Survey of attack projection, prediction, and forecasting in cyber security

M Husák, J Komárková, E Bou-Harb… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …

A survey and taxonomy of the fuzzy signature-based intrusion detection systems

M Masdari, H Khezri - Applied Soft Computing, 2020 - Elsevier
Organizations that benefit from information technologies are vulnerable to various attacks
and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of …

IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset

Y Yin, J Jang-Jaccard, W Xu, A Singh, J Zhu… - Journal of Big …, 2023 - Springer
The effectiveness of machine learning models can be significantly averse to redundant and
irrelevant features present in the large dataset which can cause drastic performance …

Intrusion detection system: A comprehensive review

HJ Liao, CHR Lin, YC Lin, KY Tung - Journal of network and computer …, 2013 - Elsevier
With the increasing amount of network throughput and security threat, the study of intrusion
detection systems (IDSs) has received a lot of attention throughout the computer science …

A survey of intrusion detection systems in wireless sensor networks

I Butun, SD Morgera, R Sankar - IEEE communications surveys …, 2013 - ieeexplore.ieee.org
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …

Taxonomy and survey of collaborative intrusion detection

E Vasilomanolakis, S Karuppayah… - ACM computing …, 2015 - dl.acm.org
The dependency of our society on networked computers has become frightening: In the
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …

Host-based intrusion detection system with system calls: Review and future trends

M Liu, Z Xue, X Xu, C Zhong, J Chen - ACM computing surveys (CSUR), 2018 - dl.acm.org
In a contemporary data center, Linux applications often generate a large quantity of real-time
system call traces, which are not suitable for traditional host-based intrusion detection …

An intrusion detection and prevention system in cloud computing: A systematic review

A Patel, M Taghavi, K Bakhtiyari, JC Júnior - Journal of network and …, 2013 - Elsevier
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …

An intrusion detection system using network traffic profiling and online sequential extreme learning machine

R Singh, H Kumar, RK Singla - Expert Systems with Applications, 2015 - Elsevier
Abstract Anomaly based Intrusion Detection Systems (IDS) learn normal and anomalous
behavior by analyzing network traffic in various benchmark datasets. Common challenges …

Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions

W Li, W Meng, LF Kwok - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
Owing to the swift growth in cyber attacks, intrusion detection systems (IDSs) have become a
necessity to help safeguard personal and organizational assets. However, with the …