최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기KSII Transactions on internet and information systems : TIIS, v.18 no.3, 2024년, pp.755 - 778
Alexander. R (Department of Computing Technologies, SRM Institute of Science and Technology) , Pradeep Mohan Kumar. K (Department of Computing Technologies, SRM Institute of Science and Technology)
In recent years, the number of devices being connected to the internet has grown enormously, as has the intrusive behavior in the network. Thus, it is important for intrusion detection systems to report all intrusive behavior. Using deep learning and machine learning algorithms, intrusion detection ...
Khan. R, Khan. S.U, Zaheer. R, and Khan. S, "Future internet: the internet of things architecture, possible applications and key challenges," in Proc. of 2012 10th international conference on frontiers of information technology, pp. 257-260, Dec. 2012.
Perera. C and Vasilakos. A.V, "A knowledge-based resource discovery for Internet of Things," Knowledge-Based Systems, 109, pp. 122-136, 2016.
Al-Fuqaha. A, Guizani. M, Mohammadi. M, Aledhari. M, and Ayyash. M, "Internet of things: A survey on enabling technologies, protocols, and applications," IEEE communications surveys & tutorials, 17(4), pp. 2347-2376, 2015.
Mid-Year Update: SonicWall Cyber Threat Report, 2022. [Online]. Available: https://www.sonicwall.com/resources/white-papers/mid-year-2022-sonicwall-cyber-threat-report/
Forestiero. A, "Metaheuristic algorithm for anomaly detection in Internet of Things leveraging on a neural-driven multiagent system," Knowledge-Based Systems, 228, p. 107241, 2021.
Hassan. M, Huda. S, Sharmeen. S, Abawajy. J, and Fortino. G, "An adaptive trust boundary protection for IIoT networks using deep-learning feature-extraction-based semisupervised model," IEEE Transactions on Industrial Informatics, 17(4), pp. 2860-2870, 2021.
Vijayakumar. D.S and Ganapathy. S, "Machine Learning Approach to Combat False Alarms in Wireless Intrusion Detection System," Comput. Inf. Sci., 11(3), pp. 67-81, 2018.
Hindy. H, Bayne. E, Bures. M, Atkinson. R, Tachtatzis. C, and Bellekens. X, "Machine learning based IoT intrusion detection system: An MQTT case study (MQTT-IoT-IDS2020 dataset)," in Proc. of 12th International Networking Conference: INC, pp. 73-84, 2021.
Al-Omari. M, Rawashdeh. M, Qutaishat. F, Alshira'H. M, and Ababneh. N, "An intelligent tree-based intrusion detection model for cyber security," Journal of Network and Systems Management, 29, pp. 1-18, 2021.
Vijayakumar. D.S and Ganapathy. S, "Multistage ensembled classifier for wireless intrusion detection system," Wireless Personal Communications, 122(1), pp. 645-668, 2022.
de Araujo-Filho. P.F, Kaddoum. G, Campelo. D.R, Santos. A.G, Macedo. D, and Zanchettin. C, "Intrusion detection for cyber-physical systems using generative adversarial networks in fog environment," IEEE Internet of Things Journal, 8(8), pp. 6247-6256, 2021.
Chen. Y, Ashizawa. N, Yeo. C.K, Yanai. N, and Yean. S, "Multi-scale self-organizing map assisted deep autoencoding Gaussian mixture model for unsupervised intrusion detection," Knowledge-Based Systems, 224, pp. 107086, 2021.
Ravi. N and Shalinie. S.M, "Semisupervised-learning-based security to detect and mitigate intrusions in IoT network," IEEE Internet of Things Journal, 7(11), pp. 11041-11052, 2020.
Suganuma. M, Shirakawa. S, and Nagao. T, "A genetic programming approach to designing convolutional neural network architectures," in Proc. of the genetic and evolutionary computation conference, pp. 497-504, 2017.
Stanley. K.O and Miikkulainen. R, "Evolving neural networks through augmenting topologies," Evolutionary computation, 10(2), pp. 99-127, 2002.
