Int J Performability Eng ›› 2024, Vol. 20 ›› Issue (1): 24-31.doi: 10.23940/ijpe.24.01.p4.2431
Previous Articles Next Articles
Rahul Bhandaria, Sanjay Singlaa, Purushottam Sharmab,*, and Sandeep Singh Kanga
Submitted on
;
Revised on
;
Accepted on
Contact:
* E-mail address: puru.mit2002@gmail.com
Rahul Bhandari, Sanjay Singla, Purushottam Sharma, and Sandeep Singh Kang. AINIS: An Intelligent Network Intrusion System [J]. Int J Performability Eng, 2024, 20(1): 24-31.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
[1] Latif S., Idrees Z., Zou Z., andAhmad, J. DRaNN: A Deep Random Neural Network Model for Intrusion Detection in Industrial IoT. In2020 international conference on UK-China emerging technologies (UCET), IEEE, pp. 1-4, 2020. [2] Alsaedi A., Moustafa N., Tari Z., Mahmood A., andAnwar A.TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems. IEEE Access, vol. 8, pp. 165130-165150, 2020. [3] Vaiyapuri, T. and Binbusayyis, A.Application of Deep Autoencoder as an One-Class Classifier for Unsupervised Network Intrusion Detection: A Comparative Evaluation. PeerJ Computer Science, vol. 6, pp. e327, 2020. [4] Binbusayyis, A. and Vaiyapuri, T.Identifying and Benchmarking Key Features for Cyber Intrusion Detection: An Ensemble Approach. IEEE Access, vol. 7, pp. 106495-106513, 2019. [5] Binbusayyis, A. and Vaiyapuri, T.Comprehensive Analysis and Recommendation of Feature Evaluation Measures for Intrusion Detection. Heliyon, vol. 6, no. 7, 2020. [6] Vaiyapuri T.Deep Learning Enabled Autoencoder Architecture for Collaborative Filtering Recommendation in IoT Environment. Computers, Materials & Continua, vol. 68, no. 1, 2021. [7] Binbusayyis, A. and Vaiyapuri, T.Unsupervised Deep Learning Approach for Network Intrusion Detection Combining Convolutional Autoencoder and One-Class SVM. Applied Intelligence, vol. 51, no. 10, pp. 7094-7108, 2021. [8] Vaiyapuri T., Binbusayyis A., andVaradarajan V. Security,Privacy and Trust in IoMT Enabled Smart Healthcare System: A Systematic Review of Current and Future Trends. International Journal of Advanced Computer Science and Applications, vol. 12, no. 2, 2021. [9] Christiansen P., Nielsen L.N., Steen K.A., Jørgensen R.N., andKarstoft H.DeepAnomaly: Combining Background Subtraction and Deep Learning for Detecting Obstacles and Anomalies in an Agricultural Field. Sensors, vol. 16, no. 11, pp. 1904, 2016. [10] Kang, M.J. and Kang, J.W.Intrusion Detection System using Deep Neural Network for in-Vehicle Network Security. PloS one, vol. 11, no. 6, pp. e0155781, 2016. [11] Jain, S. and Chandrasekaran, K.Industrial Automation using Internet of Things. In Research Anthology on Cross-Disciplinary Designs and Applications of Automation, IGI Global, pp. 355-383, 2022. [12] Susilo, B. and Sari, R.F.Intrusion Detection in IoT Networks using Deep Learning Algorithm. Information, vol. 11, no. 5, pp .279, 2020. [13] Abu Al-Haija, Q. and Zein-Sabatto, S. An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks. Electronics, vol. 9, no. 12, pp. 2152, 2020. [14] Manimurugan S.,Al-Mutairi, S., Aborokbah, M.M., Chilamkurti, N., Ganesan, S., and Patan, R. Effective Attack Detection in Internet of Medical Things Smart Environment using a Deep Belief Neural Network. IEEE Access, vol. 8, pp. 77396-77404, 2020. [15] Alotaibi, B. and Alotaibi, M.A Stacked Deep Learning Approach for IoT Cyberattack Detection. Journal of Sensors, vol. 2020, pp. 1-10, 2020. [16] Liang W., Li K.C., Long J., Kui X., andZomaya A.Y.An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model. IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 2063-2071, 2019. [17] Tsang, C.H. and Kwong, S. Multi-Agent Intrusion Detection System in Industrial Network using Ant Colony Clustering Approach and Unsupervised Feature Extraction. In2005 