Survey of intrusion detection systems: techniques, datasets and challenges
Cyber-attacks are becoming more sophisticated and thereby presenting increasing
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …
A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
A Khraisat, A Alazab - Cybersecurity, 2021 - Springer
Abstract The Internet of Things (IoT) has been rapidly evolving towards making a greater
impact on everyday life to large industrial systems. Unfortunately, this has attracted the …
impact on everyday life to large industrial systems. Unfortunately, this has attracted the …
TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system
Intrusion detection systems (IDSs) play a pivotal role in computer security by discovering
and repealing malicious activities in computer networks. Anomaly-based IDS, in particular …
and repealing malicious activities in computer networks. Anomaly-based IDS, in particular …
A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks
The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on
everyday life to large industrial systems. Unfortunately, this has attracted the attention of …
everyday life to large industrial systems. Unfortunately, this has attracted the attention of …
Anomaly-based intrusion detection system for IoT application
Abstract Internet-of-Things (IoT) connects various physical objects through the Internet and it
has a wide application, such as in transportation, military, healthcare, agriculture, and many …
has a wide application, such as in transportation, military, healthcare, agriculture, and many …
5g-nidd: A comprehensive network intrusion detection dataset generated over 5g wireless network
With a plethora of new connections, features, and services introduced, the 5th generation
(5G) wireless technology reflects the development of mobile communication networks and is …
(5G) wireless technology reflects the development of mobile communication networks and is …
Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one class support vector machine
Cyberttacks are becoming increasingly sophisticated, necessitating the efficient intrusion
detection mechanisms to monitor computer resources and generate reports on anomalous …
detection mechanisms to monitor computer resources and generate reports on anomalous …
Toward effective intrusion detection using log-cosh conditional variational autoencoder
Intrusion detection is an important technique that can provide solid protection for the network
equipment against the security attacks. However, the attacks are usually unbalanced in …
equipment against the security attacks. However, the attacks are usually unbalanced in …
Comparative analysis of intrusion detection systems and machine learning based model analysis through decision tree
Cyber-attacks pose increasing challenges in precisely detecting intrusions, risking data
confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a …
confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a …
Intrusion detection systems: A state-of-the-art taxonomy and survey
Abstract Intrusion Detection Systems (IDSs) have become essential to the sound operations
of networks. These systems have the potential to identify and report deviations from normal …
of networks. These systems have the potential to identify and report deviations from normal …