Fusion of linear and non-linear dimensionality reduction techniques for feature reduction in LSTM-based Intrusion Detection System

A Thakkar, N Kikani, R Geddam - Applied Soft Computing, 2024 - Elsevier
Securing networks is becoming increasingly crucial due to the widespread use of
information technology. Intrusion Detection System (IDS) plays a crucial role in network …

Pythagorean fuzzy sets-based vikor and topsis-based multi-criteria decision-making model for mitigating resource deletion attacks in wsns

S Madhavi, NC Santhosh, S Rajkumar… - Journal of Intelligent …, 2023 - content.iospress.com
Abstract In Wireless Sensor Networks (WSNs), resource depletion attacks that focusses on
the compromization of routing protocol layer is identified to facilitate a major influence over …

Spark-based multi-verse optimizer as wrapper features selection algorithm for phishing attack challenge

J Al-Sawwa, M Almseidin, M Alkasassbeh… - Cluster …, 2024 - Springer
Nowadays, phishing attacks have grown rapidly, and there is an urgent need to introduce a
suitable detection method that has the ability to detect different types of phishing attacks …

DT-ARO: decision tree-based artificial rabbits optimization to mitigate IoT botnet exploitation

M Almseidin, J Al-Sawwa, M Alkasassbeh… - Journal of Network and …, 2024 - Springer
The rapid growth of Artificial Intelligence (AI) algorithms has created the opportunity to solve
complex problems such as Internet of Things (IoT) botnet attacks. The severity of IoT botnet …

[PDF][PDF] Multi-step attack detection in industrial networks using a hybrid deep learning architecture

MH Jamal, MA Khan, S Ullah, MS Alshehri… - Mathematical …, 2023 - aimspress.com
In recent years, the industrial network has seen a number of high-impact attacks. To counter
these threats, several security systems have been implemented to detect attacks on …

[HTML][HTML] An accurate detection approach for IoT botnet attacks using interpolation reasoning method

M Almseidin, M Alkasassbeh - Information, 2022 - mdpi.com
Nowadays, the rapid growth of technology delivers many new concepts and notations that
aim to increase the efficiency and comfort of human life. One of these techniques is the …

[HTML][HTML] An optimized ensemble model with advanced feature selection for network intrusion detection

A Ahmed, M Asim, I Ullah, AA Ateya - PeerJ Computer Science, 2024 - peerj.com
In today's digital era, advancements in technology have led to unparalleled levels of
connectivity, but have also brought forth a new wave of cyber threats. Network Intrusion …

Attention-based RNN architecture for detecting multi-step cyber-attack using PSO metaheuristic

PB Udas, KS Roy, ME Karim… - … Conference on Electrical …, 2023 - ieeexplore.ieee.org
In recent years, the intensive usage of electronic devices called for a greater threat to
preventing a massive volume of information generated by billions of users every second …

An early detection model for kerberoasting attacks and dataset labeling

R Younisse, M Alkasassbeh… - Jordanian Journal of …, 2023 - search.proquest.com
The wild nature of humans has become civilized and the weapons they use to attack each
other are now digitized. Security over the Internet usually takes a defensive shape, aiming to …

[PDF][PDF] New strategies for improving network security against cyber attack based on intelligent algorithms

MZ Abdullah, AK Jassim, FN Hummadi… - Journal of Engineering …, 2024 - iasj.net
Gradually, since the number of linked computer systems that use networks linked to the
Internet is raised the information that is delivered through those systems becomes more …