Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges

G Kocher, G Kumar - Soft Computing, 2021 - Springer
Deep learning (DL) is gaining significant prevalence in every field of study due to its
domination in training large data sets. However, several applications are utilizing machine …

A taxonomy and survey of intrusion detection system design techniques, network threats and datasets

H Hindy, D Brosset, E Bayne, A Seeam, C Tachtatzis… - 2018 - strathprints.strath.ac.uk
With the world moving towards being increasingly dependent on computers and automation,
one of the main challenges in the current decade has been to build secure applications …

TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT

K Lin, X Xu, H Gao - Computer Networks, 2021 - Elsevier
Abstract In the Industrial Internet of Things (IIoT) in the 5G era, the growth of smart devices
will generate a large amount of data traffic, bringing a huge challenge of network traffic …

A taxonomy of network threats and the effect of current datasets on intrusion detection systems

H Hindy, D Brosset, E Bayne, AK Seeam… - IEEe …, 2020 - ieeexplore.ieee.org
As the world moves towards being increasingly dependent on computers and automation,
building secure applications, systems and networks are some of the main challenges faced …

A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020 - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …

Encrypted traffic classification with a convolutional long short-term memory neural network

Z Zou, J Ge, H Zheng, Y Wu, C Han… - 2018 IEEE 20th …, 2018 - ieeexplore.ieee.org
With the rapidly emerging encryption techniques for network traffic, the classification of
encrypted traffic has increasingly become significantly important in network management …

[HTML][HTML] Outlier detection strategies for WSNs: A survey

B Chander, G Kumaravelan - Journal of King Saud University-Computer …, 2022 - Elsevier
Abstract Wireless Sensor Networks (WSNs) are developed significantly from the last
decades and attracted the attention of scientific and industrial domains. In WSNs, sensor …

A new hybrid machine learning for cybersecurity threat detection based on adaptive boosting

P Sornsuwit, S Jaiyen - Applied Artificial Intelligence, 2019 - Taylor & Francis
ABSTRACT A hybrid machine learning is a combination of multiple types of machine
learning algorithms for improving the performance of single classifiers. Currently, cyber …

Darknet traffic analysis: A systematic literature review

J Saleem, R Islam, Z Islam - IEEE Access, 2024 - ieeexplore.ieee.org
The primary objective of an anonymity tool is to protect the anonymity of its users through the
implementation of strong encryption and obfuscation techniques. As a result, it becomes …

A novel traffic classifier with attention mechanism for industrial internet of things

R Zhao, Y Huang, X Deng, Y Shi, J Li… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
With the development of the Industrial Internet of Things (IIoT), the complex traffic generated
by large-scale IIoT devices presents challenges for traffic analysis. Most of existing deep …