Supervised feature selection techniques in network intrusion detection: A critical review
Abstract Machine Learning (ML) techniques are becoming an invaluable support for network
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …
Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives
This paper provides a comprehensive survey of anomaly detection for the Internet of Things
(IoT). Anomaly detection poses numerous challenges in IoT, with broad applications …
(IoT). Anomaly detection poses numerous challenges in IoT, with broad applications …
CICIDS-2017 dataset feature analysis with information gain for anomaly detection
Feature selection (FS) is one of the important tasks of data preprocessing in data analytics.
The data with a large number of features will affect the computational complexity, increase a …
The data with a large number of features will affect the computational complexity, increase a …
Deep learning approach combining sparse autoencoder with SVM for network intrusion detection
Network intrusion detection systems (NIDSs) provide a better solution to network security
than other traditional network defense technologies, such as firewall systems. The success …
than other traditional network defense technologies, such as firewall systems. The success …
Performance comparison of intrusion detection systems and application of machine learning to Snort system
SAR Shah, B Issac - Future Generation Computer Systems, 2018 - Elsevier
This study investigates the performance of two open source intrusion detection systems
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …
Ai-based two-stage intrusion detection for software defined iot networks
Software defined Internet of Things (SD-IoT) networks profit from centralized management
and interactive resource sharing, which enhances the efficiency and scalability of Internet of …
and interactive resource sharing, which enhances the efficiency and scalability of Internet of …
An improved intrusion detection algorithm based on GA and SVM
P Tao, Z Sun, Z Sun - Ieee Access, 2018 - ieeexplore.ieee.org
In the era of big data, with the increasing number of audit data features, human-centered
smart intrusion detection system performance is decreasing in training time and …
smart intrusion detection system performance is decreasing in training time and …
An improved feature selection algorithm based on ant colony optimization
H Peng, C Ying, S Tan, B Hu, Z Sun - Ieee Access, 2018 - ieeexplore.ieee.org
The diversity and complexity of network data bring great challenges to data classification
technology. Feature selection has always been an important and difficult problem in …
technology. Feature selection has always been an important and difficult problem in …
Role of swarm and evolutionary algorithms for intrusion detection system: A survey
The growth of data and categories of attacks, demand the use of Intrusion Detection System
(IDS) effectively using Machine Learning (ML) and Deep Learning (DL) techniques. Apart …
(IDS) effectively using Machine Learning (ML) and Deep Learning (DL) techniques. Apart …
Taurus: a data plane architecture for per-packet ML
Emerging applications---cloud computing, the internet of things, and augmented/virtual
reality---demand responsive, secure, and scalable datacenter networks. These networks …
reality---demand responsive, secure, and scalable datacenter networks. These networks …