IEEE international conference on industrial technology, IEEE, pp. 51-56, 2005. [18] Jin C., Valizadeh S., andvan Dijk, M. Snapshotter: Lightweight Intrusion Detection and Prevention System for Industrial Control Systems. In2018 IEEE Industrial Cyber-Physical Systems (ICPS), IEEE, pp. 824-829, 2018. [19] Butun I., Almgren M., Gulisano V., andPapatriantafilou M.Intrusion Detection in Industrial Networks via Data Streaming. Industrial IoT: Challenges, Design Principles, Applications, and Security, pp. 213-238, 2020. [20] Yang K., Li Q., Lin X., Chen X., andSun L.IFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting. IEEE Journal on Selected Areas in Communications, vol. 38, no. 5, pp. 955-967, 2020. [21] Akter M., Dip G.D., Mira M.S., Abdul Hamid M., andMridha, M.F. Construing Attacks of Internet of Things (IoT) anda Prehensile Intrusion Detection System for Anomaly Detection using Deep Learning Approach. In International Conference on Innovative Computing and Communications: Proceedings of ICICC2019, Springer Singapore, vol. 2, pp. 427-438, 2020. [22] Ge M., Syed N.F., Fu X., Baig Z., andRobles-Kelly, A. Towards a Deep Learning-Driven Intrusion Detection Approach for Internet of Things. Computer Networks, vol. 186, pp. 107784, 2021. [23] Saharkhizan M., Azmoodeh A., Dehghantanha A., Choo K.K.R., and Parizi, R.M. An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks using Network Traffic. IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8852-8859, 2020. [24] Singla S., Sharma P., andSharma P.K.Enhanced Security using Proxy Signcryption Technique for Wireless Mesh Networks. International Journal of System Assurance Engineering and Management, vol. 14, no. 1, pp. 474-482, 2023. [25] Relan, N.G. and Patil, D.R. Implementation of Network Intrusion Detection System using Variant of Decision Tree Algorithm. In2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE), IEEE, pp. 1-5, 2015. [26] Boyes H., Hallaq B., Cunningham J., andWatson T.The Industrial Internet of Things (IIoT): An Analysis Framework. Computers in industry, vol. 101, pp. 1-12, 2018. [27] Sharma P., Alshehri M., andSharma R.Activities Tracking by Smartphone and Smartwatch Biometric Sensors using Fuzzy Set Theory. Multimedia Tools and Applications, vol. 82, no. 2, pp. 2277-2302, 2023. [28] Qureshi A.U.H., Larijani, H., Mtetwa, N., Javed, A., and Ahmad, J. RNN-ABC: A New Swarm Optimization Based Technique for Anomaly Detection. Computers, vol. 8, no. 3, pp. 59, 2019. [29] Sheikhan M., Jadidi Z., andFarrokhi A.Intrusion Detection using Reduced-Size RNN Based on Feature Grouping. Neural Computing and Applications, vol. 21, pp. 1185-1190, 2012. [30] Agarwal A., Sharma P., Alshehri M., Mohamed A.A., andAlfarraj O.Classification Model for Accuracy and Intrusion Detection using Machine Learning Approach. PeerJ Computer Science, vol. 7, pp. e437, 2021. [31] Lee J., Kim J., Kim I., andHan K.Cyber Threat Detection Based on Artificial Neural Networks using Event Profiles. IEEE Access, vol. 7, pp. 165607-165626, 2019. [32] Masduki B.W., Ramli K., Saputra F.A., andSugiarto D. Study on Implementation of Machine Learning Methods Combination for Improving Attacks Detection Accuracy on Intrusion Detection System (IDS). In2015 International Conference on Quality in Research (QiR), IEEE, pp. 56-64, 2015. [33] Sharma P., Kapoor S., andSharma R.Ransomware Detection, Prevention and Protection in IoT Devices using ML Techniques Based on Dynamic Analysis Approach. International Journal of System Assurance Engineering and Management, vol. 14, no. 1, pp. 287-296, 2023. [34] Malik, A.J. and Khan, F.A.A Hybrid Technique using Binary Particle Swarm Optimization and Decision Tree Pruning for Network Intrusion Detection. Cluster Computing, vol. 21, pp. 667-680, 2018. [35] Gao Y., Wu H., Song B., Jin Y., Luo X., andZeng X.A Distributed Network Intrusion Detection System for Distributed Denial of Service Attacks in Vehicular Ad Hoc Network. IEEE Access, vol. 7, pp. 154560-154571, 2019. [36] Zhou Y., Cheng G., Jiang S., andDai M.Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier. Computer networks, vol. 174, pp. 107247, 2020. [37] Vinayakumar R., Alazab M., Soman K.P., Poornachandran P., Al-Nemrat, A., and Venkatraman, S. Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access, vol. 7, pp. 41525-41550, 2019. |
