Improved perturbation based hybrid firefly algorithm and long short-term memory based intelligent security model for IoT network intrusion detection DOI
Janmenjoy Nayak,

Pooja Puspita Priyadarshani,

Pandit Byomakesha Dash

и другие.

Computers & Electrical Engineering, Год журнала: 2024, Номер 121, С. 109926 - 109926

Опубликована: Дек. 1, 2024

Язык: Английский

Advancing cybersecurity: a comprehensive review of AI-driven detection techniques DOI Creative Commons

A Salem,

Safaa M. Azzam,

O. E. Emam

и другие.

Journal Of Big Data, Год журнала: 2024, Номер 11(1)

Опубликована: Авг. 4, 2024

Abstract As the number and cleverness of cyber-attacks keep increasing rapidly, it's more important than ever to have good ways detect prevent them. Recognizing cyber threats quickly accurately is crucial because they can cause severe damage individuals businesses. This paper takes a close look at how we use artificial intelligence (AI), including machine learning (ML) deep (DL), alongside metaheuristic algorithms better. We've thoroughly examined over sixty recent studies measure effective these AI tools are identifying fighting wide range threats. Our research includes diverse array cyberattacks such as malware attacks, network intrusions, spam, others, showing that ML DL methods, together with algorithms, significantly improve well find respond We compare methods out what they're where could improve, especially face new changing cyber-attacks. presents straightforward framework for assessing Methods in threat detection. Given complexity threats, enhancing regularly ensuring strong protection critical. evaluate effectiveness limitations current proposed models, addition algorithms. vital guiding future enhancements. We're pushing smart flexible solutions adapt challenges. The findings from our suggest protecting against will rely on continuously updating stay ahead hackers' latest tricks.

Язык: Английский

Процитировано

39

An integrated intrusion detection framework based on subspace clustering and ensemble learning DOI Creative Commons
Jingyi Zhu, Xiufeng Liu

Computers & Electrical Engineering, Год журнала: 2024, Номер 115, С. 109113 - 109113

Опубликована: Фев. 10, 2024

In the rapidly evolving landscape of Internet Things (IoT), ensuring robust intrusion detection is paramount for device and data security. This paper proposes a novel method in IoT networks that leverages unique blend subspace clustering ensemble learning. Our framework integrates three innovative strategies: Clustering Results as Features (CRF), Two-Level Decision Making (TDM), Iterative Feedback Loop (IFL). These strategies synergize to enhance performance model robustness. We employ mutual information feature selection utilize four algorithms – CLIQUE, PROCLUS, SUBCLU, LOF create additional sets. Three base learners NB, LGBM, XGB are used conjunction with Logistic Regression (LR) meta-learner. To fine-tune our model, we apply Particle Swarm Optimization (PSO) hyperparameter optimization. evaluate on UNSW-NB15 dataset, which contains realistic diverse network traffic data. The results show outperforms state-of-the-art methods terms accuracy (97.05%), precision (96.33%), recall (96.55%), F1-score (96.45%), false positive rate (0.029). can effectively detect both known unknown attacks achieve high low rate. contributes practical implications security theoretical advancements research.

Язык: Английский

Процитировано

7

Ensemble Learning for Network Intrusion Detection Based on Correlation and Embedded Feature Selection Techniques DOI Creative Commons
Ghalia Nassreddine, Mohamad Nassereddine, Obada Al-Khatib

и другие.

Computers, Год журнала: 2025, Номер 14(3), С. 82 - 82

Опубликована: Фев. 25, 2025

Recent advancements across various sectors have resulted in a significant increase the utilization of smart gadgets. This augmentation has an expansion network and devices linked to it. Nevertheless, development concurrently rise policy infractions impacting information security. Finding intruders immediately is critical component maintaining The intrusion detection system useful for security because it can quickly identify threats give alarms. In this paper, new approach was proposed. Combining results machine learning models like random forest, decision tree, k-nearest neighbors, XGBoost with logistic regression as meta-model what method based on. For feature selection technique, proposed creates advanced that combines correlation-based embedded technique on XGBoost. handling challenge imbalanced dataset, SMOTE-TOMEK used. suggested algorithm tested NSL-KDD CIC-IDS datasets. It shows high performance accuracy 99.99% both These prove effectiveness approach.

