A critical review of artificial intelligence based approaches in intrusion detection: A comprehensive analysis

S Muneer, U Farooq, A Athar… - Journal of …, 2024‏ - Wiley Online Library
Intrusion detection (ID) is critical in securing computer networks against various malicious
attacks. Recent advancements in machine learning (ML), deep learning (DL), federated …

Machine learning for cloud security: a systematic review

AB Nassif, MA Talib, Q Nasir, H Albadani… - IEEE …, 2021‏ - ieeexplore.ieee.org
The popularity and usage of Cloud computing is increasing rapidly. Several companies are
investing in this field either for their own use or to provide it as a service for others. One of …

Intrusion detection system for IoT based on deep learning and modified reptile search algorithm

A Dahou, M Abd Elaziz, SA Chelloug… - Computational …, 2022‏ - Wiley Online Library
This study proposes a novel framework to improve intrusion detection system (IDS)
performance based on the data collected from the Internet of things (IoT) environments. The …

[HTML][HTML] Advanced feature extraction and selection approach using deep learning and Aquila optimizer for IoT intrusion detection system

A Fatani, A Dahou, MAA Al-Qaness, S Lu, MA Elaziz - Sensors, 2021‏ - mdpi.com
Develo** cyber security is very necessary and has attracted considerable attention from
academy and industry organizations worldwide. It is also very necessary to provide …

IoT intrusion detection system using deep learning and enhanced transient search optimization

A Fatani, M Abd Elaziz, A Dahou, MAA Al-Qaness… - IEEe …, 2021‏ - ieeexplore.ieee.org
The great advancements in communication, cloud computing, and the internet of things (IoT)
have opened critical challenges in security. With these developments, cyberattacks are also …

Performance comparison of intrusion detection systems and application of machine learning to Snort system

SAR Shah, B Issac - Future Generation Computer Systems, 2018‏ - Elsevier
This study investigates the performance of two open source intrusion detection systems
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …

Enhancing intrusion detection systems for IoT and cloud environments using a growth optimizer algorithm and conventional neural networks

A Fatani, A Dahou, M Abd Elaziz, MAA Al-Qaness, S Lu… - Sensors, 2023‏ - mdpi.com
Intrusion detection systems (IDS) play a crucial role in securing networks and identifying
malicious activity. This is a critical problem in cyber security. In recent years, metaheuristic …

Intrusion detection techniques in cloud environment: A survey

P Mishra, ES Pilli, V Varadharajan… - Journal of Network and …, 2017‏ - Elsevier
Security is of paramount importance in this new era of on-demand Cloud Computing.
Researchers have provided a survey on several intrusion detection techniques for detecting …

Voting extreme learning machine based distributed denial of service attack detection in cloud computing

GS Kushwah, V Ranga - Journal of Information Security and Applications, 2020‏ - Elsevier
Distributed denial of service attack is one of the most dangerous attacks in cloud computing.
This attack makes the cloud services inaccessible to the end-users by exhausting resources …

Distributed intrusion detection system for cloud environments based on data mining techniques

M Idhammad, K Afdel, M Belouch - Procedia Computer Science, 2018‏ - Elsevier
Nearly two decades after its emergence, the Cloud Computing remains gaining traction
among organizations and individual users. Many security issues arise with the transition to …