4.5 Article

Intrusion Detection Method Based on Denoising Diffusion Probabilistic Models for UAV Networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

High-performance intrusion detection system for networked UAVs via deep learning

Qasem Abu Al-Haija et al.

Summary: Unmanned Aerial Vehicles (UAVs) face various cyber-intrusions and threats in their communication networks. This paper proposes an autonomous intrusion detection system that uses deep convolutional neural networks to efficiently detect malicious threats invading UAVs. Experimental results show that the system achieves high accuracy and quick prediction time, outperforming other intrusion detection systems.

NEURAL COMPUTING & APPLICATIONS (2022)

Article Telecommunications

Evaluating the Performance of Various SVM Kernel Functions Based on Basic Features Extracted from KDDCUP'99 Dataset by Random Forest Method for Detecting DDoS Attacks

Kaushik Adhikary et al.

Summary: DDoS attacks are a dangerous form of attack that aim to improve network security in real time by utilizing different key features. Research shows that using the Laplace Dot support vector machine kernel (Laplacian kernel) function can provide optimal performance in detecting both seen and unseen DDoS attacks.

WIRELESS PERSONAL COMMUNICATIONS (2022)

Article Remote Sensing

An Intrusion Detection Model for Drone Communication Network in SDN Environment

Liang Kou et al.

Summary: This paper proposes an intrusion detection model that can quickly reach the convergence state, utilizing a deep auto-encoder, a convolutional neural network, and an attention mechanism. The model demonstrates fast convergence speed and high precision in experiments.

DRONES (2022)

Article Computer Science, Information Systems

Design and Development of RNN Anomaly Detection Model for IoT Networks

Imtiaz Ullah et al.

Summary: Cybersecurity is increasingly important due to the growth of IoT, and using deep learning techniques for malicious traffic identification and anomaly detection is crucial. This paper proposes various deep learning models and achieves high accuracy and performance through validation.

IEEE ACCESS (2022)

Article Computer Science, Artificial Intelligence

A Gaussian process regression approach to predict the k -barrier coverage probability for intrusion detection in wireless sensor networks

Abhilash Singh et al.

Summary: This paper proposes three methods based on machine learning approach using GPR model for fast intrusion detection and prevention in Wireless Sensor Networks. By selecting potential features like number of nodes, sensing range, velocity ratio, etc., and extracting features using analytical approach, accurate prediction of k-barrier coverage probability is achieved. The proposed method outperforms other benchmark schemes with higher accuracy.

EXPERT SYSTEMS WITH APPLICATIONS (2021)

Article Computer Science, Information Systems

RNNIDS: Enhancing network intrusion detection systems through deep learning

Soroush M. Sohi et al.

Summary: The use of Recurrent Neural Networks (RNNs) in generating complex attack patterns and synthetic signatures from advanced malware shows promise in improving intrusion detection rates.

COMPUTERS & SECURITY (2021)

Article Telecommunications

Anomaly-based intrusion detection systems: The requirements, methods, measurements, and datasets

Suzan Hajj et al.

Summary: With the increasing reliance on computer networks and the rise of cyber-attacks, network security and intrusion detection systems (IDSs) have become essential for defending organizations from various threats. This article provides a thorough review of IDSs, covering intrusion detection techniques, attack forms, datasets, challenges, and potential solutions in depth. The article also introduces a taxonomy of IDSs based on criteria such as information source, detection strategy, detection mode, and architecture, and includes an in-depth analysis and comparison of network intrusion detection approaches based on anomaly detection techniques.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2021)

Article Computer Science, Information Systems

An effective intrusion detection approach using SVM with naive Bayes feature embedding

Jie Gu et al.

Summary: This paper proposes an effective intrusion detection framework based on SVM and naiv e Bayes feature embedding, and experimental results validate its good and robust performance on multiple datasets.

COMPUTERS & SECURITY (2021)

Review Computer Science, Artificial Intelligence

Deep belief network based intrusion detection techniques: A survey

Insoo Sohn

Summary: With the increase in IoT devices, the amount of personal and sensitive data flowing through global networks has grown rapidly, making cybersecurity a crucial issue for future network evolution. Deep learning techniques, particularly deep belief networks (DBN), have become key solutions in detecting malicious attacks.

