4.7 Article

Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems

Neha Gupta et al.

Summary: The paper introduces a network-based intrusion detection system, CSE-IDS, based on cost-sensitive deep learning and ensemble algorithms, which accurately identifies minority attacks while optimizing the number of false alarms. Experimental results demonstrate that CSE-IDS performs well in both attack detection rate and false alarm minimization, making it suitable for deployment in real-world networks.

COMPUTERS & SECURITY (2022)

Article Computer Science, Information Systems

Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study

Zihao Wang et al.

Summary: As the demand for personal privacy and data security increases, encrypted traffic has become mainstream in the cyber world. However, encrypted traffic also poses challenges to detecting malicious traffic. Machine learning based approaches for encrypted malicious traffic detection have become an important direction, but there is a lack of unified datasets and feature sets. This paper generates a comprehensive and fair dataset by analyzing and combining datasets from different sources, implements and compares 10 algorithms for encrypted malicious traffic detection, and discusses challenges and future research directions.

COMPUTERS & SECURITY (2022)

Review Computer Science, Hardware & Architecture

Swarm Intelligence inspired Intrusion Detection Systems - A systematic literature review

Muhammad Hassan Nasir et al.

Summary: This paper presents a systematic review of swarm intelligence approaches deployed in intrusion detection in various attack surfaces and domains between 2010 and 2020. It categorizes the SI approaches according to their applicability in improving different aspects of intrusion detection and discusses the features of datasets used in experimentation. The study aims to help researchers assess the capabilities and limitations of SI algorithms in identifying security threats and challenges, as well as differentiating SI-based IDS from traditional ones.

COMPUTER NETWORKS (2022)

Article Computer Science, Artificial Intelligence

Tabular data: Deep learning is not all you need

Ravid Shwartz-Ziv et al.

Summary: The study compares the performance of deep learning models and XGBoost on various datasets, finding that XGBoost outperforms deep models and requires less tuning. However, an ensemble of deep models and XGBoost performs better on these datasets than XGBoost alone.

INFORMATION FUSION (2022)

Article Computer Science, Theory & Methods

On IoT intrusion detection based on data augmentation for enhancing learning on unbalanced samples

Ying Zhang et al.

Summary: This article proposes an intrusion detection method for the IoT based on Improved Conditional Variational Autoencoder (ICVAE) and Borderline Synthetic Minority Oversampling Technique (BSM). Experimental results show that the proposed method can more effectively improve the accuracy of IoT attack detection under the condition of unbalanced samples.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Article Computer Science, Theory & Methods

A Survey on Data-driven Network Intrusion Detection

Dylan Chou et al.

Summary: This survey presents the challenges faced by data-driven network intrusion detection, including the authenticity and representativeness of datasets. Trends in the past decade are analyzed, and future directions are proposed, including the application of NID in cloud-based environments, designing scalable models for large network data, and collecting labeled datasets from real-world networks.

ACM COMPUTING SURVEYS (2022)

Article Computer Science, Artificial Intelligence

A weighted intrusion detection model of dynamic selection

Tao Feng et al.

Summary: This paper introduces a weighted intrusion detection model of dynamic selection (WIDMoDS) based on data features to customize intrusion detection models for network intrusion data sets of different types, sizes, and structures. By clustering single classifiers and calculating weights through evaluation indicators, the model optimizes the number of classifiers and improves the accuracy of intrusion detection.

APPLIED INTELLIGENCE (2021)

Article Computer Science, Information Systems

Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing

S. Krishnaveni et al.

Summary: Cloud computing is a preferred option for organizations worldwide, offering scalable and internet-based resources. However, security and privacy are significant obstacles to its success. The increase in network traffic has led to more complex and widespread security breaches, making traditional intrusion detection systems inefficient. A proposed efficient Intrusion Detection System (IDS) for the cloud environment achieved significant performance enhancement compared to existing methods.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2021)

Article Computer Science, Information Systems

STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment

Samed Al et al.

Summary: A new classification-based network attack detection system was proposed using a Hybrid Deep Learning network and data imbalance processing methods, achieving high accuracy in intrusion detection in big data flow.

COMPUTERS & SECURITY (2021)

Article Computer Science, Information Systems

An effective genetic algorithm-based feature selection method for intrusion detection systems

Zahid Halim et al.

Summary: This study aims to improve the accuracy of classifiers in network security and intrusion detection through an enhanced Genetic Algorithm-based feature selection method, with parameter tuning and a novel fitness function. Results show that using GbFS can significantly improve accuracy.

COMPUTERS & SECURITY (2021)

Article Computer Science, Information Systems

Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data

Meenal Jain et al.