Yao. X and Liu. Y, "A new evolutionary system for evolving artificial neural networks," IEEE transactions on neural networks, 8(3), pp. 694-713, 1997.
Angeline. P.J, Saunders. G.M, and Pollack. J.B, "An evolutionary algorithm that constructs recurrent neural networks," IEEE transactions on Neural Networks, 5(1), pp. 54-65, 1994.
Miikkulainen. R, Liang. J, Meyerson. E, Rawal. A, Fink. D, Francon. O, Raju. B, Shahrzad. H, Navruzyan. A, Duffy. N, and Hodjat. B, "Evolving deep neural networks," in Artificial intelligence in the age of neural networks and brain computing, Academic Press, 2019, pp. 293-312.
Nayak. J, Naik. B, Dash. P.B, Vimal. S, and Kadry. S, "Hybrid Bayesian optimization hyper tuned catboost approach for malicious access and anomaly detection in IoT nomaly framework," Sustainable Computing: Informatics and Systems, 36, p. 100805, 2022.
Masum. M, Shahriar. H, Haddad. H, Faruk. M.J.H, Valero. M, Khan. M.A, Rahman. M.A, Adnan. M.I, Cuzzocrea. A, and Wu. F, "Bayesian hyperparameter optimization for deep neural network-based network intrusion detection," in Proc. of 2021 IEEE International Conference on Big Data, pp. 5413-5419, Dec. 2021.
Sharafaldin. I, Lashkari. A.H, and Ghorbani. A.A, "Toward generating a new intrusion detection dataset and intrusion traffic characterization," in Proc. of ICISSp, 1, pp. 108-116, 2018.
Ren. Y, Zhang. L, and Suganthan. P.N, "Ensemble classification and regression-recent developments, applications and future directions," IEEE Computational intelligence magazine, 11(1), pp. 41-53, 2016.
Jabbar. M.A and Aluvalu. R, "RFAODE: A novel ensemble intrusion detection system," Procedia computer science, 115, pp. 226-234, 2017.
Gaikwad. D.P and Thool. R.C, "Intrusion detection system using bagging ensemble method of machine learning," in Proc. of 2015 international conference on computing communication control and automation, pp. 291-295, Feb. 2015.
Moustafa. N, Turnbull. B, and Choo. K.K.R, "An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things," IEEE Internet of Things Journal, 6(3), pp. 4815-4830, 2018.
McLaughlin. N, del Rincon. J.M, Kang. B, Yerima. S, and Miller. P, "Deep android malware detection," in Proc. of the Seventh ACM on Conference on Data and Application Security and Privacy, pp. 301-308, 2017.
Maghrebi. H, Portigliatti. T, and Prouff. E, "Breaking cryptographic implementations using deep learning techniques," in Proc. of Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE, pp. 3-26, Dec. 2016.
Brun. O, Yin. Y, Gelenbe. E, Kadioglu. Y.M, Augusto-Gonzalez. J, and Ramos. M, "Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments," Procedia Computer Science, vol. 134, pp. 458-463, Feb. 2018.
Diro. A.A and Chilamkurti. N, "Distributed attack detection scheme using deep learning approach for Internet of Things," Future Generation Computer Systems, 82, pp. 761-768, 2018.
Torres. P, Catania. C, Garcia. S, and Garino. C.G, "An analysis of recurrent neural networks for botnet detection behavior," in Proc. of 2016 IEEE biennial congress of Argentina (ARGENCON), pp. 1-6, 2016.
Atiga. J, Mbarki. N.E, Ejbali. R, and Zaied. M, "Faulty node detection in wireless sensor networks using a recurrent neural network," in Proc. of Tenth international conference on machine vision (ICMV 2017), Vol. 10696, pp. 711-716, 2018.
Vu. L, Nguyen. Q.U, Nguyen. D.N, Hoang. D.T, and Dutkiewicz. E, "Learning latent representation for iot anomaly detection," IEEE Transactions on Cybernetics, 52(5), pp. 3769-3782, 2022.