[1] | Rohit Chandra Joshi, Aayush Juyal, Abhijeet Mishra, Avni Verma, and Kanika Singla. Deep Learning-Based Face Emotion Recognition: A Comparative Study [J]. Int J Performability Eng, 2024, 20(1): 1-9. |
[2] | Janarthanan Sekar and Ganesh Kumar T. Hyperparameter Tuning in Deep Learning-Based Image Classification to Improve Accuracy using Adam Optimization [J]. Int J Performability Eng, 2023, 19(9): 579-586. |
[3] | Sanjay Razdan, Himanshu Gupta, and Ashish Seth. D-SVM: A Deep Support Vector Machine Model with Different Kernel Types for Improved Intrusion Detection Performance [J]. Int J Performability Eng, 2023, 19(9): 598-606. |
[4] | Aashita Rajput, Muskan Yadav, Sachin Yadav, Megha Chhabra, and Arun Prakash Agarwal. Patch-Based Breast Cancer Histopathological Image Classification using Deep Learning [J]. Int J Performability Eng, 2023, 19(9): 607-623. |
[5] | C. Rohith Bhat and Madhusundar Nelson. Artificial Intelligence Based Credit Card Fraud Detection for Online Transactions Optimized with Sparrow Search Algorithm [J]. Int J Performability Eng, 2023, 19(9): 624-632. |
[6] | Kavita Pandey, and Dhiraj Pandey. Real-Time Crop Disease Detection and Remedial Suggestion through Deep Learning-based Smartphone Application [J]. Int J Performability Eng, 2023, 19(8): 491-498. |
[7] | Savita Khurana, Gaurav Sharma, and Bhawna Sharma. Hybrid Machine Learning Model for Load Prediction in Cloud Environment [J]. Int J Performability Eng, 2023, 19(8): 507-515. |
[8] | K. Eswara Rao, Bala Murali Pydi, T. Panduranga Vital, P. Annan Naidu, U. D. Prasann, and T. Ravikumar. An Advanced Machine Learning Approach for Student Placement Prediction and Analysis [J]. Int J Performability Eng, 2023, 19(8): 536-546. |
[9] | Babaljeet Kaur and Shalli Rani. Are the Customers Receiving Exact Recommendations from the E-Commerce Companies? Towards the Identification of Gray Sheep Users Using Personality Parameters [J]. Int J Performability Eng, 2023, 19(7): 425-433. |
[10] | Kshitij Kumar Sinha, Manoj Mathur, and Arun Sharma. Suitability Index Prediction for Residential Apartments Through Machine Learning [J]. Int J Performability Eng, 2023, 19(7): 434-442. |
[11] | Manpreet Kaur and Shalli Rani. Recommender System: Towards Identification of Shilling Attacks in Rating System Using Machine Learning Algorithms [J]. Int J Performability Eng, 2023, 19(7): 443-451. |
[12] | Srishti Bhugra and Puneet Goswami. Exploratory Review of Machine Learning-Based Software Component Reusability Prediction [J]. Int J Performability Eng, 2023, 19(7): 452-461. |
[13] | Harsha Gaikwad, Sanil Gandhi, Arvind Kiwelekar, and Manjushree Laddha. Analyzing Brain Signals for Predicting Students’ Understanding of Online Learning: A Machine Learning Approach [J]. Int J Performability Eng, 2023, 19(7): 462-470. |
[14] | Rakesh Kumar, Sunny Arora, Ashima Arya, Neha Kohli, Vaishali Arya, and Ekta Singh. Ensemble Learning for Appraising English Text Readability using Gompertz Function [J]. Int J Performability Eng, 2023, 19(6): 388-396. |
[15] | Manvi Khatri and Ajay Sharma. Deep Learning Approach based on Iris, Face, and Palmprint Fusion for Multimodal Biometric Recognition System [J]. Int J Performability Eng, 2023, 19(6): 407-416. |
|