4.7 Article

Novel modeling and optimization for joint Cybersecurity-vs-QoS Intrusion Detection Mechanisms in 5G networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks

Mahendra Prasad et al.

Summary: A Mobile Ad-Hoc Network (MANET) is a widely used temporary network that is vulnerable to routing attacks. Many intrusion detection methods have been proposed to tackle this vulnerability. This paper presents a performance reliability evaluation model for intrusion detection methods in MANETs, which analyzes performance and hardware dependability and computes the performance reliability using a fuzzy logic system. The experimental results show that the proposed detection method outperforms existing methods in terms of maintaining high scheme reliability.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2023)

Review Computer Science, Hardware & Architecture

Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review

Mudhafar Nuaimi et al.

Summary: In recent years, the Industrial Internet of Things (IIoT) has experienced rapid growth and provided significant benefits to various aspects of life. However, the heterogeneity and limited resources of IIoT devices pose challenges to the security of the system. Intrusion detection systems (IDS) based on intelligent approaches such as machine learning have been enhanced to combat threats and protect IIoT systems. This survey focuses on the application of machine learning algorithms in intrusion detection in IIoT and suggests future research directions.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2023)

Article Computer Science, Information Systems

A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework

Sydney Mambwe Kasongo

Summary: In recent years, advances in technologies such as cloud computing, vehicular networks systems, and the Internet of Things (IoT) have led to a spike in the amount of information transmitted through communication infrastructures. Consequently, attackers have increased their efforts to exploit vulnerabilities in network systems. Therefore, it is crucial to enhance the security of these network systems. This study implements an IDS framework using Machine Learning techniques and evaluates its performance using benchmark datasets.

COMPUTER COMMUNICATIONS (2023)

Review Computer Science, Information Systems

A systematic literature review of methods and datasets for anomaly-based network intrusion detection

Zhen Yang et al.

Summary: With the rapid evolution of network techniques, network attacks are becoming more sophisticated and threatening. Network intrusion detection is widely recognized as an effective method to address network threats. Anomaly-based network intrusion detection is an important research direction, but there is a lack of systematic literature reviews on recent techniques and datasets. In this study, we conducted a systematic literature review of 119 top-cited papers on anomaly-based intrusion detection, investigating the technical landscape of the field from various perspectives, and identifying unsolved research challenges and future research directions.

COMPUTERS & SECURITY (2022)

Article Chemistry, Multidisciplinary

Network Intrusion Detection Model Based on CNN and GRU

Bo Cao et al.

Summary: In this study, a network intrusion detection model that combines a convolutional neural network and a gated recurrent unit is proposed to address the low accuracy and class imbalance problems in existing intrusion detection models. By using a hybrid sampling algorithm, feature selection, and attention mechanism, the proposed model achieves higher classification accuracy and effectively handles class imbalance. The experimental results demonstrate its superiority over existing models.

APPLIED SCIENCES-BASEL (2022)

Article Computer Science, Information Systems

Intrusion Detection in Internet of Things With MQTT Protocol-An Accurate and Interpretable Genetic-Fuzzy Rule-Based Solution

Marian B. Gorzalczany et al.

Summary: This article proposes an accurate and interpretable intrusion detection method for IoT systems using a knowledge-discovery data-mining/machine-learning approach. The approach, implemented as a fuzzy rule-based classifier, optimizes the tradeoff between accuracy and interpretability of IoT intrusion detection systems (IoT IDSs) through a multiobjective evolutionary optimization algorithm. The main contribution of this work is the design of accurate and interpretable IoT IDSs based on recently published MQTT-IOT-IDS2020 data sets, which describe the behavior of an MQTT-protocol-based IoT system. A comparison with seven alternative approaches demonstrates that the proposed method significantly outperforms others in terms of interpretability while remaining competitive or superior in accuracy.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Tier-Based Optimization for Synthesized Network Intrusion Detection System

Murtaza Ahmed Siddiqi et al.

Summary: This study proposes an optimal framework for a network intrusion detection system based on image processing, which enhances network security efficiency through steps such as feature selection, image transformation, and enhancement.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection

Azzam Mourad et al.

