Multi-Layered Filtration Framework for Efficient Detection of Network Attacks Using Machine Learning
暂无分享,去创建一个
[1] Mohannad A. Alswailim,et al. ESCALB: An effective slave controller allocation-based load balancing scheme for multi-domain SDN-enabled-IoT networks , 2023, J. King Saud Univ. Comput. Inf. Sci..
[2] Doaa N. Mhawi,et al. Advanced Feature-Selection-Based Hybrid Ensemble Learning Algorithms for Network Intrusion Detection Systems , 2022, Symmetry.
[3] Serkan Balli,et al. A novel method for intrusion detection in computer networks by identifying multivariate outliers and ReliefF feature selection , 2022, Neural Computing and Applications.
[4] C. Coello,et al. Intrusion detection using multi-objective evolutionary convolutional neural network for Internet of Things in Fog computing , 2022, Knowl. Based Syst..
[5] Junwei Liang,et al. A robust occlusion-adaptive attention-based deep network for facial landmark detection , 2022, Applied Intelligence.
[6] D. Shi,et al. Attentive occlusion-adaptive deep network for facial landmark detection , 2021, Pattern Recognit..
[7] Richa Singh,et al. Novel Framework for Anomaly Detection Using Machine Learning Technique on CIC-IDS2017 Dataset , 2021, 2021 International Conference on Technological Advancements and Innovations (ICTAI).
[8] Bogdan Ghita,et al. Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning , 2021, Secur. Commun. Networks.
[9] Yuchong Li,et al. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments , 2021, Energy Reports.
[10] Ahmet Rizaner,et al. A novel context-aware feature extraction method for convolutional neural network-based intrusion detection systems , 2021, Neural Computing and Applications.
[11] Robiah Yusof,et al. Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset , 2021, IEEE Access.
[12] Deepak Kshirsagar,et al. A feature reduction based reflected and exploited DDoS attacks detection system , 2021, J. Ambient Intell. Humaniz. Comput..
[13] Jagath Samarabandu,et al. Deep learning methods in network intrusion detection: A survey and an objective comparison , 2020, J. Netw. Comput. Appl..
[14] Jehad Ali,et al. A Machine Learning Framework for Prevention of Software-Defined Networking controller from DDoS Attacks and dimensionality reduction of big data , 2020, 2020 International Conference on Information and Communication Technology Convergence (ICTC).
[15] Kaushik Roy,et al. Comparison of Machine Learning and Deep Learning Models for Network Intrusion Detection Systems , 2020, Future Internet.
[16] Christian Keysers,et al. Using Bayes factor hypothesis testing in neuroscience to establish evidence of absence , 2020, Nature Neuroscience.
[17] Abdul Majid,et al. Attack Detection From Network Traffic using Machine Learning , 2020 .
[18] Noora Shrestha. Detecting Multicollinearity in Regression Analysis , 2020, American Journal of Applied Mathematics and Statistics.
[19] Arun Kumar Sangaiah,et al. A real-time and ubiquitous network attack detection based on deep belief network and support vector machine , 2020, IEEE/CAA Journal of Automatica Sinica.
[20] P. Karthikeyan,et al. Hybrid optimization scheme for intrusion detection using considerable feature selection , 2019, Neural Computing and Applications.
[21] Bayu Adhi Tama,et al. TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System , 2019, IEEE Access.
[22] Iqbal Gondal,et al. Survey of intrusion detection systems: techniques, datasets and challenges , 2019, Cybersecurity.
[23] Guang Cheng,et al. An Efficient Network Intrusion Detection System Based on Feature Selection and Ensemble Classifier , 2019, ArXiv.
[24] Muhammad Hanif Durad,et al. Intrusion detection using deep sparse auto-encoder and self-taught learning , 2019, Neural Computing and Applications.
[25] Miad Faezipour,et al. Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection , 2019, Electronics.
[26] Parman Sukarno,et al. Improving AdaBoost-based Intrusion Detection System (IDS) Performance on CIC IDS 2017 Dataset , 2019, Journal of Physics: Conference Series.
[27] Ken Kobayashi,et al. Mixed integer quadratic optimization formulations for eliminating multicollinearity based on variance inflation factor , 2018, Journal of Global Optimization.
[28] Ali A. Ghorbani,et al. An Evaluation Framework for Intrusion Detection Dataset , 2016, 2016 International Conference on Information Science and Security (ICISS).
[29] Dong Hyun Jeong,et al. A multi-level intrusion detection method for abnormal network behaviors , 2016, J. Netw. Comput. Appl..
[30] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[31] Jiankun Hu,et al. A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns , 2014, IEEE Transactions on Computers.
[32] G. Padmavathi,et al. A Survey on Various Cyber Attacks and their Classification , 2013, Int. J. Netw. Secur..
[33] Aiko Pras,et al. A Labeled Data Set for Flow-Based Intrusion Detection , 2009, IPOM.
[34] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[35] Lawrie Brown,et al. Computer Security: Principles and Practice , 2007 .
[36] S. Lewis,et al. Regression analysis , 2007, Practical Neurology.
[37] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[38] J. H. Zar,et al. Significance Testing of the Spearman Rank Correlation Coefficient , 1972 .
[39] Punam Bedi,et al. CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems , 2022, Comput. Secur..
[40] Arnaud Rosay,et al. Network Intrusion Detection: A Comprehensive Analysis of CIC-IDS2017 , 2022, ICISSP.
[41] Ahamed Aljuhani,et al. Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments , 2021, IEEE Access.
[42] Mohammad Mozumdar,et al. A Novel Intrusion Detection Model for Detecting Known and Innovative Cyberattacks Using Convolutional Neural Network , 2021, IEEE Open Journal of the Computer Society.
[43] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[44] S. Latha,et al. A survey on network attacks and Intrusion detection systems , 2017, 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS).
[45] Solane Duque,et al. Using Data Mining Algorithms for Developing a Model for Intrusion Detection System (IDS) , 2015, Complex Adaptive Systems.