corporate Internet technology networks so as to make full use of the rich resource on the …
Binary approaches of quantum-based avian navigation optimizer to select effective features from high-dimensional medical data
Many metaheuristic approaches have been developed to select effective features from
different medical datasets in a feasible time. However, most of them cannot scale well to …
different medical datasets in a feasible time. However, most of them cannot scale well to …
Feature selection in UNSW-NB15 and KDDCUP'99 datasets
T Janarthanan, S Zargari - 2017 IEEE 26th international …, 2017 - ieeexplore.ieee.org
Machine learning and data mining techniques have been widely used in order to improve
network intrusion detection in recent years. These techniques make it possible to automate …
network intrusion detection in recent years. These techniques make it possible to automate …