A systematic literature review of methods and datasets for anomaly-based network intrusion detection
出版年份 2022 全文链接
标题
A systematic literature review of methods and datasets for anomaly-based network intrusion detection
作者
关键词
Intrusion detection, Systematic literature review, Machine learning, Datasets
出版物
COMPUTERS & SECURITY
Volume 116, Issue -, Pages 102675
出版商
Elsevier BV
发表日期
2022-03-01
DOI
10.1016/j.cose.2022.102675
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Using Machine Learning to Examine Impact of Type of Performance Indicator on Flexible Pavement Deterioration Modeling
- (2021) S. Madeh Piryonesi et al. Journal of Infrastructure Systems
- Adversarial machine learning in Network Intrusion Detection Systems
- (2021) Elie Alhajjar et al. EXPERT SYSTEMS WITH APPLICATIONS
- Optimization of data-driven filterbank for automatic speaker verification
- (2020) Susanta Sarangi et al. DIGITAL SIGNAL PROCESSING
- Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset
- (2019) Nickolaos Koroniotis et al. Future Generation Computer Systems-The International Journal of eScience
- Adversarial environment reinforcement learning algorithm for intrusion detection
- (2019) Guillermo Caminero et al. Computer Networks
- A survey of network-based intrusion detection data sets
- (2019) Markus Ring et al. COMPUTERS & SECURITY
- A Supervised Intrusion Detection System for Smart Home IoT Devices
- (2019) Eirini Anthi et al. IEEE Internet of Things Journal
- A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection
- (2018) Vajiheh Hajisalem et al. Computer Networks
- A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection
- (2018) Preeti Mishra et al. IEEE Communications Surveys and Tutorials
- From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods
- (2018) Antonia Nisioti et al. IEEE Communications Surveys and Tutorials
- SMOTE for Learning from Imbalanced Data: Progress and Challenges, Marking the 15-year Anniversary
- (2018) Alberto Fernandez et al. JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH
- NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks
- (2018) Amjad Mehmood et al. JOURNAL OF SUPERCOMPUTING
- Clustering Approach Based on Mini Batch Kmeans for Intrusion Detection System Over Big Data
- (2018) Kai Peng et al. IEEE Access
- An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units
- (2018) Congyuan Xu et al. IEEE Access
- AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks
- (2018) Jiaqi Li et al. IEEE Internet of Things Journal
- Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling
- (2017) W. Haider et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A survey of intrusion detection in Internet of Things
- (2017) Bruno Bogaz Zarpelão et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks
- (2017) Chuanlong Yin et al. IEEE Access
- Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset
- (2016) Constantinos Kolias et al. IEEE Communications Surveys and Tutorials
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- (2016) Anna L. Buczak et al. IEEE Communications Surveys and Tutorials
- Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
- (2016) Mohammed A. Ambusaidi et al. IEEE TRANSACTIONS ON COMPUTERS
- A survey of network anomaly detection techniques
- (2016) Mohiuddin Ahmed et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Evaluating Computer Intrusion Detection Systems
- (2015) Aleksandar Milenkoski et al. ACM COMPUTING SURVEYS
- Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
- (2015) Zhiyuan Tan et al. IEEE TRANSACTIONS ON COMPUTERS
- PCA filtering and probabilistic SOM for network intrusion detection
- (2015) Eduardo De la Hoz et al. NEUROCOMPUTING
- Application of high-dimensional feature selection: evaluation for genomic prediction in man
- (2015) M. L. Bermingham et al. Scientific Reports
- SSH Compromise Detection using NetFlow/IPFIX
- (2014) Rick Hofstede et al. ACM SIGCOMM Computer Communication Review
- Big Data Analytics framework for Peer-to-Peer Botnet detection using Random Forests
- (2014) Kamaldeep Singh et al. INFORMATION SCIENCES
- Network Anomaly Detection: Methods, Systems and Tools
- (2013) Monowar H. Bhuyan et al. IEEE Communications Surveys and Tutorials
- Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection
- (2013) Weiming Hu et al. IEEE Transactions on Cybernetics
- Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge
- (2012) Pedro Casas et al. COMPUTER COMMUNICATIONS
- Toward developing a systematic approach to generate benchmark datasets for intrusion detection
- (2012) Ali Shiravi et al. COMPUTERS & SECURITY
- A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier
- (2012) Levent Koc et al. EXPERT SYSTEMS WITH APPLICATIONS
- Classification and regression trees
- (2011) Wei-Yin Loh Wiley Interdisciplinary Reviews-Data Mining and Knowledge Discovery
- Random-Forests-Based Network Intrusion Detection Systems
- (2008) Jiong Zhang et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND RE
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now