Comparative analysis of intrusion detection systems and machine learning-based model analysis through decision tree

Z Azam, MM Islam, MN Huda - IEEE Access, 2023 - ieeexplore.ieee.org
Cyber-attacks pose increasing challenges in precisely detecting intrusions, risking data
confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a …

A survey of public IoT datasets for network security research

F De Keersmaeker, Y Cao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Publicly available datasets are an indispensable tool for researchers, as they allow testing
new algorithms on a wide range of different scenarios and making scientific experiments …

[HTML][HTML] Recursive feature elimination with cross-validation with decision tree: Feature selection method for machine learning-based intrusion detection systems

M Awad, S Fraihat - Journal of Sensor and Actuator Networks, 2023 - mdpi.com
The frequency of cyber-attacks on the Internet of Things (IoT) networks has significantly
increased in recent years. Anomaly-based network intrusion detection systems (NIDSs) offer …

[HTML][HTML] Ensuring network security with a robust intrusion detection system using ensemble-based machine learning

MA Hossain, MS Islam - Array, 2023 - Elsevier
Intrusion detection is a critical aspect of network security to protect computer systems from
unauthorized access and attacks. The capacity of traditional intrusion detection systems …

Anomal-E: A self-supervised network intrusion detection system based on graph neural networks

E Caville, WW Lo, S Layeghy, M Portmann - Knowledge-based systems, 2022 - Elsevier
This paper investigates graph neural networks (GNNs) applied for self-supervised intrusion
and anomaly detection in computer networks. GNNs are a deep learning approach for graph …

Graph neural networks for intrusion detection: A survey

T Bilot, N El Madhoun, K Al Agha, A Zouaoui - IEEE Access, 2023 - ieeexplore.ieee.org
Cyberattacks represent an ever-growing threat that has become a real priority for most
organizations. Attackers use sophisticated attack scenarios to deceive defense systems in …

[HTML][HTML] Classification and explanation for intrusion detection system based on ensemble trees and SHAP method

TTH Le, H Kim, H Kang, H Kim - Sensors, 2022 - mdpi.com
In recent years, many methods for intrusion detection systems (IDS) have been designed
and developed in the research community, which have achieved a perfect detection rate …

A tree classifier based network intrusion detection model for Internet of Medical Things

K Gupta, DK Sharma, KD Gupta, A Kumar - Computers and Electrical …, 2022 - Elsevier
Healthcare is one of the key areas of prospect for the Internet of Things (IoT). To facilitate
better medical services, enormous growth in the field of the Internet of Medical Things (IoMT) …

Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures

IA Kandhro, SM Alanazi, F Ali, A Kehar, K Fatima… - IEEE …, 2023 - ieeexplore.ieee.org
Computer viruses, malicious, and other hostile attacks can affect a computer network.
Intrusion detection is a key component of network security as an active defence technology …

An ensemble learning based intrusion detection model for industrial IoT security

M Mohy-Eddine, A Guezzaz… - Big Data Mining and …, 2023 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) represents the expansion of the Internet of Things (IoT) in
industrial sectors. It is designed to implicate embedded technologies in manufacturing fields …