EXPERT SYSTEMS WITH APPLICATIONS (2021)

Article Computer Science, Information Systems

Intrusion Detection for Cyber-Physical Systems Using Generative Adversarial Networks in Fog Environment

Paulo Freitas de Araujo-Filho et al.

Summary: This article introduces a fog-based, unsupervised intrusion detection system (IDS) for CPSs using GANs, which calculates reconstruction loss based on data samples mapped to latent space for higher detection rates. Experimental results show that the proposed solution is at least 5.5 times faster than baseline methods.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Artificial Intelligence

Classification model for accuracy and intrusion detection using machine learning approach

Arushi Agarwal et al.

Summary: This study improves the accuracy and reduces processing time of IDS algorithms by comparing different classification machine learning algorithms to find the best-suited algorithm to learn suspicious network activity patterns. Data gathered from feature set comparison is used as input to train the system for future intrusion behavior prediction and analysis.

PEERJ COMPUTER SCIENCE (2021)

Article Automation & Control Systems

DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems

Beibei Li et al.

Summary: The study introduces a novel federated deep learning scheme named DeepFed for detecting cyber threats against industrial CPSs. By designing a new intrusion detection model and federated learning framework, the research successfully achieves secure detection of various cyber threats.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Artificial Intelligence

Analyzing fusion of regularization techniques in the deep learning-based intrusion detection system

Ankit Thakkar et al.

Summary: This paper examines the fusion of various regularization techniques with dropout regularization for analyzing and enhancing the performance of DNN-based IDS. The experimental results demonstrate that the fusion of dropout with other regularization techniques outperforms individual L1, L2, and elastic net regularization techniques.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)

Article Computer Science, Artificial Intelligence

Ensemble classification for intrusion detection via feature extraction based on deep Learning

Maryam Yousefnezhad et al.

Summary: This study utilizes intrusion detection systems to detect intrusions in networks, utilizing various classification methods and improving performance through ensemble classifiers. By using deep learning to extract features and combining methods of uncertainty, successfully selecting samples and demonstrating outstanding performance on multiple benchmark datasets.

SOFT COMPUTING (2021)

Article Computer Science, Artificial Intelligence

IoT-based smart environment using intelligent intrusion detection system

Gauri Kalnoor et al.

Summary: The proposed work aims to design an intelligent intrusion detection system using machine learning models to identify and protect IoT networks from attacks. Experimental results show that the Markov model performs well in the I-IDS IoT network, achieving a 100% detection rate and low false alarm rate.

SOFT COMPUTING (2021)

Article Computer Science, Theory & Methods

Random Partitioning Forest for Point-Wise and Collective Anomaly Detection-Application to Network Intrusion Detection

Pierre-Francois Marteau

Summary: DiFF-RF is a novel ensemble approach that significantly improves performance in detecting collective anomalies and is easy to train efficiently. Experimental results demonstrate that DiFF-RF outperforms other algorithms on multiple datasets with relatively low computational cost.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Multidisciplinary Sciences

Multi-channel framelet denoising of diffusion-weighted images

Geng Chen et al.

PLOS ONE (2019)

Article Computer Science, Artificial Intelligence

Probabilistic Diffusion for Interactive Image Segmentation

Tao Wang et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2019)

Article Computer Science, Artificial Intelligence

An Extended Perona-Malik Model Based on Probabilistic Models

L. M. Mescheder et al.

JOURNAL OF MATHEMATICAL IMAGING AND VISION (2018)

Article Computer Science, Information Systems

TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest

Erxue Min et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Article Computer Science, Information Systems

An Effective Two-Step Intrusion Detection Approach Based on Binary Classification and k-NN

Longjie Li et al.

IEEE ACCESS (2018)

Article Computer Science, Artificial Intelligence

An effective combining classifier approach using tree algorithms for network intrusion detection

Jasmin Kevric et al.

NEURAL COMPUTING & APPLICATIONS (2017)

Article Computer Science, Information Systems

Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System (IDS)

R. Vinayakumar et al.

INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN (2017)

Article Computer Science, Information Systems

Detection and classification of anomaly intrusion using hierarchy clustering and SVM

Chenghua Tang et al.

SECURITY AND COMMUNICATION NETWORKS (2016)