A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions

A Thakkar, R Lohiya - Artificial Intelligence Review, 2022 - Springer
With the increase in the usage of the Internet, a large amount of information is exchanged
between different communicating devices. The data should be communicated securely …

Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges

G Kocher, G Kumar - Soft Computing, 2021 - Springer
Deep learning (DL) is gaining significant prevalence in every field of study due to its
domination in training large data sets. However, several applications are utilizing machine …

A multi-objective optimization algorithm for feature selection problems

B Abdollahzadeh, FS Gharehchopogh - Engineering with Computers, 2022 - Springer
Feature selection (FS) is a critical step in data mining, and machine learning algorithms play
a crucial role in algorithms performance. It reduces the processing time and accuracy of the …

A feature selection based on the farmland fertility algorithm for improved intrusion detection systems

TS Naseri, FS Gharehchopogh - Journal of Network and Systems …, 2022 - Springer
The development and expansion of the Internet and cyberspace have increased computer
systems attacks; therefore, Intrusion Detection Systems (IDSs) are needed more than ever …

The monarch butterfly optimization algorithm for solving feature selection problems

M Alweshah, SA Khalaileh, BB Gupta… - Neural Computing and …, 2022 - Springer
Feature selection (FS) is considered to be a hard optimization problem in data mining and
some artificial intelligence fields. It is a process where rather than studying all of the features …

An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection

MA Khan, N Iqbal, H Jamil, DH Kim - Journal of Network and Computer …, 2023 - Elsevier
Traditional ML based IDS cannot handle high-speed and ever-evolving attacks.
Furthermore, these traditional IDS face several common challenges, such as processing …

An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset

V Kumar, D Sinha, AK Das, SC Pandey, RT Goswami - Cluster Computing, 2020 - Springer
Intrusion detection system (IDS) has been developed to protect the resources in the network
from different types of threats. Existing IDS methods can be classified as either anomaly …

A survey of intrusion detection on industrial control systems

Y Hu, A Yang, H Li, Y Sun… - International Journal of …, 2018 - journals.sagepub.com
The modern industrial control systems now exhibit an increasing connectivity to the
corporate Internet technology networks so as to make full use of the rich resource on the …

Binary approaches of quantum-based avian navigation optimizer to select effective features from high-dimensional medical data

MH Nadimi-Shahraki, A Fatahi, H Zamani, S Mirjalili - Mathematics, 2022 - mdpi.com
Many metaheuristic approaches have been developed to select effective features from
different medical datasets in a feasible time. However, most of them cannot scale well to …

Feature selection in UNSW-NB15 and KDDCUP'99 datasets

T Janarthanan, S Zargari - 2017 IEEE 26th international …, 2017 - ieeexplore.ieee.org
Machine learning and data mining techniques have been widely used in order to improve
network intrusion detection in recent years. These techniques make it possible to automate …