A survey and taxonomy of the fuzzy signature-based intrusion detection systems

M Masdari, H Khezri - Applied Soft Computing, 2020 - Elsevier
Organizations that benefit from information technologies are vulnerable to various attacks
and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of …

The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review

B Naik, A Mehta, H Yagnik, M Shah - Complex & Intelligent Systems, 2022 - Springer
Given the prevailing state of cybersecurity, it is reasonable to understand why cybersecurity
experts are seriously considering artificial intelligence as a potential field that can aid …

Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection

FE Ayo, SO Folorunso, AA Abayomi-Alli… - … Security Journal: A …, 2020 - Taylor & Francis
ABSTRACT Network Intrusion Detection System (NIDS) is often used to classify network
traffic in an attempt to protect computer systems from various network attacks. A major …

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

S Hajj, R El Sibai, J Bou Abdo… - Transactions on …, 2021 - Wiley Online Library
With the Internet's unprecedented growth and nations' reliance on computer networks, new
cyber‐attacks are created every day as means for achieving financial gain, imposing …

Adaptively supervised and intrusion-aware data aggregation for wireless sensor clusters in critical infrastructures

S Otoum, B Kantarci, H Mouftah - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
Wireless sensor networks have become integral components of the monitoring systems for
critical infrastructures such as the power grid or residential microgrids. Therefore …

Anomaly-based intrusion detection system using fuzzy logic

M Almseidin, J Al-Sawwa… - 2021 International …, 2021 - ieeexplore.ieee.org
Recently, the Distributed Denial of Service (DDOS) attacks has been used for different
aspects to denial the number of services for the end-users. Therefore, there is an urgent …

Intrusion detection using Highest Wins feature selection algorithm

RMA Mohammad, MK Alsmadi - Neural Computing and Applications, 2021 - Springer
The rapid advancement of Internet stimulates building intelligent data mining systems for
detecting intrusion attacks. The performance of such systems might be negatively affected …

Enhanced cloud security: A novel intrusion detection system using ARSO algorithm and Bi-LSTM classifier

E Silambarasan, R Suryawanshi, S Reshma - International Journal of …, 2024 - Springer
The cloud computing environment faces significant security challenges, impacting its long-
term growth. Intrusion detection is crucial for mitigating potential threats in this domain …

On detecting distributed denial of service attacks using fuzzy inference system

M Almseidin, J Al-Sawwa, M Alkasassbeh… - Cluster …, 2023 - Springer
Nowadays, attackers are constantly targeting the modern aspects of technology and
attempting to abuse these technologies using different attacks types such as the distributed …

Intrusion detection mechanism using fuzzy rule interpolation

M Almseidin, S Kovacs - arxiv preprint arxiv:1904.08790, 2019 - arxiv.org
Fuzzy Rule Interpolation (FRI) methods can serve deducible (interpolated) conclusions even
in case if some situations are not explicitly defined in a fuzzy rule based knowledge …