Search Results - • Computing methodologies → Machine learning Intrusion Detection Systems

Refine Results
  1. 1

    Advancements in Intrusion Detection Systems: A Comparative Analysis of Machine Learning and AI Methodologies by Panigrahi, Swayankar, Mohanty, Soumya Ranjan, Dalai, Ritik Roshan, Wagh, Mamata P., Sawaika, Anuradha, Pradhan, Priti Priyadarsani

    ISSN: 2473-7674
    Published: IEEE 24.06.2024
    “…To improve the effectiveness of intrusion detection system (IDS), this article explores the use of machine learning and AI based technology…”
    Get full text
    Conference Proceeding
  2. 2

    Intrusion detection in cloud computing based on time series anomalies utilizing machine learning by Al-Ghuwairi, Abdel-Rahman, Sharrab, Yousef, Al-Fraihat, Dimah, AlElaimat, Majed, Alsarhan, Ayoub, Algarni, Abdulmohsen

    ISSN: 2192-113X, 2192-113X
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.12.2023
    “… Despite the widespread use of network intrusion detection systems (NIDS), the issue of false positives remains prevalent…”
    Get full text
    Journal Article
  3. 3

    A Review of Machine Learning Methodologies for Network Intrusion Detection by Phadke, Aditya, Kulkarni, Mohit, Bhawalkar, Pranav, Bhattad, Rashmi

    Published: IEEE 01.03.2019
    “…s. To reduce this work, systems are proposed for network intrusion detection systems capable of analyzing contents of the network by means of machine learning techniques to analyze and classify the malicious contents…”
    Get full text
    Conference Proceeding
  4. 4
  5. 5

    Towards an Integrated Methodology and Toolchain for Machine Learning-Based Intrusion Detection in Urban IoT Networks and Platforms by Rangelov, Denis, Lämmel, Philipp, Brunzel, Lisa, Borgert, Stephan, Darius, Paul, Tcholtchev, Nikolay, Boerger, Michell

    ISSN: 1999-5903, 1999-5903
    Published: Basel MDPI AG 01.03.2023
    Published in Future internet (01.03.2023)
    “… In this paper, we presented a brief overview of existing attacks and defense strategies and used this as motivation for proposing an integrated methodology for developing…”
    Get full text
    Journal Article
  6. 6

    Design of a Machine Learning Based Intrusion Detection Framework and Methodology for IoT Networks by Manzano S., Ricardo, Goel, Nishith, Zaman, Marzia, Joshi, Rohit, Naik, Kshirasagar

    Published: IEEE 26.01.2022
    “… Intrusion detection in IoT systems using Machine Learning (ML) techniques can be an effective measure in combating attacks…”
    Get full text
    Conference Proceeding
  7. 7

    QML-IDS: Quantum Machine Learning Intrusion Detection System by Abreu, Diego, Rothenberg, Christian Esteve, Abelem, Antonio

    ISSN: 2642-7389
    Published: IEEE 26.06.2024
    “… In response to this technological advancement, our research presents QML-IDS, a novel Intrusion Detection System (IDS…”
    Get full text
    Conference Proceeding
  8. 8

    Adaptive machine learning‐based alarm reduction via edge computing for distributed intrusion detection systems by Wang, Yu, Meng, Weizhi, Li, Wenjuan, Liu, Zhe, Liu, Yang, Xue, Hanxiao

    ISSN: 1532-0626, 1532-0634
    Published: Hoboken Wiley Subscription Services, Inc 10.10.2019
    Published in Concurrency and computation (10.10.2019)
    “…Summary To protect assets and resources from being hacked, intrusion detection systems are widely implemented in organizations around the world…”
    Get full text
    Journal Article
  9. 9

    A Survey on Machine Learning Approaches for Intrusion Detection in Cloud Computing Environments for Improving Routing Payload Security and Network Privacy by Vivek, Vullikanti, Veeravalli, Bharadwaj

    ISSN: 2834-8249
    Published: IEEE 04.07.2024
    “… Considering the high volume of data as data-centric and Intrusion Detection (ID) as a data analysis process, Machine Learning (ML…”
    Get full text
    Conference Proceeding
  10. 10

    QML-IDS: Quantum Machine Learning Intrusion Detection System by Abreu, Diego, Christian Esteve Rothenberg, Abelem, Antonio

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 07.10.2024
    Published in arXiv.org (07.10.2024)
    “… In response to this technological advancement, our research presents QML-IDS, a novel Intrusion Detection System~(IDS…”
    Get full text
    Paper
  11. 11

    Intrusion Detection Systems: Exploring Methodologies, Classification, and Machine Learning Approaches by Punia, Anita, Tiwari, Manish, Verma, Sourabh Singh

    ISSN: 2769-2884
    Published: IEEE 18.09.2025
    “…Intrusion Detection Systems (IDSs) play a very critical role in the cyber security infrastructure of any modern organization…”
    Get full text
    Conference Proceeding
  12. 12

    Intelligent Intrusion Detection System for VANET Using Machine Learning and Deep Learning Approaches by Karthiga, B., Durairaj, Danalakshmi, Nawaz, Nishad, Venkatasamy, Thiruppathy Kesavan, Ramasamy, Gopi, Hariharasudan, A.

    ISSN: 1530-8669, 1530-8677
    Published: Oxford Hindawi 2022
    “… In this article, an effective Intelligent Intrusion Detection System (IDS) is proposed using machine learning and deep learning approaches such as Adaptive Neuro Fuzzy Inference System (ANFIS…”
    Get full text
    Journal Article
  13. 13

    Attack classification in network intrusion detection system based on optimization strategy and deep learning methodology by Ramu, Ch.Kodanda, Rao, T. Srinivasa, Rao, E. Uma Shankar

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Published: New York Springer US 01.09.2024
    Published in Multimedia tools and applications (01.09.2024)
    “… To solve the challenges, network intrusion detection system (NIDS) technology is used; any network can profit from this system because it can monitor traffic and detect any irregularities…”
    Get full text
    Journal Article
  14. 14

    Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges by Kocher, Geeta, Kumar, Gulshan

    ISSN: 1432-7643, 1433-7479
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2021
    Published in Soft computing (Berlin, Germany) (01.08.2021)
    “… However, several applications are utilizing machine learning (ML) methods from the past several years and reported good performance…”
    Get full text
    Journal Article
  15. 15

    Effective Intrusion Detection System to Secure Data in Cloud Using Machine Learning by Aldallal, Ammar, Alisa, Faisal

    ISSN: 2073-8994, 2073-8994
    Published: Basel MDPI AG 01.12.2021
    Published in Symmetry (Basel) (01.12.2021)
    “… In this work, a novel machine learning based hybrid intrusion detection system is proposed. It combined support vector machine (SVM…”
    Get full text
    Journal Article
  16. 16

    Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments by Aljamal, Ibraheem, Tekeoglu, Ali, Bekiroglu, Korkut, Sengupta, Saumendra

    Published: IEEE 01.05.2019
    “…Intrusion detection is one essential tool towards building secure and trustworthy Cloud computing environment, given the ubiquitous presence of cyber attacks that proliferate rapidly and morph dynamically…”
    Get full text
    Conference Proceeding
  17. 17
  18. 18
  19. 19

    Optimization Model for Machine Learning Based Intrusion Detection System (OML-IDS) in Mobile-Edge Computing by R, Kiruthiga, Jeyalaksshmi, S., Vanitha, V., Khan, Abdul Azeem, Pal, Souvik, Kumar, Rahul

    Published: IEEE 23.07.2024
    “… The network layer security for MEC is protected by intrusion detection systems (IDSs). We need an updated IDS system capable of detecting modern cyber-attacks as well as monitoring the devices…”
    Get full text
    Conference Proceeding
  20. 20

    Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment by Alzubi, Omar A., Alzubi, Jafar A., Alazab, Moutaz, Alrabea, Adnan, Awajan, Albara, Qiqieh, Issa

    ISSN: 2079-9292, 2079-9292
    Published: Basel MDPI AG 01.10.2022
    Published in Electronics (Basel) (01.10.2022)
    “… Intrusion detection systems (IDS) can be used to protect against cyberattacks in FC and EC environments, while the large-dimensional features in networking data make processing the massive amount of data difficult, causing lower…”
    Get full text
    Journal Article