system based on training multilayer perceptron by using enhanced [48] A. Nagaraja, B. Uma, and R.
kumar Gunupudi, “UTTAMA: An
Bat algorithm,” Neural Comput. Appl., 2019, [Online]. Available: Intrusion Detection System Based on Feature Clustering and Feature https://link.springer.com/content/pdf/10.1007/s00521-019-04655- Transformation,” Found. Sci., no. 0123456789, 2019, doi: 2.pdf. 10.1007/s10699-019-09589-5. [30] A. Yang, Y. Zhuansun, C. Liu, J. Li, and C. Zhang, “Design of [49] P. Anitha and B. Kaarthick, “Oppositional based Laplacian grey Intrusion Detection System for Internet of Things Based on wolf optimization algorithm with SVM for data mining in intrusion Improved BP Neural Network,” IEEE Access, vol. 7, pp. 106043– detection system,” J. Ambient Intell. Humaniz. Comput., 2019, doi: 106052, 2019, doi: 10.1109/ACCESS.2019.2929919. 10.1007/s12652-019-01606-6. [31] D. Moon, S. B. Pan, and I. Kim, “Host-based intrusion detection [50] Q. M. Alzubi, M. Anbar, Z. N. M. Alqattan, M. A. Al-Betar, and ..., system for secure human-centric computing,” J. Supercomput., vol. “Intrusion detection system based on a modified binary grey wolf 72, no. 7, pp. 2520–2536, 2016, doi: 10.1007/s11227-015-1506-9. optimisation,” Neural Comput. …, 2019, [Online]. Available: [32] S. Ramakrishnan and S. Devaraju, “Attack‟s Feature Selection- https://link.springer.com/content/pdf/10.1007/s00521-019-04103- Based Network Intrusion Detection System Using Fuzzy Control 1.pdf. Language,” Int. J. Fuzzy Syst., vol. 19, no. 2, pp. 316–328, 2017, doi: [51] J. H. Lee and K. H. Park, “GAN-based imbalanced data intrusion 10.1007/s40815-016-0160-6. detection system,” Pers. Ubiquitous Comput., 2019, doi: [33] C. Khammassi and S. Krichen, “A GA-LR wrapper approach for 10.1007/s00779-019-01332-y. feature selection in network intrusion detection,” Comput. Secur., [52] V. Kumar, D. Sinha, A. K. Das, S. C. Pandey, and R. T. Goswami, vol. 70, pp. 255–277, 2017, doi: 10.1016/j.cose.2017.06.005. “An integrated rule based intrusion detection system: analysis on [34] D. Santoro, G. Escudero-Andreu, K. G. Kyriakopoulos, F. J. UNSW-NB15 data set and the real time online dataset,” Cluster Aparicio-Navarro, D. J. Parish, and M. Vadursi, “A hybrid intrusion Comput., vol. 23, 2019, doi: 10.1007/s10586-019-03008-x. detection system for virtual jamming attacks on wireless networks,” [53] K. Sethi, E. Sai Rupesh, R. Kumar, P. Bera, and Y. Venu Madhav, Meas. J. Int. Meas. Confed., vol. 109, pp. 79–87, 2017, doi: “A context-aware robust intrusion detection system: a reinforcement 10.1016/j.measurement.2017.05.034. learning-based approach,” Int. J. Inf. Secur., no. 1, 2019, doi: [35] L. Li, H. Zhang, H. Peng, and Y. Yang, “Nearest neighbors based 10.1007/s10207-019-00482-7. density peaks approach to intrusion detection,” Chaos Solitons & [54] I. Dutt, S. Borah, and I. K. Maitra, “Immune System Based Intrusion Fractals, vol. 110, pp. 33–40, 2018, doi: Detection System (IS-IDS): A Proposed,” IEEE Access, vol. 8, pp. 10.1016/J.CHAOS.2018.03.010. 34929–34941, 2020, doi: 10.1109/ACCESS.2020.2973608. [36] M. Bouhaddi, M. S. Radjef, and K. Adi, “An efficient intrusion [55] A. S. Alzahrani, R. A. Shah, Y. Qian, and M. Ali, “A novel method detection in resource-constrained mobile ad-hoc networks,” Comput. for feature learning and network intrusion classification,” Alexandria Secur., vol. 76, pp. 156–177, 2018, doi: 10.1016/j.cose.2018.02.018. Eng. J., 2020, doi: 10.1016/j.aej.2020.01.021. [37] G. Maciá-Fernández, J. Camacho, R. Magán-Carrión, P. García- [56] W. Elmasry, A. Akbulut, and A. H. Zaim, “Evolving deep learning Teodoro, and R. Therón, “UGR„16: A new dataset for the evaluation architectures for network intrusion detection using a double PSO of cyclostationarity-based network IDSs,” Comput. Secur., vol. 73, metaheuristic,” Comput. Networks, vol. 168, 2020, doi: pp. 411–424, 2018, doi: 10.1016/j.cose.2017.11.004. 