Machine learning for anomaly detection: A systematic review
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …
components from data. Many techniques have been used to detect anomalies. One of the …
Performance comparison of intrusion detection systems and application of machine learning to Snort system
SAR Shah, B Issac - Future Generation Computer Systems, 2018 - Elsevier
This study investigates the performance of two open source intrusion detection systems
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …
Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms
Widespread and ever-increasing cybersecurity attacks against Internet of Things (IoT)
systems are causing a wide range of problems for individuals and organizations. The IoT is …
systems are causing a wide range of problems for individuals and organizations. The IoT is …
[HTML][HTML] An intrusion detection model based on a convolutional neural network
Abstract Machine-learning techniques have been actively employed to information security
in recent years. Traditional rule-based security solutions are vulnerable to advanced attacks …
in recent years. Traditional rule-based security solutions are vulnerable to advanced attacks …
Enhancing intrusion detection with feature selection and neural network
C Wu, W Li - International Journal of Intelligent Systems, 2021 - Wiley Online Library
Intrusion detection systems are widely implemented to protect computer networks from
threats. To identify unknown attacks, many machine learning algorithms like neural networks …
threats. To identify unknown attacks, many machine learning algorithms like neural networks …
Machine‐learning approach to optimize smote ratio in class imbalance dataset for intrusion detection
The KDD CUP 1999 intrusion detection dataset was introduced at the third international
knowledge discovery and data mining tools competition, and it has been widely used for …
knowledge discovery and data mining tools competition, and it has been widely used for …
Effects of machine learning approach in flow-based anomaly detection on software-defined networking
Recent advancements in software-defined networking (SDN) make it possible to overcome
the management challenges of traditional networks by logically centralizing the control …
the management challenges of traditional networks by logically centralizing the control …
Machine-learning-based feature selection techniques for large-scale network intrusion detection
Nowadays, we see more and more cyber-attacks on major Internet sites and enterprise
networks. Intrusion Detection System (IDS) is a critical component of such infrastructure …
networks. Intrusion Detection System (IDS) is a critical component of such infrastructure …
[PDF][PDF] Comprehensive Review on Intrusion Detection System and Techniques
Intrusion detection system (IDS) is an important component to maintain network security. As
network applications grow rapidly, network security mechanisms require more attention to …
network applications grow rapidly, network security mechanisms require more attention to …
BlockCSDN: towards blockchain-based collaborative intrusion detection in software defined networking
To safeguard critical services and assets in a distributed environment, collaborative intrusion
detection systems (CIDSs) are usually adopted to share necessary data and information …
detection systems (CIDSs) are usually adopted to share necessary data and information …