Язык: Английский

Процитировано

1

A Survey on Intrusion Detection System in IoT Networks DOI Creative Commons
Md. Mahbubur Rahman, Shaharia Al Shakil, Maimunah Mustakim

и другие.

Cyber Security and Applications, Год журнала: 2024, Номер 3, С. 100082 - 100082

Опубликована: Дек. 20, 2024

Язык: Английский

Процитировано

5

Edge-featured multi-hop attention graph neural network for intrusion detection system DOI
Ping Deng, Yong Huang

Computers & Security, Год журнала: 2024, Номер 148, С. 104132 - 104132

Опубликована: Сен. 26, 2024

Язык: Английский

Процитировано

3

Feature efficiency in IoMT security: A comprehensive framework for threat detection with DNN and ML DOI
Merve Pınar, A. Aktas, Eyüp Emre Ülkü

и другие.

Computers in Biology and Medicine, Год журнала: 2025, Номер 186, С. 109603 - 109603

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

QoS-Aware cloud security using lightweight EfficientNet with Adaptive Sparse Bayesian Optimization DOI

J Vinothini,

Srie Vidhya Janani E

Peer-to-Peer Networking and Applications, Год журнала: 2025, Номер 18(2)

Опубликована: Янв. 20, 2025

Язык: Английский

Процитировано

0

A Robust Framework for Detecting Brute-Force Attacks through Deep Learning Techniques DOI

Nouf Awadh,

H Nasralla Zaid,

Samah H. Alajmani

и другие.

International Journal of Recent Technology and Engineering (IJRTE), Год журнала: 2025, Номер 13(5), С. 27 - 42

Опубликована: Янв. 25, 2025

A considerable concern arises with the precise identification of brute-force threats within a networked environment. It emphasizes need for new methods, as existing ones often lead to many false alarms, well delays in real-time threat detection. To tackle these issues, this study proposes novel intrusion detection framework that utilizes deep learning models more accurate and efficient attacks. The framework’s structure includes data collection preprocessing components performed at outset using CSE-CICIDS2018 dataset. design architecture steps. Feature extraction selection techniques are employed optimize model training. Further, after building model, various attributes extracted from feature be used Then, construction multiple architectures algorithms, which include Artificial Neural Networks (ANN), Convolutional (CNN), Recurrent (RNN), Long Short-Term Memory (LSTM) models. Evaluation results show CNN LSTM achieved highest accuracy 99.995 Parsant 99.99 respectively. showcases its ability detect complex attack patterns network traffic. indicates got best optimum test time 9.94 seconds. This establishes an effective method, achieving high quickly. In comparison, we have surpassed current methods while addressing their weaknesses. findings consistent effectiveness frameworks faster alternative, increasing capability detecting intrusions on real-time.

Язык: Английский

Процитировано

0

Improving Intrusion Detecction Systems by using Deep Learning Methods on Time Series Data DOI Open Access

Asma Ahmed A. Mohammed

Engineering Technology & Applied Science Research, Год журнала: 2025, Номер 15(1), С. 19267 - 19272

Опубликована: Фев. 2, 2025

Intrusion Detection Systems (IDSs) are the cornerstone of cybersecurity, monitoring network traffic to find abnormal suspicious activities. Traditional IDSs usually face challenges in adapting cyber threats that evolve day by day, leading very high false positive rates and missed detections. This study focuses on enhancing performance an IDS system integrating deep learning techniques with time series data. The efficiency RNN, CNN, LSTM networks was evaluated detecting intrusions real-time. experimental results showed hybrid models, especially CNN+RNN+LSTM combination, performed best a 0.86 F1 score, 0.92 precision, 0.79 recall, indicating methods can improve detection accuracy while reducing alarms, opening resilient future for cybersecurity.

Язык: Английский

Процитировано

0

Architectural tactics to achieve quality attributes of machine-learning-enabled systems: A systematic literature review DOI Creative Commons
Vladislav Indykov, Daniel Strüber, Rebekka Wohlrab

и другие.

Journal of Systems and Software, Год журнала: 2025, Номер 223, С. 112373 - 112373

Опубликована: Фев. 13, 2025

Язык: Английский

Процитировано

0