Machine Learning Methods for Cyber Security Intrusion Detection: Datasets and Comparative Study
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Machine Learning Methods for Cyber Security Intrusion Detection: Datasets and Comparative Study
Authors
Keywords
IDS, KNN, SVM, DT, Machine learning, Cyber security
Journal
Computer Networks
Volume -, Issue -, Pages 107840
Publisher
Elsevier BV
Online
2021-01-14
DOI
10.1016/j.comnet.2021.107840
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A NSGA2-LR wrapper approach for feature selection in network intrusion detection
- (2020) Chaouki Khammassi et al. Computer Networks
- Model-Based Risk Assessment for Cyber Physical Systems Security
- (2020) A. Tantawy et al. COMPUTERS & SECURITY
- Resilient observer-based control for cyber-physical systems under denial-of-service attacks
- (2020) Chun-Lei Zhang et al. INFORMATION SCIENCES
- Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic
- (2019) Jisa David et al. COMPUTERS & SECURITY
- Designing an Efficient Security Framework for Detecting Intrusions in Virtual Network of Cloud Computing
- (2019) Rajendra Patil et al. COMPUTERS & SECURITY
- CorrCorr: A feature selection method for multivariate correlation network anomaly detection techniques
- (2019) Florian Gottwalt et al. COMPUTERS & SECURITY
- A survey of network-based intrusion detection data sets
- (2019) Markus Ring et al. COMPUTERS & SECURITY
- Model of the intrusion detection system based on the integration of spatial-temporal features
- (2019) Jianwu Zhang et al. COMPUTERS & SECURITY
- A hybrid deep learning model for efficient intrusion detection in big data environment
- (2019) Mohammad Mehedi Hassan et al. INFORMATION SCIENCES
- A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection
- (2018) Vajiheh Hajisalem et al. Computer Networks
- UGR‘16: A new dataset for the evaluation of cyclostationarity-based network IDSs
- (2018) Gabriel Maciá-Fernández et al. COMPUTERS & SECURITY
- A Bi-objective Hyper-Heuristic Support Vector Machines for Big Data Cyber-Security
- (2018) Nasser R. Sabar et al. IEEE Access
- Machine Learning and Deep Learning Methods for Cybersecurity
- (2018) Yang Xin et al. IEEE Access
- Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset
- (2016) Constantinos Kolias et al. IEEE Communications Surveys and Tutorials
- Intrusion response systems: Foundations, design, and challenges
- (2016) Zakira Inayat et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
- (2015) Zhiyuan Tan et al. IEEE TRANSACTIONS ON COMPUTERS
- Service vulnerability scanning based on service-oriented architecture in Web service environments
- (2013) Shangguang Wang et al. JOURNAL OF SYSTEMS ARCHITECTURE
- Toward developing a systematic approach to generate benchmark datasets for intrusion detection
- (2012) Ali Shiravi et al. COMPUTERS & SECURITY
- Anomaly-based network intrusion detection: Techniques, systems and challenges
- (2008) P. García-Teodoro et al. COMPUTERS & SECURITY
Create your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create NowAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started