A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions

A Thakkar, R Lohiya - Artificial Intelligence Review, 2022 - Springer
With the increase in the usage of the Internet, a large amount of information is exchanged
between different communicating devices. The data should be communicated securely …

A comprehensive review on Internet of Things application placement in Fog computing environment

HK Apat, R Nayak, B Sahoo - Internet of Things, 2023 - Elsevier
With the rise in Internet of Things (IoT) technology in recent years the amount of resource
requirement of various IoT applications substantially increases. The data generated by …

Characterization of tor traffic using time based features

AH Lashkari, GD Gil, MSI Mamun… - … on Information Systems …, 2017 - scitepress.org
Traffic classification has been the topic of many research efforts, but the quick evolution of
Internet services and the pervasive use of encryption makes it an open challenge …

Data mining and machine learning methods for sustainable smart cities traffic classification: A survey

M Shafiq, Z Tian, AK Bashir, A Jolfaei, X Yu - Sustainable Cities and …, 2020 - Elsevier
This survey paper describes the significant literature survey of Sustainable Smart Cities
(SSC), Machine Learning (ML), Data Mining (DM), datasets, feature extraction and selection …

[PDF][PDF] Characterization of encrypted and vpn traffic using time-related

G Draper-Gil, AH Lashkari, MSI Mamun… - Proceedings of the …, 2016 - scitepress.org
Traffic characterization is one of the major challenges in today's security industry. The
continuous evolution and generation of new applications and services, together with the …

When machine learning meets privacy in 6G: A survey

Y Sun, J Liu, J Wang, Y Cao… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
The rapid-develo** Artificial Intelligence (AI) technology, fast-growing network traffic, and
emerging intelligent applications (eg, autonomous driving, virtual reality, etc.) urgently …

Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

A survey of methods for encrypted traffic classification and analysis

P Velan, M Čermák, P Čeleda… - International Journal of …, 2015 - Wiley Online Library
With the widespread use of encrypted data transport, network traffic encryption is becoming
a standard nowadays. This presents a challenge for traffic measurement, especially for …

Explainable AI-based DDOS attack identification method for IoT networks

CS Kalutharage, X Liu, C Chrysoulas, N Pitropakis… - Computers, 2023 - mdpi.com
The modern digitized world is mainly dependent on online services. The availability of
online systems continues to be seriously challenged by distributed denial of service (DDoS) …

A survey on big data for network traffic monitoring and analysis

A D'Alconzo, I Drago, A Morichetta… - … on Network and …, 2019 - ieeexplore.ieee.org
Network Traffic Monitoring and Analysis (NTMA) represents a key component for network
management, especially to guarantee the correct operation of large-scale networks such as …