Summary: Network security is crucial in the digital age, with research focusing on evolving and secure mechanisms for secure communications. This paper presents distributed machine learning based ensemble techniques for detecting concept drift and attacks in network traffic, achieving high accuracy on various datasets. Machine learning, coupled with new technologies, offers promising solutions to combat the ever-increasing pace of network-based attacks.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2021)

Article Computer Science, Information Systems

A novel combinatorial optimization based feature selection method for network intrusion detection

Anjum Nazir et al.

Summary: The rapid advancements in communication technologies and services have brought new challenges in cybersecurity. Traditional intrusion detection techniques are not sufficient to protect against modern attacks, leading to the need for innovative solutions like machine learning algorithms. Feature selection methods like 'Tabu Search - Random Forest' have shown promising results in improving classification accuracy and reducing false positives in Network Intrusion Detection Systems.

COMPUTERS & SECURITY (2021)

Article Computer Science, Artificial Intelligence

Enhancing intrusion detection with feature selection and neural network

Chunhui Wu et al.

Summary: This study investigates feature selection methods and introduces an ensemble of Neural Networks and Random Forest to enhance intrusion detection performance. The experimental results show that compared to similar approaches, this method can better identify important and relevant features.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)

Article Mathematical & Computational Biology

The Matthews correlation coefficient (MCC) is more reliable than balanced accuracy, bookmaker informedness, and markedness in two-class confusion matrix evaluation

Davide Chicco et al.

Summary: In this manuscript, the authors reaffirm the robustness of the Matthews correlation coefficient (MCC) as a metric for summarizing classifier performance. They compare MCC to other metrics such as balanced accuracy, bookmaker informedness, and markedness, and demonstrate situations where MCC provides a more informative response. The authors also identify three exceptions where bookmaker informedness may be more appropriate, but overall suggest MCC as a standard measure for evaluating binary classifications in various fields.

BIODATA MINING (2021)

Review Computer Science, Information Systems

Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation

Bayu Adhi Tama et al.

Summary: This study provides an overview of how ensemble learners are applied in IDSs through systematic mapping study, analyzing 124 prominent publications. Additionally, it reports and analyzes an empirical investigation of a new classifier ensemble approach for anomaly-based IDS, filling the gap in current literature regarding the application of ensemble learning techniques to IDSs.

COMPUTER SCIENCE REVIEW (2021)

Article Computer Science, Artificial Intelligence

A two-stage intrusion detection approach for software-defined IoT networks

Qiuting Tian et al.

Summary: The paper proposes a two-stage intrusion detection approach for SD-IoT networks, utilizing improved differential evolution algorithm and firefly algorithm, as well as a novel ensemble classifier and weighted voting method. Experimental results demonstrate that the proposed multiclass classification approach performs well in terms of accuracy and false-positive rate, outperforming existing methods.

SOFT COMPUTING (2021)

Article Computer Science, Information Systems

A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM

Jingmei Liu et al.

Summary: The study proposes a network intrusion detection system based on ADASYN oversampling technology and LightGBM, which addresses the issue of imbalanced data by preprocessing and increasing minority samples to enhance detection accuracy.

COMPUTERS & SECURITY (2021)

Article Computer Science, Theory & Methods

Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection

Hao Zhang et al.

Summary: This study proposes a multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection, significantly improving detection performance.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Automation & Control Systems

A Novel Web Attack Detection System for Internet of Things via Ensemble Classification

Chaochao Luo et al.

Summary: The IoT technology has been widely applied in various fields, but the diversity of devices makes networks more vulnerable to web attacks. Researchers proposed a deep learning-based web attack detection system that can accurately detect web attacks with low false positive and negative rates.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Artificial Intelligence

On learning effective ensembles of deep neural networks for intrusion detection

F. Folino et al.

Summary: The study introduces a novel ensemble-based deep learning framework to address the non-stationary nature of IDS log data as well as the scarcity of labeled data instances, demonstrating effective classification accuracy and robustness to data scarcity in real-world scenarios.

INFORMATION FUSION (2021)

Article Computer Science, Information Systems

A novel IoT network intrusion detection approach based on Adaptive Particle Swarm Optimization Convolutional Neural Network

Xiu Kan et al.

Summary: In this paper, a novel IoT network intrusion detection approach based on APSO-CNN is proposed, which optimizes CNN structure parameters using PSO algorithm and introduces a new evaluation method to compare with other algorithms. Experimental results validate the effectiveness and reliability of the proposed method.

