Intrusion detection in cloud computing based on time series anomalies utilizing machine learning

AR Al-Ghuwairi, Y Sharrab, D Al-Fraihat… - Journal of Cloud …, 2023 - Springer
The growth of cloud computing is hindered by concerns about privacy and security. Despite
the widespread use of network intrusion detection systems (NIDS), the issue of false …

Impact of feature selection methods on machine learning-based for detecting DDoS attacks: Literature review

MN Faiz, O Somantri, AR Supriyono… - Journal of Informatics …, 2022 - ojs.uma.ac.id
Cybersecurity attacks are becoming increasingly sophisticated and increasing with the
development of technology so that they present threats to both the private and public …

Enhancing the internet of medical things (IoMT) security with meta-learning: a performance-driven approach for ensemble intrusion detection systems

M Alalhareth, SC Hong - Sensors, 2024 - mdpi.com
This paper investigates the application of ensemble learning techniques, specifically meta-
learning, in intrusion detection systems (IDS) for the Internet of Medical Things (IoMT). It …

Optimized and efficient image-based IoT malware detection method

A El-Ghamry, T Gaber, KK Mohammed, AE Hassanien - Electronics, 2023 - mdpi.com
With the widespread use of IoT applications, malware has become a difficult and
sophisticated threat. Without robust security measures, a massive volume of confidential and …

A Deep Learning‐Based Framework for Feature Extraction and Classification of Intrusion Detection in Networks

M Naveed, F Arif, SM Usman, A Anwar… - Wireless …, 2022 - Wiley Online Library
An intrusion detection system, often known as an IDS, is extremely important for preventing
attacks on a network, violating network policies, and gaining unauthorized access to a …

Review of filtering based feature selection for Botnet detection in the Internet of Things

M Saied, S Guirguis, M Madbouly - Artificial Intelligence Review, 2025 - Springer
Botnets are a major security threat in the Internet of Things (IoT), posing significant risks to
user privacy, network availability, and the integrity of IoT devices. With the increasing …

[HTML][HTML] Variable selection in the prediction of business failure using genetic programming

Á Beade, M Rodríguez, J Santos - Knowledge-Based Systems, 2024 - Elsevier
This study focuses on dimensionality reduction by variable selection in business failure
prediction models. A new method of dimensionality reduction by variable selection using …

[HTML][HTML] Traffic Feature Selection and Distributed Denial of Service Attack Detection in Software-Defined Networks Based on Machine Learning

D Han, H Li, X Fu, S Zhou - Sensors, 2024 - mdpi.com
As 5G technology becomes more widespread, the significant improvement in network speed
and connection density has introduced more challenges to network security. In particular …

[PDF][PDF] Machine learning to improve the performance of anomaly-based network intrusion detection in big data

S Chimphlee, W Chimphlee - Indones. J. Electr. Eng. Comput. Sci, 2023 - academia.edu
With the rapid growth of digital technology communications are overwhelmed by network
data traffic. The demand for the internet is growing every day in today's cyber world, raising …

Review of intrusion detection system in cyber‐physical system based networks: Characteristics, industrial protocols, attacks, data sets and challenges

R Ji, D Padha, Y Singh… - Transactions on Emerging …, 2024 - Wiley Online Library
Abstract Cyber‐Physical Systems (CPSs) provide critical infrastructure for the betterment of
human lives thereby integrating cyber and physical components but the fusion of physical …