6

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

system based on training multilayer perceptron by using enhanced [48] A. Nagaraja, B. Uma, and R.

kumar Gunupudi, “UTTAMA: An


Bat algorithm,” Neural Comput. Appl., 2019, [Online]. Available: Intrusion Detection System Based on Feature Clustering and Feature
https://link.springer.com/content/pdf/10.1007/s00521-019-04655- Transformation,” Found. Sci., no. 0123456789, 2019, doi:
2.pdf. 10.1007/s10699-019-09589-5.
[30] A. Yang, Y. Zhuansun, C. Liu, J. Li, and C. Zhang, “Design of [49] P. Anitha and B. Kaarthick, “Oppositional based Laplacian grey
Intrusion Detection System for Internet of Things Based on wolf optimization algorithm with SVM for data mining in intrusion
Improved BP Neural Network,” IEEE Access, vol. 7, pp. 106043– detection system,” J. Ambient Intell. Humaniz. Comput., 2019, doi:
106052, 2019, doi: 10.1109/ACCESS.2019.2929919. 10.1007/s12652-019-01606-6.
[31] D. Moon, S. B. Pan, and I. Kim, “Host-based intrusion detection [50] Q. M. Alzubi, M. Anbar, Z. N. M. Alqattan, M. A. Al-Betar, and ...,
system for secure human-centric computing,” J. Supercomput., vol. “Intrusion detection system based on a modified binary grey wolf
72, no. 7, pp. 2520–2536, 2016, doi: 10.1007/s11227-015-1506-9. optimisation,” Neural Comput. …, 2019, [Online]. Available:
[32] S. Ramakrishnan and S. Devaraju, “Attack‟s Feature Selection- https://link.springer.com/content/pdf/10.1007/s00521-019-04103-
Based Network Intrusion Detection System Using Fuzzy Control 1.pdf.
Language,” Int. J. Fuzzy Syst., vol. 19, no. 2, pp. 316–328, 2017, doi: [51] J. H. Lee and K. H. Park, “GAN-based imbalanced data intrusion
10.1007/s40815-016-0160-6. detection system,” Pers. Ubiquitous Comput., 2019, doi:
[33] C. Khammassi and S. Krichen, “A GA-LR wrapper approach for 10.1007/s00779-019-01332-y.
feature selection in network intrusion detection,” Comput. Secur., [52] V. Kumar, D. Sinha, A. K. Das, S. C. Pandey, and R. T. Goswami,
vol. 70, pp. 255–277, 2017, doi: 10.1016/j.cose.2017.06.005. “An integrated rule based intrusion detection system: analysis on
[34] D. Santoro, G. Escudero-Andreu, K. G. Kyriakopoulos, F. J. UNSW-NB15 data set and the real time online dataset,” Cluster
Aparicio-Navarro, D. J. Parish, and M. Vadursi, “A hybrid intrusion Comput., vol. 23, 2019, doi: 10.1007/s10586-019-03008-x.
detection system for virtual jamming attacks on wireless networks,” [53] K. Sethi, E. Sai Rupesh, R. Kumar, P. Bera, and Y. Venu Madhav,
Meas. J. Int. Meas. Confed., vol. 109, pp. 79–87, 2017, doi: “A context-aware robust intrusion detection system: a reinforcement
10.1016/j.measurement.2017.05.034. learning-based approach,” Int. J. Inf. Secur., no. 1, 2019, doi:
[35] L. Li, H. Zhang, H. Peng, and Y. Yang, “Nearest neighbors based 10.1007/s10207-019-00482-7.
density peaks approach to intrusion detection,” Chaos Solitons & [54] I. Dutt, S. Borah, and I. K. Maitra, “Immune System Based Intrusion
Fractals, vol. 110, pp. 33–40, 2018, doi: Detection System (IS-IDS): A Proposed,” IEEE Access, vol. 8, pp.
10.1016/J.CHAOS.2018.03.010. 34929–34941, 2020, doi: 10.1109/ACCESS.2020.2973608.
[36] M. Bouhaddi, M. S. Radjef, and K. Adi, “An efficient intrusion [55] A. S. Alzahrani, R. A. Shah, Y. Qian, and M. Ali, “A novel method
detection in resource-constrained mobile ad-hoc networks,” Comput. for feature learning and network intrusion classification,” Alexandria
Secur., vol. 76, pp. 156–177, 2018, doi: 10.1016/j.cose.2018.02.018. Eng. J., 2020, doi: 10.1016/j.aej.2020.01.021.
[37] G. Maciá-Fernández, J. Camacho, R. Magán-Carrión, P. García- [56] W. Elmasry, A. Akbulut, and A. H. Zaim, “Evolving deep learning
Teodoro, and R. Therón, “UGR„16: A new dataset for the evaluation architectures for network intrusion detection using a double PSO
of cyclostationarity-based network IDSs,” Comput. Secur., vol. 73, metaheuristic,” Comput. Networks, vol. 168, 2020, doi:
pp. 411–424, 2018, doi: 10.1016/j.cose.2017.11.004. 10.1016/j.comnet.2019.107042.
[38] M. Hawedi, C. Talhi, and H. Boucheneb, Multi-tenant intrusion [57] E. Mahdavi, A. Fanian, and F. Amini, “A real-time alert correlation
