[HTML][HTML] An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection

IH Hassan, M Abdullahi, MM Aliyu, SA Yusuf… - Intelligent Systems with …, 2022 - Elsevier
The growth within the Internet and communications areas have led to a massive surge in the
dimension of network and data. Consequently, several new threats are being created and …

[HTML][HTML] Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior

M Al-Fawa'reh, M Al-Fayoumi, S Nashwan… - Egyptian Informatics …, 2022 - Elsevier
Security issues are the most critical challenges facing new technologies associated with the
internet of things (IoT), big data, and cloud computing. A secure and efficient intrusion …

Metaheuristic algorithms in network intrusion detection

IH Hassan, A Mohammed, MA Masama - Comprehensive metaheuristics, 2023 - Elsevier
An intrusion detection system (IDS) is a network security scheme that identifies, discovers,
and tracks a network invader or attacker. With the rapid growth of the Internet, wireless …

[PDF][PDF] VPN and Non-VPN Network Traffic Classification Using Time-Related Features.

M Al-Fayoumi, M Al-Fawa'reh… - Computers, Materials & …, 2022 - researchgate.net
The continual growth of the use of technological appliances during the COVID-19 pandemic
has resulted in a massive volume of data flow on the Internet, as many employees have …

Exposing bot attacks using machine learning and flow level analysis

R Faek, M Al-Fawa'reh, M Al-Fayoumi - … on Data Science, E-learning and …, 2021 - dl.acm.org
Botnets represent a major threat to Internet security that have continuously developed in
scale and complexity. Command-and-control servers (C&C) send commands to bots that …

Tor network traffic classification using machine learning based on time-related feature

M Al-Fayoumi, A Elayyan, A Odeh… - 6th Smart Cities …, 2022 - ieeexplore.ieee.org
Application-level defensive security controls like Intrusion Detection and Prevention Systems
(IDS/IPS) need to have visibility on the application data portion of the processed network …

Facilitating secure web browsing by utilizing supervised filtration of malicious URLs

A Elqasass, I Aljundi, M Al-Fayoumi… - … Conference on IoT Based …, 2023 - Springer
Nowadays, Internet use by all people has become a daily matter, whether to do business,
buy online, education, entertainment, or social communication. Therefore, attackers exploit …

Machine learning for data mining, data science and data analytics

V Radhakrishna, GR Kumar… - Recent Advances in …, 2021 - ingentaconnect.com
The first article,“Mathura (MBI)-A Novel Imputation Measure for Imputation of Missing Values
in Medical Datasets,” is written by B. Mathura Bai, N. Mangathayaru, B. Padmaja Rani, and …

[PDF][PDF] Intelligent Systems with Applications

MU Hossain, MA Rahman, MM Islam, A Akhter… - 2022 - researchgate.net
abstract Recently, the number of road accidents has been increased worldwide due to the
distraction of the drivers. This rapid road crush often leads to injuries, loss of properties …

Exploration on Malicious Encrypted Traffic Classification Based on Deep Learning

K Cheng, R Qiu, L Li, L Liang, T Liu… - 2023 International …, 2023 - ieeexplore.ieee.org
In recent years, encrypted traffic has become the main means of network attacks, especially
the use of encrypted traffic for network attacks is becoming increasingly common. In real life …