Machine learning for anomaly detection: A systematic review

AB Nassif, MA Talib, Q Nasir, FM Dakalbab - Ieee Access, 2021 - ieeexplore.ieee.org
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …

A survey of distance and similarity measures used within network intrusion anomaly detection

DJ Weller-Fahy, BJ Borghetti… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Anomaly detection (AD) use within the network intrusion detection field of research, or
network intrusion AD (NIAD), is dependent on the proper use of similarity and distance …

Network anomaly detection with the restricted Boltzmann machine

U Fiore, F Palmieri, A Castiglione, A De Santis - Neurocomputing, 2013 - Elsevier
With the rapid growth and the increasing complexity of network infrastructures and the
evolution of attacks, identifying and preventing network abuses is getting more and more …

A scalable distributed machine learning approach for attack detection in edge computing environments

R Kozik, M Choraś, M Ficco, F Palmieri - Journal of Parallel and Distributed …, 2018 - Elsevier
The ever-increasing number of IoT applications and cyber–physical services is introducing
significant challenges associated to their cyber-security. Due to the constrained nature of the …

A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks

A Karami, M Guerrero-Zapata - Neurocomputing, 2015 - Elsevier
Abstract In Content-Centric Networks (CCNs) as a possible future Internet, new kinds of
attacks and security challenges–from Denial of Service (DoS) to privacy attacks–will arise …

Hybrid of binary gravitational search algorithm and mutual information for feature selection in intrusion detection systems

H Bostani, M Sheikhan - Soft computing, 2017 - Springer
Intrusion detection systems (IDSs) play an important role in the security of computer
networks. One of the main challenges in IDSs is the high-dimensional input data analysis …

Internet attacks and intrusion detection system: A review of the literature

R Singh, H Kumar, RK Singla, RR Ketti - Online Information Review, 2017 - emerald.com
Purpose The paper addresses various cyber threats and their effects on the internet. A
review of the literature on intrusion detection systems (IDSs) as a means of mitigating …

A study on intrusion detection using neural networks trained with evolutionary algorithms

T Dash - Soft Computing, 2017 - Springer
Intrusion detection has been playing a crucial role for making a computer network secure for
any transaction. An intrusion detection system (IDS) detects various types of malicious …

A distributed approach to network anomaly detection based on independent component analysis

F Palmieri, U Fiore, A Castiglione - … and Computation: Practice …, 2014 - Wiley Online Library
Network anomalies, circumstances in which the network behavior deviates from its normal
operational baseline, can be due to various factors such as network overload conditions …

Predicting e-commerce company success by mining the text of its publicly-accessible website

D Thorleuchter, D Van den Poel - Expert Systems with Applications, 2012 - Elsevier
We analyze the impact of textual information from e-commerce companies' websites on their
commercial success. The textual information is extracted from web content of e-commerce …