detection system for public cloud (MTIDS), vol. 74, no. 10. Springer method based on code-books for intrusion detection systems,”
US, 2018. Comput. Secur., vol. 89, p. 101661, 2020, doi:
[39] G. Bhuvaneswari and G. Manikandan, “An intelligent intrusion 10.1016/j.cose.2019.101661.
detection system for secure wireless communication using IPSO and [58] C. Stylianopoulos, M. Almgren, O. Landsiedel, and M.
negative selection classifier,” Cluster Comput., vol. 22, pp. 12429– Papatriantafilou, “Multiple pattern matching for network security
12441, 2018, doi: 10.1007/s10586-017-1643-4. applications: Acceleration through vectorization,” J. Parallel
[40] Y. Gao, H. Wu, B. Song, Y. Jin, X. Luo, and X. Zeng, “A distributed Distrib. Comput., vol. 137, pp. 34–52, 2020, doi:
network intrusion detection system for distributed denial of service 10.1016/j.jpdc.2019.10.011.
attacks in vehicular ad hoc network,” IEEE Access, vol. 7, pp. [59] Y. Li et al., “Robust detection for network intrusion of industrial IoT
154560–154571, 2019, doi: 10.1109/ACCESS.2019.2948382. based on multi-CNN fusion,” Measurement, vol. 154, p. 107450,
[41] S. C. Sethuraman, S. Dhamodara, and V. Vijayakumar, “Intrusion 2020, doi: 10.1016/J.MEASUREMENT.2019.107450.
detection system for detecting wireless attacks in IEEE 802.11 [60] W. Zhang, D. Han, K.-C. Li, and F. I. Massetto, “Wireless sensor
networks,” IET Networks, vol. 8, no. 4, pp. 219–232, 2019, doi: network intrusion detection system based on MK-ELM,” Soft
10.1049/iet-net.2018.5050. Comput., Jan. 2020, doi: 10.1007/s00500-020-04678-1.
[42] D. R. C. Canedo and A. R. S. R. Romariz, “Intrusion Detection [61] A. Davahli, M. Shamsi, and G. Abaei, “Hybridizing genetic
System in Ad Hoc Networks with Artificial Neural Networks and algorithm and grey wolf optimizer to advance an intelligent and
Algorithm K-Means,” IEEE Lat. Am. Trans., vol. 17, no. 7, pp. lightweight intrusion detection system for IoT wireless networks,” J.
1109–1115, 2019, doi: 10.1109/TLA.2019.8931198. Ambient Intell. Humaniz. Comput., no. 0123456789, 2020, doi:
[43] E. Anthi, L. Williams, M. Słowi, G. Theodorakopoulos, and P. 10.1007/s12652-020-01919-x.
Burnap, “A Supervised Intrusion Detection System for Smart Home [62] A. N. Jaber and S. U. Rehman, “FCM-SVM based intrusion
IoT Devices,” IEEE Internet Things J., vol. 6, no. 5, pp. 9042–9053, detection system for cloud computing environment,” Cluster
2019, doi: 10.1109/JIOT.2019.2926365. Comput., vol. 6, 2020, doi: 10.1007/s10586-020-03082-6.
[44] N. Upasani and H. Om, “A modified neuro-fuzzy classifier and its [63] S. Sandosh, V. Govindasamy, and G. Akila, “Enhanced intrusion
parallel implementation on modern GPUs for real time intrusion detection system via agent clustering and classification based on
detection,” Appl. Soft Comput. J., vol. 82, p. 105595, 2019, doi: outlier detection,” Peer-to-Peer Netw. Appl., 2020, doi:
10.1016/j.asoc.2019.105595. 10.1007/s12083-019-00822-3.
[45] N. Chouhan, A. Khan, and H. ur R. Khan, “Network anomaly [64] R. B. Benisha and S. R. Ratna, “Detection of data integrity attacks
detection using channel boosted and residual learning based deep by constructing an effective intrusion detection system,” J. Ambient
convolutional neural network,” Appl. Soft Comput. J., vol. 83, p. Intell. Humaniz. Comput., vol. 11, no. 10, 2020, doi:
105612, 2019, doi: 10.1016/j.asoc.2019.105612. 10.1007/s12652-020-01850-1.
[46] B. Selvakumar, K. Muneeswaran, S. B, M. K, and B. Selvakumar, [65] S. Venkatraman and B. Surendiran, “Adaptive hybrid intrusion
“Firefly algorithm based feature selection for network intrusion detection system for crowd sourced multimedia internet of things
detection,” Comput. Secur., vol. 81, pp. 148–155, 2019, doi: systems,” Multimed. Tools Appl., vol. 79, no. 5–6, pp. 3993–4010,
10.1016/J.COSE.2018.11.005. 2020, doi: 10.1007/s11042-019-7495-6.
[47] H. M. Song, J. Woo, and H. K. Kim, “In-vehicle network intrusion
detection using deep convolutional neural network,” Veh. Commun.,
vol. 21, p. 100198, 2020, doi: 10.1016/J.VEHCOM.2019.100198.

You might also like