Intrusion detection by machine learning: A review

CF Tsai, YF Hsu, CY Lin, WY Lin - expert systems with applications, 2009 - Elsevier
The popularity of using Internet contains some risks of network attacks. Intrusion detection is
one major research problem in network security, whose aim is to identify unusual access or …

An overview of anomaly detection techniques: Existing solutions and latest technological trends

A Patcha, JM Park - Computer networks, 2007 - Elsevier
As advances in networking technology help to connect the distant corners of the globe and
as the Internet continues to expand its influence as a medium for communications and …

GRU-based deep learning approach for network intrusion alert prediction

MS Ansari, V Bartoš, B Lee - Future Generation Computer Systems, 2022 - Elsevier
The exponential growth in the number of cyber attacks in the recent past has necessitated
active research on network intrusion detection, prediction and mitigation systems. While …

Data preprocessing for anomaly based network intrusion detection: A review

JJ Davis, AJ Clark - computers & security, 2011 - Elsevier
Data preprocessing is widely recognized as an important stage in anomaly detection. This
paper reviews the data preprocessing techniques used by anomaly-based network intrusion …

A review of network traffic analysis and prediction techniques

M Joshi, TH Hadi - arxiv preprint arxiv:1507.05722, 2015 - arxiv.org
Analysis and prediction of network traffic has applications in wide comprehensive set of
areas and has newly attracted significant number of studies. Different kinds of experiments …

[PDF][PDF] Performance of machine learning techniques in anomaly detection with basic feature selection strategy-a network intrusion detection system

MB Pranto, MHA Ratul, MM Rahman, IJ Diya, ZB Zahir - J. Adv. Inf. Technol, 2022 - jait.us
With the proliferation of internet users around the world, it is becoming imperative to make
communications safer than before. A network intrusion detection system is pivotal for …

A few-shot deep learning approach for improved intrusion detection

MMU Chowdhury, F Hammond… - 2017 IEEE 8th …, 2017 - ieeexplore.ieee.org
Our generation has seen the boom and ubiquitous advent of Internet connectivity.
Adversaries have been exploiting this omnipresent connectivity as an opportunity to launch …

Transformer-based framework for alert aggregation and attack prediction in a multi-stage attack

W Wang, P Yi, J Jiang, P Zhang, X Chen - Computers & Security, 2024 - Elsevier
In recent years, the growing threat of cyber attacks has made more researchers focus on the
study of alert correlation and attack prediction. While numerous solutions have been …

Improving the intrusion detection system for NSL-KDD dataset based on PCA-fuzzy clustering-KNN

H Benaddi, K Ibrahimi… - 2018 6th International …, 2018 - ieeexplore.ieee.org
Nowadays, information security is extremely critical issues for every organization to protect
information from the useless data on the manipulation of network traffic or intrusion. Intrusion …

Big data analytics for credit card fraud detection using supervised machine learning models

YK Saheed, UA Baba, MA Raji - Big data analytics in the insurance …, 2022 - emerald.com
Purpose: This chapter aims to examine machine learning (ML) models for predicting credit
card fraud (CCF). Need for the study: With the advance of technology, the world is …