Big Data-Aware Intrusion Detection System in Communication Networks: a Deep Learning Approach

[1]  Qi Shi,et al.  A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[2]  Hao Wang,et al.  An intrusion detection method for industrial control systems based on bidirectional simple recurrent unit , 2021, Comput. Electr. Eng..

[3]  Reza Fotohi,et al.  Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem , 2021, Secur. Priv..

[4]  Wei Zhong,et al.  Applying big data based deep learning system to intrusion detection , 2020, Big Data Min. Anal..

[5]  Jaafar M. H. Elmirghani,et al.  Big data analytics for wireless and wired network design: A survey , 2018, Comput. Networks.

[6]  Reza Fotohi,et al.  Secure Communication between UAVs Using a Method Based on Smart Agents in Unmanned Aerial Vehicles , 2020 .

[7]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[8]  Reza Fotohi,et al.  A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem , 2020, Int. J. Commun. Syst..

[9]  Chih-Fong Tsai,et al.  CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..

[10]  P. Balasubramanie,et al.  Hadoop Based Parallel Binary Bat Algorithm for Network Intrusion Detection , 2017, International Journal of Parallel Programming.

[11]  Miguel Correia,et al.  A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection , 2017, IWANN.

[12]  Reza Fotohi,et al.  SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism , 2020, Wirel. Pers. Commun..

[13]  Yang Yu,et al.  Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders , 2017, Secur. Commun. Networks.

[14]  Hyuk Lim,et al.  Deep Learning Approach for Detecting Malicious Activities Over Encrypted Secure Channels , 2021, IEEE Access.

[15]  Ferhat Karataş,et al.  Big Data: Controlling Fraud by Using Machine Learning Libraries on Spark , 2018 .

[16]  Amaury Lendasse,et al.  Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space , 2018, Cognitive Computation.

[17]  Nabil Hmina,et al.  LSTM deep learning method for network intrusion detection system , 2020 .

[18]  Kai Huang,et al.  Intrusion Detection Using Convolutional Neural Networks for Representation Learning , 2017, ICONIP.

[19]  Guozi Sun,et al.  A Residual Learning-Based Network Intrusion Detection System , 2021, Secur. Commun. Networks.

[20]  Soumya Ranjan Nayak,et al.  A New and Secure Intrusion Detecting System for Detection of Anomalies Within the Big Data , 2019 .

[21]  Himansu Das,et al.  Classification of Intrusion Detection Using Data Mining Techniques , 2018 .

[22]  Farah Jemili,et al.  Using MongoDB Databases for Training and Combining Intrusion Detection Datasets , 2017 .

[23]  Reza Fotohi,et al.  Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication , 2020, The Journal of Supercomputing.

[24]  Rajkumar L. Biradar,et al.  Network intrusion detection using sparse autoencoder with swish-PReLU activation Model , 2021 .

[25]  Suad Mohammed Othman,et al.  Intrusion detection model using machine learning algorithm on Big Data environment , 2018, Journal of Big Data.

[26]  Yi Yang,et al.  Big Data Meet Cyber-Physical Systems: A Panoramic Survey , 2018, IEEE Access.