Machine learning for anomaly detection: A systematic review

AB Nassif, MA Talib, Q Nasir, FM Dakalbab - Ieee Access, 2021 - ieeexplore.ieee.org
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …

Performance comparison of intrusion detection systems and application of machine learning to Snort system

SAR Shah, B Issac - Future Generation Computer Systems, 2018 - Elsevier
This study investigates the performance of two open source intrusion detection systems
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …

Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms

E Altulaihan, MA Almaiah, A Aljughaiman - Sensors, 2024 - mdpi.com
Widespread and ever-increasing cybersecurity attacks against Internet of Things (IoT)
systems are causing a wide range of problems for individuals and organizations. The IoT is …

[HTML][HTML] An intrusion detection model based on a convolutional neural network

J Kim, Y Shin, E Choi - Journal of Multimedia Information System, 2019 - jmis.org
Abstract Machine-learning techniques have been actively employed to information security
in recent years. Traditional rule-based security solutions are vulnerable to advanced attacks …

Enhancing intrusion detection with feature selection and neural network

C Wu, W Li - International Journal of Intelligent Systems, 2021 - Wiley Online Library
Intrusion detection systems are widely implemented to protect computer networks from
threats. To identify unknown attacks, many machine learning algorithms like neural networks …

Machine‐learning approach to optimize smote ratio in class imbalance dataset for intrusion detection

JH Seo, YH Kim - Computational intelligence and …, 2018 - Wiley Online Library
The KDD CUP 1999 intrusion detection dataset was introduced at the third international
knowledge discovery and data mining tools competition, and it has been widely used for …

Effects of machine learning approach in flow-based anomaly detection on software-defined networking

SK Dey, MM Rahman - Symmetry, 2019 - mdpi.com
Recent advancements in software-defined networking (SDN) make it possible to overcome
the management challenges of traditional networks by logically centralizing the control …

Machine-learning-based feature selection techniques for large-scale network intrusion detection

OY Al-Jarrah, A Siddiqui… - 2014 IEEE 34th …, 2014 - ieeexplore.ieee.org
Nowadays, we see more and more cyber-attacks on major Internet sites and enterprise
networks. Intrusion Detection System (IDS) is a critical component of such infrastructure …

[PDF][PDF] Comprehensive Review on Intrusion Detection System and Techniques

D Kumar, RA Singh - … Solutions towards fulfilment of Social Needs …, 2018 - academia.edu
Intrusion detection system (IDS) is an important component to maintain network security. As
network applications grow rapidly, network security mechanisms require more attention to …

BlockCSDN: towards blockchain-based collaborative intrusion detection in software defined networking

W Li, Y Wang, W Meng, J Li, C Su - IEICE TRANSACTIONS on …, 2022 - search.ieice.org
To safeguard critical services and assets in a distributed environment, collaborative intrusion
detection systems (CIDSs) are usually adopted to share necessary data and information …