Survey of intrusion detection systems: techniques, datasets and challenges

A Khraisat, I Gondal, P Vamplew, J Kamruzzaman - Cybersecurity, 2019 - Springer
Cyber-attacks are becoming more sophisticated and thereby presenting increasing
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …

A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

A Khraisat, A Alazab - Cybersecurity, 2021 - Springer
Abstract The Internet of Things (IoT) has been rapidly evolving towards making a greater
impact on everyday life to large industrial systems. Unfortunately, this has attracted the …

TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system

BA Tama, M Comuzzi, KH Rhee - IEEE access, 2019 - ieeexplore.ieee.org
Intrusion detection systems (IDSs) play a pivotal role in computer security by discovering
and repealing malicious activities in computer networks. Anomaly-based IDS, in particular …

A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks

A Khraisat, I Gondal, P Vamplew, J Kamruzzaman… - Electronics, 2019 - mdpi.com
The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on
everyday life to large industrial systems. Unfortunately, this has attracted the attention of …

Anomaly-based intrusion detection system for IoT application

M Bhavsar, K Roy, J Kelly, O Olusola - Discover Internet of things, 2023 - Springer
Abstract Internet-of-Things (IoT) connects various physical objects through the Internet and it
has a wide application, such as in transportation, military, healthcare, agriculture, and many …

5g-nidd: A comprehensive network intrusion detection dataset generated over 5g wireless network

S Samarakoon, Y Siriwardhana, P Porambage… - arxiv preprint arxiv …, 2022 - arxiv.org
With a plethora of new connections, features, and services introduced, the 5th generation
(5G) wireless technology reflects the development of mobile communication networks and is …

Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one class support vector machine

A Khraisat, I Gondal, P Vamplew, J Kamruzzaman… - Electronics, 2020 - mdpi.com
Cyberttacks are becoming increasingly sophisticated, necessitating the efficient intrusion
detection mechanisms to monitor computer resources and generate reports on anomalous …

Toward effective intrusion detection using log-cosh conditional variational autoencoder

X Xu, J Li, Y Yang, F Shen - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Intrusion detection is an important technique that can provide solid protection for the network
equipment against the security attacks. However, the attacks are usually unbalanced in …

Comparative analysis of intrusion detection systems and machine learning based model analysis through decision tree

Z Azam, MM Islam, MN Huda - IEEE Access, 2023 - ieeexplore.ieee.org
Cyber-attacks pose increasing challenges in precisely detecting intrusions, risking data
confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a …

Intrusion detection systems: A state-of-the-art taxonomy and survey

M Alkasassbeh, S Al-Haj Baddar - Arabian Journal for Science and …, 2023 - Springer
Abstract Intrusion Detection Systems (IDSs) have become essential to the sound operations
of networks. These systems have the potential to identify and report deviations from normal …