Summary: The article discusses the challenges of intrusion detection in Internet of Vehicles and vehicular networks, and proposes a vehicular-edge computing (VEC) fog-enabled scheme to offload intrusion detection tasks with minimal latency. The scheme aims to maximize offloading survivability while minimizing computation execution time and energy consumption.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Telecommunications

On-Demand Service Deployment Strategies for Fog-as-a-Service Scenarios

Arash Bozorgchenani et al.

Summary: The study investigates a flexible way of deploying fog computing services at the network edge, utilizing various service deployment models to meet client needs. The simulation results analyze the performance of different methods in terms of customer satisfaction and service delay.

IEEE COMMUNICATIONS LETTERS (2021)

Review Computer Science, Hardware & Architecture

Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review

Sang-Woong Lee et al.

Summary: This article focuses on the application of deep learning in intrusion detection systems, discussing how different methods utilize deep learning networks for better results. It classifies the studied IDS schemes and compares their features in different aspects. Finally, comparisons of deep IDS approaches and future research directions are provided.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Engineering, Chemical

HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System

Muhammad Ashfaq Khan

Summary: Network attacks are a crucial problem in modern society, and developing effective intrusion detection systems is essential to mitigate the impact of malicious threats. Utilizing deep learning and machine learning techniques, researchers have designed a hybrid convolutional recurrent neural network intrusion detection system that achieves high accuracy in detecting malicious cyberattacks.

PROCESSES (2021)

Article Computer Science, Hardware & Architecture

Cross-layer tradeoff of QoS and security in Vehicular ad hoc Networks: A game theoretical approach

Zemin Sun et al.

Summary: The study proposes a two-period game approach to optimize QoS and security in VANETs, with the first period focusing on external decision-making to maximize throughput, and the second period addressing internal decision-making through a game model for communication and security resource competition.

COMPUTER NETWORKS (2021)

Article Computer Science, Information Systems

An Agile Approach to Identify Single and Hybrid Normalization for Enhancing Machine Learning-Based Network Intrusion Detection

Murtaza Ahmed Siddiqi et al.

Summary: This paper discusses the importance of intrusion detection in improving network security, the application in the field of machine learning, and the selection of suitable normalization methods for datasets.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

An Approach for Optimizing Ensemble Intrusion Detection Systems

Deris Stiawan et al.

Summary: This study aims to find the best relevant selected features for intrusion detection system by using six feature selection methods, combining them with four classification methods to generate optimized ensemble IDSs, and evaluating them through various validation approaches to improve performance.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

A hybrid deep learning model for efficient intrusion detection in big data environment

Mohammad Mehedi Hassan et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

Rabia Khan et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection

Zina Chkirbene et al.

IEEE ACCESS (2020)

Article Computer Science, Cybernetics

A Novel Intrusion Detection and Prevention Scheme for Network Coding-Enabled Mobile Small Cells

Reza Parsamehr et al.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2019)

Article Computer Science, Information Systems

Intrusion Detection Systems: A Cross-Domain Overview

Lionel N. Tidjon et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Theory & Methods

Optimizing security and quality of service in a real-time operating system using multi-objective Bat algorithm

Mhamed Zineddine

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Engineering, Electrical & Electronic

Bandwidth Spoofing and Intrusion Detection System for Multistage 5G Wireless Communication Network

Akhil Gupta et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Review Computer Science, Hardware & Architecture

Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

Mohamed Amine Ferrag et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

Comparative Performance Evaluation of Intrusion Detection Methods for In-Vehicle Networks

Haojie Ji et al.

IEEE ACCESS (2018)

Article Computer Science, Artificial Intelligence

A Deep Learning Approach to Network Intrusion Detection

Nathan Shone et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2018)

Article Engineering, Electrical & Electronic

GT-QoSec: A Game-Theoretic Joint Optimization of QoS and Security for Differentiated Services in Next Generation Heterogeneous Networks

Zubair Md. Fadlullah et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2017)

Article Computer Science, Artificial Intelligence

Optimizing security and quality of service in a Real-time database system using Multi-objective genetic algorithm

Xuancai Zhao et al.

EXPERT SYSTEMS WITH APPLICATIONS (2016)

Article Computer Science, Artificial Intelligence

Analyzing Log Files for Postmortem Intrusion Detection

Karen A. Garcia et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2012)

Article Computer Science, Information Systems

QoS2: a framework for integrating quality of security with quality of service

Tarik Taleb et al.

SECURITY AND COMMUNICATION NETWORKS (2012)