Abdel-Basset. M, Chang. V, Hawash. H, Chakrabortty. R.K, and Ryan. M, "Deep-IFS: Intrusion detection approach for industrial internet of things traffic in fog environment," IEEE Transactions on Industrial Informatics, 17(11), pp. 7704-7715, 2020.
Imrana. Y, Xiang. Y, Ali. L, and Abdul-Rauf. Z, "A bidirectional LSTM deep learning approach for intrusion detection," Expert Systems with Applications, 185, p. 115524, 2021.
Habib. M, Aljarah. I, and Faris. H, "A modified multi-objective particle swarm optimizer-based Levy flight: An approach toward intrusion detection in Internet of Things," Arabian Journal for Science and Engineering, 45, pp. 6081-6108, 2020.
Chen. Y, Lin. Q, Wei. W, Ji. J, Wong. K.C, and Coello. C.A.C, "Intrusion detection using multi-objective evolutionary convolutional neural network for Internet of Things in Fog computing," Knowledge-Based Systems, 244, p. 108505, 2022.
Zhu. Y, Liang. J, Chen. J, and Ming. Z, "An improved NSGA-III algorithm for feature selection used in intrusion detection," Knowledge-Based Systems, 116, pp. 74-85, 2017.
Y.H. Yang, H.Z. Huang, Q.N. Shen, Z.H. Wu, and Y. Zhang, "Research on intrusion detection based on incremental GHSOM," Chinese J. Comput. 37(5), pp. 1216-1224, 2014
LeCun. Y and Bengio. Y, "Convolutional networks for images, speech, and time series," The handbook of brain theory and neural networks, 3361(10), p. 1995, 1995.
Kursawe. F, "A variant of evolution strategies for vector optimization," in Proc. of Parallel Problem Solving from Nature: 1st Workshop, pp. 193-197, June. 2005.
Panigrahi. R and Borah. S, "A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems," International Journal of Engineering & Technology, 7(3.24), pp. 479-482, 2018.
Assis. M.V, Carvalho. L.F, Lloret. J, and Proenca Jr. M.L, "A GRU deep learning system against attacks in software defined networks," Journal of Network and Computer Applications, 177, p. 102942, 2021.
Vinayakumar. R, Soman. K.P, and Poornachandran. P, "A comparative analysis of deep learning approaches for network intrusion detection systems (N-IDSs): deep learning for N-IDSs," International Journal of Digital Crime and Forensics (IJDCF), 11(3), pp. 65-89, 2019.
Gamage. S and Samarabandu. J, "Deep learning methods in network intrusion detection: A survey and an objective comparison," Journal of Network and Computer Applications, 169, p. 102767, 2020.
Lv. Z, Qiao. L, Li. J, and Song. H, "Deep-learning-enabled security issues in the internet of things," IEEE Internet of Things Journal, 8(12), pp. 9531-9538, 2020.
Muhammad. G, Hossain. M.S, and Garg. S, "Stacked autoencoder-based intrusion detection system to combat financial fraudulent," IEEE Internet of Things Journal, vol. 10, no. 3, pp. 2071-2078, 2023.
Altunay. H.C and Albayrak. Z, "A hybrid CNN+ LSTM based intrusion detection system for industrial IoT networks," Engineering Science and Technology, an International Journal, 38, p. 101322, 2023.
Altunay. H.C and Albayrak. Z, "Network Intrusion Detection Approach Based on Convolutional Neural Network," Avrupa Bilim ve Teknoloji Dergisi, (26), pp. 22-29, 2021.
Kavitha. S, Uma Maheswari. N, and Venkatesh. R, "Intelligent Intrusion Detection System using Enhanced Arithmetic Optimization Algorithm with Deep Learning Model," Tehnicki vjesnik, 30(4), pp. 1217-1224, 2023.
Khan. M.A, Iqbal. N, Jamil. H, and Kim. D.H, "An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection," Journal of Network and Computer Applications, 212, p. 103560, 2023.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.