4.7 Article

DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

Transfer learning for raw network traffic detection

David A. Bierbrauer et al.

Summary: Traditional machine learning models for network intrusion detection rely on extensive network traffic data, which is not feasible in edge network scenarios. This study explores the feasibility of using transfer learning and neural networks to perform intrusion detection solely based on raw network traffic in computationally limited environments. The results show that high accuracy can be achieved on edge devices with a combination of transferred one-dimensional convolutional neural network model and retrained random forest model.

EXPERT SYSTEMS WITH APPLICATIONS (2023)

Article Chemistry, Analytical

Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID

Nasr Abosata et al.

Summary: Technological breakthroughs in the IoT have allowed for smart lives through the Internet, but the RPL protocol's security becomes crucial. The existing IDS solutions cannot detect novel RPL intrusions, thus a customised global attack knowledge-based IDS model is necessary. This paper proposes a FT-CID model to detect RPL intrusion in a heterogeneous IoT using federated transfer learning.

SENSORS (2023)

Proceedings Paper Telecommunications

A Transfer Learning and Optimized CNN Based Intrusion Detection System for Internet of Vehicles

Li Yang et al.

Summary: This paper proposes a transfer learning and ensemble learning-based IDS using convolutional neural networks and hyper-parameter optimization techniques to protect IoV systems from network attacks. The experiments demonstrate that the proposed IDS can effectively detect network attacks in both intra-vehicle and external vehicular networks.

IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022) (2022)

Article Computer Science, Information Systems

Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning

Mohamed Amine Ferrag et al.

Summary: This paper presents a comprehensive realistic cyber security dataset called Edge-IIoTset for IoT and IIoT applications. The dataset is generated using a purpose-built IoT/IIoT testbed and includes a representative set of devices, sensors, protocols, and cloud/edge configurations. It provides data from various IoT devices and analyzes fourteen attacks related to IoT and IIoT connectivity protocols.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

Transfer learning based intrusion detection scheme for Internet of vehicles

Xinghua Li et al.

Summary: As a new type of network, attacks in the Internet of Vehicles (IoV) are constantly evolving. This paper proposes two model update schemes based on whether the IoV cloud can provide timely labeled data for new attacks. The experimental results show that the proposed schemes have significantly improved detection accuracy compared to existing methods.

INFORMATION SCIENCES (2021)

Review Biology

A scoping review of transfer learning research on medical image analysis using ImageNet

Mohammad Amin Morid et al.

Summary: This study reviewed the application of transfer learning with convolutional neural networks in medical image analysis, identifying the most common anatomical areas studied and the use of different models for analysis in different anatomical areas. Findings can guide future research approaches and highlight research gaps in the field.

COMPUTERS IN BIOLOGY AND MEDICINE (2021)

Article Computer Science, Theory & Methods

Deep transfer learning framework for the identification of malicious activities to combat cyberattack

Deepak Singh et al.

Summary: Darknet, built on an encrypted network, is an internet-based technology that facilitates criminal activities. Despite having both positive and negative impacts on society, it cannot be ignored.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Computer Science, Hardware & Architecture

Adopting elitism-based Genetic Algorithm for minimizing multi-objective problems of IoT service placement in fog computing environment

B. Natesha et al.

Summary: The paper proposes a two-level resource provisioning fog framework using docker and containers, formulates the service placement problem in fog computing environment as a multi-objective optimization problem to ensure the QoS of IoT applications, and solves it with the Elitism-based Genetic Algorithm (EGA). The proposed approach outperforms other state-of-the-art service placement strategies in terms of service cost, energy consumption, and service time according to experimental results on a fog computing testbed developed using docker and containers on 1.4 GHz 64-bit quad-core processor devices.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Review Computer Science, Hardware & Architecture

Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review

Sang-Woong Lee et al.

Summary: This article focuses on the application of deep learning in intrusion detection systems, discussing how different methods utilize deep learning networks for better results. It classifies the studied IDS schemes and compares their features in different aspects. Finally, comparisons of deep IDS approaches and future research directions are provided.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Chemistry, Analytical

Deep Transfer Learning Based Intrusion Detection System for Electric Vehicular Networks

Sk Tanzir Mehedi et al.

Summary: This paper proposes a deep transfer learning-based IDS model for In-Vehicle Networks, which outperforms existing models in terms of performance. Experimental evaluations show significant improvement in detection accuracy compared to mainstream machine learning, deep learning, and benchmark deep transfer learning models, demonstrating better performance for real-time IVN security.

SENSORS (2021)

Proceedings Paper Automation & Control Systems

Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions

Maha Driss et al.

Summary: The Internet of Things (IoT) technology has led to the emergence of various smart applications in crucial sectors, but it also poses security vulnerabilities. Researchers have utilized microservices-based architecture to enhance the security of IoT data, providing scalable, reusable, and reconfigurable security features. This paper is the first survey to investigate the use of microservices technology for securing IoT applications.

KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021) (2021)

Article Computer Science, Artificial Intelligence

Automatic tuning of hyperparameters using Bayesian optimization

A. Helen Victoria et al.

Summary: Deep learning in artificial intelligence is effective in computer vision, natural language processing, and audio recognition. Hyperparameter tuning is crucial for training model performance, and Bayesian optimization algorithm enhances model performance effectively.

EVOLVING SYSTEMS (2021)

Article Computer Science, Information Systems

Ensemble Methods for Instance-Based Arabic Language Authorship Attribution

Mohammed Al-Sarem et al.

IEEE ACCESS (2020)

Article Automation & Control Systems

Highly Accurate Machine Fault Diagnosis Using Deep Transfer Learning

Siyu Shao et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Review Computer Science, Hardware & Architecture

A holistic review of Network Anomaly Detection Systems: A comprehensive survey

Nour Moustafa et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Automation & Control Systems

Industrial Internet of Things: Challenges, Opportunities, and Directions

Emiliano Sisinni et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Xception: Deep Learning with Depthwise Separable Convolutions

Francois Chollet

30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017) (2017)