A systematic literature review of methods and datasets for anomaly-based network intrusion detection
Published 2022 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A systematic literature review of methods and datasets for anomaly-based network intrusion detection
Authors
Keywords
Intrusion detection, Systematic literature review, Machine learning, Datasets
Journal
COMPUTERS & SECURITY
Volume 116, Issue -, Pages 102675
Publisher
Elsevier BV
Online
2022-03-01
DOI
10.1016/j.cose.2022.102675
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Using Machine Learning to Examine Impact of Type of Performance Indicator on Flexible Pavement Deterioration Modeling
- (2021) S. Madeh Piryonesi et al. Journal of Infrastructure Systems
- Adversarial machine learning in Network Intrusion Detection Systems
- (2021) Elie Alhajjar et al. EXPERT SYSTEMS WITH APPLICATIONS
- Optimization of data-driven filterbank for automatic speaker verification
- (2020) Susanta Sarangi et al. DIGITAL SIGNAL PROCESSING
- Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset
- (2019) Nickolaos Koroniotis et al. Future Generation Computer Systems-The International Journal of eScience
- Adversarial environment reinforcement learning algorithm for intrusion detection
- (2019) Guillermo Caminero et al. Computer Networks
- A survey of network-based intrusion detection data sets
- (2019) Markus Ring et al. COMPUTERS & SECURITY
- A Supervised Intrusion Detection System for Smart Home IoT Devices
- (2019) Eirini Anthi et al. IEEE Internet of Things Journal
- A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection
- (2018) Vajiheh Hajisalem et al. Computer Networks
- A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection
- (2018) Preeti Mishra et al. IEEE Communications Surveys and Tutorials
- From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods
- (2018) Antonia Nisioti et al. IEEE Communications Surveys and Tutorials
- SMOTE for Learning from Imbalanced Data: Progress and Challenges, Marking the 15-year Anniversary
- (2018) Alberto Fernandez et al. JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH
- NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks
- (2018) Amjad Mehmood et al. JOURNAL OF SUPERCOMPUTING
- Clustering Approach Based on Mini Batch Kmeans for Intrusion Detection System Over Big Data
- (2018) Kai Peng et al. IEEE Access
- An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units
- (2018) Congyuan Xu et al. IEEE Access
- AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks
- (2018) Jiaqi Li et al. IEEE Internet of Things Journal
- Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling
- (2017) W. Haider et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A survey of intrusion detection in Internet of Things
- (2017) Bruno Bogaz Zarpelão et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks
- (2017) Chuanlong Yin et al. IEEE Access
- Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset
- (2016) Constantinos Kolias et al. IEEE Communications Surveys and Tutorials
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- (2016) Anna L. Buczak et al. IEEE Communications Surveys and Tutorials
- Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
- (2016) Mohammed A. Ambusaidi et al. IEEE TRANSACTIONS ON COMPUTERS
- A survey of network anomaly detection techniques
- (2016) Mohiuddin Ahmed et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Evaluating Computer Intrusion Detection Systems
- (2015) Aleksandar Milenkoski et al. ACM COMPUTING SURVEYS
- Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
- (2015) Zhiyuan Tan et al. IEEE TRANSACTIONS ON COMPUTERS
- PCA filtering and probabilistic SOM for network intrusion detection
- (2015) Eduardo De la Hoz et al. NEUROCOMPUTING
- Application of high-dimensional feature selection: evaluation for genomic prediction in man
- (2015) M. L. Bermingham et al. Scientific Reports
- SSH Compromise Detection using NetFlow/IPFIX
- (2014) Rick Hofstede et al. ACM SIGCOMM Computer Communication Review
- Big Data Analytics framework for Peer-to-Peer Botnet detection using Random Forests
- (2014) Kamaldeep Singh et al. INFORMATION SCIENCES
- Network Anomaly Detection: Methods, Systems and Tools
- (2013) Monowar H. Bhuyan et al. IEEE Communications Surveys and Tutorials
- Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection
- (2013) Weiming Hu et al. IEEE Transactions on Cybernetics
- Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge
- (2012) Pedro Casas et al. COMPUTER COMMUNICATIONS
- Toward developing a systematic approach to generate benchmark datasets for intrusion detection
- (2012) Ali Shiravi et al. COMPUTERS & SECURITY
- A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier
- (2012) Levent Koc et al. EXPERT SYSTEMS WITH APPLICATIONS
- Classification and regression trees
- (2011) Wei-Yin Loh Wiley Interdisciplinary Reviews-Data Mining and Knowledge Discovery
- Random-Forests-Based Network Intrusion Detection Systems
- (2008) Jiong Zhang et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND RE
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExplorePublish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn More