Search Results - • Computing methodologies → Machine learning Intrusion Detection Systems
-
1
Advancements in Intrusion Detection Systems: A Comparative Analysis of Machine Learning and AI Methodologies
ISSN: 2473-7674Published: IEEE 24.06.2024Published in International Conference on Computing, Communication, and Networking Technologies (Online) (24.06.2024)“…To improve the effectiveness of intrusion detection system (IDS), this article explores the use of machine learning and AI based technology…”
Get full text
Conference Proceeding -
2
Intrusion detection in cloud computing based on time series anomalies utilizing machine learning
ISSN: 2192-113X, 2192-113XPublished: Berlin/Heidelberg Springer Berlin Heidelberg 01.12.2023Published in Journal of cloud computing : advances, systems and applications (01.12.2023)“… Despite the widespread use of network intrusion detection systems (NIDS), the issue of false positives remains prevalent…”
Get full text
Journal Article -
3
A Review of Machine Learning Methodologies for Network Intrusion Detection
Published: IEEE 01.03.2019Published in 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC) (01.03.2019)“…s. To reduce this work, systems are proposed for network intrusion detection systems capable of analyzing contents of the network by means of machine learning techniques to analyze and classify the malicious contents…”
Get full text
Conference Proceeding -
4
M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning
ISSN: 0167-4048Published: 01.02.2024Published in Computers & security (01.02.2024)Get full text
Journal Article -
5
Towards an Integrated Methodology and Toolchain for Machine Learning-Based Intrusion Detection in Urban IoT Networks and Platforms
ISSN: 1999-5903, 1999-5903Published: Basel MDPI AG 01.03.2023Published in Future internet (01.03.2023)“… In this paper, we presented a brief overview of existing attacks and defense strategies and used this as motivation for proposing an integrated methodology for developing…”
Get full text
Journal Article -
6
Design of a Machine Learning Based Intrusion Detection Framework and Methodology for IoT Networks
Published: IEEE 26.01.2022Published in 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (26.01.2022)“… Intrusion detection in IoT systems using Machine Learning (ML) techniques can be an effective measure in combating attacks…”
Get full text
Conference Proceeding -
7
QML-IDS: Quantum Machine Learning Intrusion Detection System
ISSN: 2642-7389Published: IEEE 26.06.2024Published in Proceedings - IEEE Symposium on Computers and Communications (26.06.2024)“… In response to this technological advancement, our research presents QML-IDS, a novel Intrusion Detection System (IDS…”
Get full text
Conference Proceeding -
8
Adaptive machine learning‐based alarm reduction via edge computing for distributed intrusion detection systems
ISSN: 1532-0626, 1532-0634Published: Hoboken Wiley Subscription Services, Inc 10.10.2019Published in Concurrency and computation (10.10.2019)“…Summary To protect assets and resources from being hacked, intrusion detection systems are widely implemented in organizations around the world…”
Get full text
Journal Article -
9
A Survey on Machine Learning Approaches for Intrusion Detection in Cloud Computing Environments for Improving Routing Payload Security and Network Privacy
ISSN: 2834-8249Published: IEEE 04.07.2024Published in IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (Online) (04.07.2024)“… Considering the high volume of data as data-centric and Intrusion Detection (ID) as a data analysis process, Machine Learning (ML…”
Get full text
Conference Proceeding -
10
QML-IDS: Quantum Machine Learning Intrusion Detection System
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 07.10.2024Published in arXiv.org (07.10.2024)“… In response to this technological advancement, our research presents QML-IDS, a novel Intrusion Detection System~(IDS…”
Get full text
Paper -
11
Intrusion Detection Systems: Exploring Methodologies, Classification, and Machine Learning Approaches
ISSN: 2769-2884Published: IEEE 18.09.2025Published in Proceedings (International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (18.09.2025)“…Intrusion Detection Systems (IDSs) play a very critical role in the cyber security infrastructure of any modern organization…”
Get full text
Conference Proceeding -
12
Intelligent Intrusion Detection System for VANET Using Machine Learning and Deep Learning Approaches
ISSN: 1530-8669, 1530-8677Published: Oxford Hindawi 2022Published in Wireless communications and mobile computing (2022)“… In this article, an effective Intelligent Intrusion Detection System (IDS) is proposed using machine learning and deep learning approaches such as Adaptive Neuro Fuzzy Inference System (ANFIS…”
Get full text
Journal Article -
13
Attack classification in network intrusion detection system based on optimization strategy and deep learning methodology
ISSN: 1573-7721, 1380-7501, 1573-7721Published: New York Springer US 01.09.2024Published in Multimedia tools and applications (01.09.2024)“… To solve the challenges, network intrusion detection system (NIDS) technology is used; any network can profit from this system because it can monitor traffic and detect any irregularities…”
Get full text
Journal Article -
14
Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges
ISSN: 1432-7643, 1433-7479Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2021Published in Soft computing (Berlin, Germany) (01.08.2021)“… However, several applications are utilizing machine learning (ML) methods from the past several years and reported good performance…”
Get full text
Journal Article -
15
Effective Intrusion Detection System to Secure Data in Cloud Using Machine Learning
ISSN: 2073-8994, 2073-8994Published: Basel MDPI AG 01.12.2021Published in Symmetry (Basel) (01.12.2021)“… In this work, a novel machine learning based hybrid intrusion detection system is proposed. It combined support vector machine (SVM…”
Get full text
Journal Article -
16
Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments
Published: IEEE 01.05.2019Published in 2019 IEEE 17th International Conference on Software Engineering Research, Management and Applications (SERA) (01.05.2019)“…Intrusion detection is one essential tool towards building secure and trustworthy Cloud computing environment, given the ubiquitous presence of cyber attacks that proliferate rapidly and morph dynamically…”
Get full text
Conference Proceeding -
17
Utilizing Machine Learning for Intrusion Detection Systems in the Context of Cloud Computing
ISSN: 2581-9429, 2581-9429Published: 18.06.2023Published in International Journal of Advanced Research in Science, Communication and Technology (18.06.2023)“… An intrusion detection system's…”
Get full text
Journal Article -
18
An Intelligent Intrusion Detection System for Integrated Edge Computing CPS with Machine Learning
ISSN: 2582-5208, 2582-5208Published: 06.04.2024Published in International Research Journal of Modernization in Engineering Technology and Science (06.04.2024)Get full text
Journal Article -
19
Optimization Model for Machine Learning Based Intrusion Detection System (OML-IDS) in Mobile-Edge Computing
Published: IEEE 23.07.2024Published in 2024 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC) (23.07.2024)“… The network layer security for MEC is protected by intrusion detection systems (IDSs). We need an updated IDS system capable of detecting modern cyber-attacks as well as monitoring the devices…”
Get full text
Conference Proceeding -
20
Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment
ISSN: 2079-9292, 2079-9292Published: Basel MDPI AG 01.10.2022Published in Electronics (Basel) (01.10.2022)“… Intrusion detection systems (IDS) can be used to protect against cyberattacks in FC and EC environments, while the large-dimensional features in networking data make processing the massive amount of data difficult, causing lower…”
Get full text
Journal Article