INFORMATION SCIENCES (2021)

Article Chemistry, Multidisciplinary

Generating Network Intrusion Detection Dataset Based on Real and Encrypted Synthetic Attack Traffic

Andrey Ferriyan et al.

Summary: This paper presents the HIKARI-2021 dataset, which contains encrypted synthetic attacks and benign traffic to address the lack of up-to-date datasets for evaluating intrusion detection systems. The dataset meets content and process requirements, and is made available to enable future dataset developments.

APPLIED SCIENCES-BASEL (2021)

Article Computer Science, Information Systems

A Novel Ensemble Framework for an Intelligent Intrusion Detection System

Sugandh Seth et al.

Summary: The study presents a unique ensemble framework for detecting different attack categories effectively. By ranking the detection ability of various base classifiers, a better attack detection rate is achieved.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning

Lan Liu et al.

Summary: This paper researches machine learning and deep learning for intrusion detection in imbalanced network traffic. It proposes a novel DSSTE algorithm to tackle the class imbalance problem and demonstrates its effectiveness through experiments.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

A Stacking-Based Deep Neural Network Approach for Effective Network Anomaly Detection

Lewis Nkenyereye et al.

Summary: This study highlights the effectiveness of a stacking ensemble-based model for A-IDS, using deep learning as the base learner model. Empirical benchmarks against performance metrics show that this model outperforms existing ML algorithms in the literature.

CMC-COMPUTERS MATERIALS & CONTINUA (2021)

Article Computer Science, Artificial Intelligence

Intrusion detection system based on a modified binary grey wolf optimisation

Qusay M. Alzubi et al.

NEURAL COMPUTING & APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

A novel statistical analysis and autoencoder driven intelligent intrusion detection approach

Cosimo Ieracitano et al.

NEUROCOMPUTING (2020)

Article Computer Science, Hardware & Architecture

HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning

Ying Zhong et al.

COMPUTER NETWORKS (2020)

Article Mathematics, Interdisciplinary Applications

Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System

Mohammad Aljanabi et al.

COMPLEXITY (2020)

Article Computer Science, Hardware & Architecture

Building an efficient intrusion detection system based on feature selection and ensemble classifier

Yuyang Zhou et al.

COMPUTER NETWORKS (2020)

Article Computer Science, Artificial Intelligence

A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer

Hadeel Alazzam et al.

EXPERT SYSTEMS WITH APPLICATIONS (2020)

Article Automation & Control Systems

A real-time and ubiquitous network attack detection based on deep belief network and support vector machine

Hao Zhang et al.

IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2020)

Article Computer Science, Artificial Intelligence

A multi-objective immune algorithm for intrusion feature selection

Wenhong Wei et al.

APPLIED SOFT COMPUTING (2020)

Article Computer Science, Information Systems

A Statistical Approach for Detection of Denial of Service Attacks in Computer Networks

N. G. Bhuvaneswari Amma et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2020)

Article Computer Science, Information Systems

A GBDT-Paralleled Quadratic Ensemble Learning for Intrusion Detection System

Jun Yang et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

An Enhanced Anomaly Detection in Web Traffic Using a Stack of Classifier Ensemble

Bayu Adhi Tama et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization

Yanqing Yang et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection

Zina Chkirbene et al.

IEEE ACCESS (2020)

Article Computer Science, Artificial Intelligence

An in-depth experimental study of anomaly detection using gradient boosted machine

Bayu Adhi Tama et al.

NEURAL COMPUTING & APPLICATIONS (2019)

Review Telecommunications

A comprehensive survey on network anomaly detection

Gilberto Fernandes et al.

TELECOMMUNICATION SYSTEMS (2019)

Article Computer Science, Information Systems

An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things

Nour Moustafa et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection

Fadi Salo et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Information Systems

Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms

Mehrnaz Mazini et al.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System

Bayu Adhi Tama et al.

IEEE ACCESS (2019)

Article Engineering, Electrical & Electronic

Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic

Razan Abdulhammed et al.

IEEE SENSORS LETTERS (2019)

Article Computer Science, Theory & Methods

A Survey of Random Forest Based Methods for Intrusion Detection Systems

Paulo Angelo Alves Resende et al.

ACM COMPUTING SURVEYS (2018)

Review Computer Science, Hardware & Architecture

A survey of network anomaly detection techniques

Mohiuddin Ahmed et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Information Systems

Network Anomaly Detection: Methods, Systems and Tools

Monowar H. Bhuyan et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Mathematics, Interdisciplinary Applications

Ward's Hierarchical Agglomerative Clustering Method: Which Algorithms Implement Ward's Criterion?

Fionn Murtagh et al.

JOURNAL OF CLASSIFICATION (2014)