10.1016/j.comnet.2019.107042. [38] M. Hawedi, C. Talhi, and H. Boucheneb, Multi-tenant intrusion [57] E. Mahdavi, A. Fanian, and F. Amini, “A real-time alert correlation detection system for public cloud (MTIDS), vol. 74, no. 10. Springer method based on code-books for intrusion detection systems,” US, 2018. Comput. Secur., vol. 89, p. 101661, 2020, doi: [39] G. Bhuvaneswari and G. Manikandan, “An intelligent intrusion 10.1016/j.cose.2019.101661. detection system for secure wireless communication using IPSO and [58] C. Stylianopoulos, M. Almgren, O. Landsiedel, and M. negative selection classifier,” Cluster Comput., vol. 22, pp. 12429– Papatriantafilou, “Multiple pattern matching for network security 12441, 2018, doi: 10.1007/s10586-017-1643-4. applications: Acceleration through vectorization,” J. Parallel [40] Y. Gao, H. Wu, B. Song, Y. Jin, X. Luo, and X. Zeng, “A distributed Distrib. Comput., vol. 137, pp. 34–52, 2020, doi: network intrusion detection system for distributed denial of service 10.1016/j.jpdc.2019.10.011. attacks in vehicular ad hoc network,” IEEE Access, vol. 7, pp. [59] Y. Li et al., “Robust detection for network intrusion of industrial IoT 154560–154571, 2019, doi: 10.1109/ACCESS.2019.2948382. based on multi-CNN fusion,” Measurement, vol. 154, p. 107450, [41] S. C. Sethuraman, S. Dhamodara, and V. Vijayakumar, “Intrusion 2020, doi: 10.1016/J.MEASUREMENT.2019.107450. detection system for detecting wireless attacks in IEEE 802.11 [60] W. Zhang, D. Han, K.-C. Li, and F. I. Massetto, “Wireless sensor networks,” IET Networks, vol. 8, no. 4, pp. 219–232, 2019, doi: network intrusion detection system based on MK-ELM,” Soft 10.1049/iet-net.2018.5050. Comput., Jan. 2020, doi: 10.1007/s00500-020-04678-1. [42] D. R. C. Canedo and A. R. S. R. Romariz, “Intrusion Detection [61] A. Davahli, M. Shamsi, and G. Abaei, “Hybridizing genetic System in Ad Hoc Networks with Artificial Neural Networks and algorithm and grey wolf optimizer to advance an intelligent and Algorithm K-Means,” IEEE Lat. Am. Trans., vol. 17, no. 7, pp. lightweight intrusion detection system for IoT wireless networks,” J. 1109–1115, 2019, doi: 10.1109/TLA.2019.8931198. Ambient Intell. Humaniz. Comput., no. 0123456789, 2020, doi: [43] E. Anthi, L. Williams, M. Słowi, G. Theodorakopoulos, and P. 10.1007/s12652-020-01919-x. Burnap, “A Supervised Intrusion Detection System for Smart Home [62] A. N. Jaber and S. U. Rehman, “FCM-SVM based intrusion IoT Devices,” IEEE Internet Things J., vol. 6, no. 5, pp. 9042–9053, detection system for cloud computing environment,” Cluster 2019, doi: 10.1109/JIOT.2019.2926365. Comput., vol. 6, 2020, doi: 10.1007/s10586-020-03082-6. [44] N. Upasani and H. Om, “A modified neuro-fuzzy classifier and its [63] S. Sandosh, V. Govindasamy, and G. Akila, “Enhanced intrusion parallel implementation on modern GPUs for real time intrusion detection system via agent clustering and classification based on detection,” Appl. Soft Comput. J., vol. 82, p. 105595, 2019, doi: outlier detection,” Peer-to-Peer Netw. Appl., 2020, doi: 10.1016/j.asoc.2019.105595. 10.1007/s12083-019-00822-3. [45] N. Chouhan, A. Khan, and H. ur R. Khan, “Network anomaly [64] R. B. Benisha and S. R. Ratna, “Detection of data integrity attacks detection using channel boosted and residual learning based deep by constructing an effective intrusion detection system,” J. Ambient convolutional neural network,” Appl. Soft Comput. J., vol. 83, p. Intell. Humaniz. Comput., vol. 11, no. 10, 2020, doi: 105612, 2019, doi: 10.1016/j.asoc.2019.105612. 10.1007/s12652-020-01850-1. [46] B. Selvakumar, K. Muneeswaran, S. B, M. K, and B. Selvakumar, [65] S. Venkatraman and B. Surendiran, “Adaptive hybrid intrusion “Firefly algorithm based feature selection for network intrusion detection system for crowd sourced multimedia internet of things detection,” Comput. Secur., vol. 81, pp. 148–155, 2019, doi: systems,” Multimed. Tools Appl., vol. 79, no. 5–6, pp. 3993–4010, 10.1016/J.COSE.2018.11.005. 2020, doi: 10.1007/s11042-019-7495-6. [47] H. M. Song, J. Woo, and H. K. Kim, “In-vehicle network intrusion detection using deep convolutional neural network,” Veh. Commun., vol. 21, p. 100198, 2020, doi: 10.1016/J.VEHCOM.2019.100198.