Building a cloud-IDS by hybrid bio-inspired feature selection algorithms along with random forest model

M Bakro, RR Kumar, M Husain, Z Ashraf, A Ali… - IEEE …, 2024 - ieeexplore.ieee.org
The adoption of cloud computing has become increasingly widespread across various
domains. However, the inherent security vulnerabilities of cloud computing pose significant …

Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature

R Saadouni, C Gherbi, Z Aliouat, Y Harbi, A Khacha - Cluster Computing, 2024 - Springer
Recent technological advancements have significantly expanded both networks and data,
thereby introducing new forms of attacks that pose considerable challenges to intrusion …

[HTML][HTML] Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security

NO Aljehane, HA Mengash, MM Eltahir… - Alexandria Engineering …, 2024 - Elsevier
Network security is essential to our daily communications and networks. Cybersecurity
researchers initiate the significance of emerging proficient network intrusion detection …

A comprehensive survey on intrusion detection algorithms

Y Li, Z Li, M Li - Computers and Electrical Engineering, 2025 - Elsevier
Although there are many reviews on Intrusion Detection Systems (IDS), the basic parts of
Intrusion Detection Algorithms (IDA), such as imbalanced datasets, feature engineering, and …

Performance metrics of an intrusion detection system through Window-Based Deep Learning models

F Isiaka - Journal of Data Science and Intelligent Systems, 2024 - ojs.bonviewpress.com
Intrusion and prevention technologies perform reliably in harsh conditions by fortifying many
of the world's highest security sites with few defects in high performance. This paper aims to …

Extended Fuzzy Neutrosophic Classifier for Accurate Intrusion Detection and Classification.

M Elhoseny, M Abdel-salam… - International Journal of …, 2024 - search.ebscohost.com
Intrusion Detection is crucial in contemporary cybersecurity landscapes to proactively thwart
and identify possible threats. The risk of data breaches, malicious activities, and …

Machine learning based network intrusion detection optimization for cloud computing environments

JK Samriya, S Kumar, M Kumar, H Wu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Cloud computing is an emerging choice among businesses all over the world since it
provides flexible and world wide web computer capabilities as a customizable service …

Metaheuristic assisted hybrid deep classifiers for intrusion detection: a bigdata perspective

L Madhuridevi, NVS Sree Rathna Lakshmi - Wireless Networks, 2024 - Springer
The growth of social networks and cloud computing has resulted in the production of
enormous amounts of data, which poses significant challenges for intrusion detection …

Domain knowledge free cloud-IDS with lightweight embedding method

Y Kim, G Park, HK Kim - Journal of Cloud Computing, 2024 - Springer
The expansion of the cloud computing market has provided a breakthrough in efficiently
storing and managing data for individuals and companies. As personal and corporate data …

Improving Performance of Intrusion Detection Using ALO Selected Features and GRU Network

K Sundaram, S Subramanian, Y Natarajan… - SN Computer …, 2023 - Springer
The expansion of the internet has not only opened up new possibilities for cooperation,
networking, and ingenuity, but also presented fresh security hazards and complexities. As …