Subject Areas : Computer Engineering
Ali Shahriari 1 , Mohammad Davarpour 2 , Mohammad ahmadinia 3
1 - 1Computer Engineering Department, Kerman Branch, Islamic Azad University, Kerman, Iran
2 - Department of Computer Engineering, Semnan Branch, Islamic Azad University, Semnan, Iran
3 - Azad University, Kerman
Keywords:
Abstract :
[1] SAMIRA SARVARI, NOR FAZLIDA MOHD SANI, ZURINA MOHD HANAPI, AND MOHD TAUFIK ABDULLAH, (2020), " An Efficient Anomaly Intrusion Detection Method with Feature Selection and Evolutionary Neural Network ", IEEE Access ,VOLUME 8, ,Digital Object Identifier 10.1109/ACCESS.2020.2986217.
[2] M. H. Ali, B. A. D. Al Mohammed, A. Ismail, and M. F. Zolkipli, ``A new intrusion detection system based on fast learning network and particle swarm optimization,'' IEEE Access, vol. 6, pp. 20255_20261, 2018.
[3] Yun, M. and B. Yuxin. Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid. in Advances in Energy Engineering (ICAEE), 2010 International Conference on. 2010. IEEE.
[4] S. Alharbi, P. Rodriguez, R. Maharaja, P. Iyer, N. Bose, Z. Ye, FOCUS: A Fog computing-based security system for the Internet of Things, CCNC 2018 - 2018 15th IEEE Annu. Consum. Commun. Netw. Conf. 2018-Janua (2018) 1–5. doi:10.1109/CCNC.2018.8319238.
[5] Muder Almiani, Alia AbuGhazleh, Amer Al-Rahayfeh, Saleh Atiewi and Abdul Razaque, (2019), " Deep Recurrent Neural Network for IoT Intrusion Detection System", Simulation Modelling Practice and Theory, doi: https://doi.org/10.1016/j.simpat.2019.102031.
[6] Ahmet Murat Ozbayoglu, Mehmet Ugur Gudelek, and Omer Berat Sezer, (2020), " Deep Learning for Financial applications: A Survey", Preprint submitted to Applied Soft Computing, arXiv:2002.05786v1 [q-fin.ST] 9 Feb 2020.
[7] K. V. V. N. L Sai Kiran, R. N. Kamakshi Devisetty, N. Pavan Kalyan, K. Mukundini, and R. Karthi, (2020), "Building intrusion Detection System for IoT Environment using Machine Learning Techniques", Third International Conference on Computing and Network Communications, Procedia Computer Science 171 (2020) 2372–2379, DOI: 10.1016/j.procs.2020.04.257.
[8] Abdelouahid Derhab, Arwa Aldweesh, Ahmed Z. Emam and Farrukh Aslam Khan, (2020), " Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering", Hindawi, Wireless Communications and Mobile Computing, Volume 2020, Article ID 6689134, 16 pages, https://doi.org/10.1155/2020/6689134.
[9] Fal Sadikin, Ton van Deursen, and Sandeep Kumar, (2020), " A Hybrid Zigbee IoT intrusion detection system using secure and efficient data collection", Internet of Things 12 (2020) 100306, https://doi.org/10.1016/j.iot.2020.100306.
[10] K. Mandal, M. Rajkumar, P. Ezhumalai, D. Jayakumar, and R. Yuvarani, (2020), " Improved security using machine learning for IoT intrusion detection system ", Materials Today: Proceedings, https://doi.org/10.1016/j.matpr.2020.10.187.
[11] Z. Ihsan, Yazid Idris and A.H. Abdullah, "Attribute normalization techniques and performance of intrusion classifiers: A comparative analysis", January 2013.
[12] A. S. Joshi, O. Kulkarni, G. M. Kakandikar, and V. M. Nandedkar,`Cuckoo search Optimization_A review,'' Mater. Today, Proc., vol. 4, no. 8, pp. 7262_7269, 2017.
[13] L. A. M. Pereira, D. Rodrigues, T. N. S. Almeida, C. C. O. Ramos, A. N. Souza, X.-S. Yang, and J. P. Papa, (2014), "A Binary Cuckoo Search and its Application for Feature Selection", Studies in Computational Intelligence, DOI: 10.1007/978-3-319-02141-6_7.
[14] Kim, J., Kim, J., Kim, H., Shim, M., & Choi, E. (2020). CNN-based network intrusion detection against denial-of-service attacks. Electronics, 9(6), 916.
[15] A. Hasan, and H. H. A, Theyazn, (2021), " Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms", Hindawi Complexity Volume 2021, Article ID 5579851, 18 pages https://doi.org/10.1155/2021/5579851.
[16] M. Tavallaee, E. Bagheri, W. Lu, A.A. Ghorbani, NRC Publications Archive (NPArC) archives des publications du CNRC ( NPArC ) A Detailed Analysis of the KDD CUP 99 Data Set A Detailed Analysis of the KDD CUP 99 Data Set, (2009).
[17] http://hafiz-cert.com/Services/article/view.aspx?OId=116&PageIndex=0 , 2016.