Network intrusion detection system: A systematic study of machine learning and deep learning approaches

Z Ahmad, A Shahid Khan, C Wai Shiang… - Transactions on …, 2021 - Wiley Online Library
The rapid advances in the internet and communication fields have resulted in a huge
increase in the network size and the corresponding data. As a result, many novel attacks are …

Comparative analysis of intrusion detection systems and machine learning-based model analysis through decision tree

Z Azam, MM Islam, MN Huda - IEEE Access, 2023 - ieeexplore.ieee.org
Cyber-attacks pose increasing challenges in precisely detecting intrusions, risking data
confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a …

Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study

MA Ferrag, L Maglaras, S Moschoyiannis… - Journal of Information …, 2020 - Elsevier
In this paper, we present a survey of deep learning approaches for cyber security intrusion
detection, the datasets used, and a comparative study. Specifically, we provide a review of …

Deep learning for anomaly detection: A survey

R Chalapathy, S Chawla - arxiv preprint arxiv:1901.03407, 2019 - arxiv.org
Anomaly detection is an important problem that has been well-studied within diverse
research areas and application domains. The aim of this survey is two-fold, firstly we present …

A survey of network-based intrusion detection data sets

M Ring, S Wunderlich, D Scheuring, D Landes… - Computers & …, 2019 - Elsevier
Labeled data sets are necessary to train and evaluate anomaly-based network intrusion
detection systems. This work provides a focused literature survey of data sets for network …

Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats

Z Chen, J Liu, Y Shen, M Simsek, B Kantarci… - ACM Computing …, 2022 - dl.acm.org
Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …

FedMCCS: Multicriteria client selection model for optimal IoT federated learning

S AbdulRahman, H Tout, A Mourad… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
As an alternative centralized systems, which may prevent data to be stored in a central
repository due to its privacy and/or abundance, federated learning (FL) is nowadays a game …

Unsupervised anomaly detection via variational auto-encoder for seasonal kpis in web applications

H Xu, W Chen, N Zhao, Z Li, J Bu, Z Li, Y Liu… - Proceedings of the …, 2018 - dl.acm.org
To ensure undisrupted business, large Internet companies need to closely monitor various
KPIs (eg, Page Views, number of online users, and number of orders) of its Web …

A survey on data-driven network intrusion detection

D Chou, M Jiang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Data-driven network intrusion detection (NID) has a tendency towards minority attack
classes compared to normal traffic. Many datasets are collected in simulated environments …

Anomaly detection in streams with extreme value theory

A Siffer, PA Fouque, A Termier, C Largouet - Proceedings of the 23rd …, 2017 - dl.acm.org
Anomaly detection in time series has attracted considerable attention due to its importance
in many real-world applications including intrusion detection, energy management and …