iNIDS: SWOT Analysis and TOWS Inferences of State-of-the-Art NIDS solutions for the development of Intelligent Network Intrusion Detection System

J Verma, A Bhandari, G Singh - Computer communications, 2022‏ - Elsevier
Introduction: The growth of ubiquitous networked devices and the proliferation of
geographically dispersed 'Internet of Thing'devices have exponentially increased network …

Firefly algorithm based feature selection for network intrusion detection

B Selvakumar, K Muneeswaran - Computers & Security, 2019‏ - Elsevier
Network intrusion detection is the process of identifying malicious activity in a network by
analyzing the network traffic behavior. Data mining techniques are widely used in Intrusion …

An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment

R SaiSindhuTheja, GK Shyam - Applied Soft Computing, 2021‏ - Elsevier
Abstract Detection of Denial of Service (DoS) attack is one of the most critical issues in cloud
computing. The attack detection framework is very complex due to the nonlinear thought of …

Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks

S Subramani, M Selvi - Optik, 2023‏ - Elsevier
Abstract Internet of Things (IoT) utilization is increasing every day in both industry and other
applications recently. However, the IoT communication is under security threats from …

An efficient feature selection based Bayesian and Rough set approach for intrusion detection

M Prasad, S Tripathi, K Dahal - Applied Soft Computing, 2020‏ - Elsevier
The exponential growth of network size leads to increase attacks and intrusions. Detection of
these attacks from the network has turned into a noteworthy issue of security. An intrusion …

A dual-isolation-forests-based attack detection framework for industrial control systems

M Elnour, N Meskin, K Khan, R Jain - IEEE Access, 2020‏ - ieeexplore.ieee.org
The cybersecurity of industrial control systems (ICSs) is becoming increasingly critical under
the current advancement in the cyber activity and the Internet of Things (IoT) technologies …

Medical diagnosis of cardiovascular diseases using an interval-valued fuzzy rule-based classification system

JA Sanz, M Galar, A Jurio, A Brugos, M Pagola… - Applied Soft …, 2014‏ - Elsevier
Objective To develop a classifier that tackles the problem of determining the risk of a patient
of suffering from a cardiovascular disease within the next 10 years. The system has to …

Investigating brute force attack patterns in IoT network

D Stiawan, MY Idris, RF Malik… - Journal of Electrical …, 2019‏ - Wiley Online Library
Internet of Things (IoT) devices may transfer data to the gateway/application server through
File Transfer Protocol (FTP) transaction. Unfortunately, in terms of security, the FTP server at …

[PDF][PDF] A survey on intrusion detection system: State of the art review

J Amudhavel, V Brindha… - Indian Journal …, 2016‏ - sciresol.s3.us-east-2.amazonaws …
Abstract Background/Objectives: To analyze and monitoring the activity of nodes using an
IDS Intrusion Detection System which provide security to the system. Findings: In this …

Constructing important features from massive network traffic for lightweight intrusion detection

W Wang, Y He, J Liu, S Gombault - IET Information Security, 2015‏ - Wiley Online Library
Efficiently processing massive data is a big issue in high‐speed network intrusion detection,
as network traffic has become increasingly large and complex. In this work, instead of …